Menlo+Votiro_Logo Lockup
Menlo Security Acquires Votiro to Deliver Easy, AI-driven Data Security to Enterprises
Icon Rounded Closed - BRIX Templates

Considerations on Closing the Browser Security Gap, Part 2: Choice

|
November 6, 2025

Executive Summary

This blog examines a critical CISO decision: securing the browser security gap against Highly Evasive Adaptive Threats (HEAT) via endpoint or cloud solutions. Endpoint strategies, like forced replacement browsers, can standardize security but create significant trade-offs. Restricting browser choice risks breaking compatibility for custom applications and degrades performance for compute-intensive tasks by requiring security hardening (e.g., disabling JIT/Wasm). Replacement browsers also impact user productivity and satisfaction. This discussion offers a cloud-based alternative path to Browser Security, that secures any browser and preserves application compatibility, performance, and user preference. Organizations must fully weigh the ramifications of browser choice before committing to an architecture.

—--

In the first blog of this series, published on October 16, 2025, we covered the browser security gap, which is the gap that exists between EPP and network security tools, and can be exploited by HEAT atacks. We then explained that you have a crucial architectural decision on how to close the browser security gap. So that you don’t have to click back, the fundamental browser security architectural choice is to do it:

1. At the endpoint

2.In the cloud

Browser security at the endpoint is dominated by replacement browsers, like Palo Alto Prisma Browser, Surf, Island, etc, that replace all of the organization’s existing browsers with a uniform Chromium-based browser that is intended to present a hardened attack surface compared to mainstream browsers. As we have seen, this still presents exploitable gaps, particularly by zero-day attacks.

But there is another important choice which is eliminated by the deployment of a replacement browser: the choice an organization may make to deploy or retain multiple browsers, for reasons which we will detail below.

Does Browser Choice Matter?

Browser choice matters. Let's talk about why.

CISOs across the globe tell us they typically support multiple browsers.  The Menlo Cloud, delivers browser security to well over a 1000 customers and 8 million users worldwide, and we see large customers using various combinations of Microsoft Edge, Firefox, Safari, seven differing versions of Chrome, and even IE-11.

Why? Because the needs and realities of their business demand that they support more than one browser. 

Browser Choice

Organizational Browser Choice

Choosing a replacement browser causes organizational browser choice to vanish, leading to serious repercussions.

First, consider application compatibility. The obvious risk when there is a forced browser standardization is that there may be important applications in use that explicitly support a single browser only. Even if a particular application works on a non-supported browser, accepting the risk that something could break in the next version without recourse runs against the ethos of most IT organizations.

The less obvious risk is that the replacement browser, in the spirit of hardening the browser attack surface, may block critical capabilities in active applications. While IT security and endpoint teams will typically perform extensive, broad compatibility testing and reviews when introducing a new browser, things get missed. We recently saw a situation where a company that selected a replacement browser didn’t foresee that the replacement browser would block the telephony component of a desktop application, which was a part of key customer support workflows. 

So how do such things happen? The Island replacement browser disables the Chromium Just-in-Time (JIT) Compiler and the WebAssembly (Wasm). There are two main negative side effects of pursuing security in this way:

  1. JavaScript performance degradation is due to losing optimization offered by the JIT compiler, which monitors frequently executed JavaScript code and compiles it into highly optimized, native machine code. Without the JIT, the JavaScript engine must rely entirely on its interpreter (or a less-optimized baseline compiler). The impact of this choice is that applications that rely on complex, computationally intensive JavaScript—such as in-browser video editors, advanced analytical dashboards, CAD tools, or interactive 3D visualizations—will execute much more slowly, potentially becoming unusable or causing the browser to freeze.

  2. Application breakage from disabling Wasm. The core use case of Wasm is to handle the most compute-heavy tasks in modern web applications. So what’s the impact of this choice? Disabling Wasm will break any application or feature that relies on it. Many large, professional Software-as-a-Service (SaaS) platforms, including some modern office suites, graphics tools (like Figma), and complex simulation/modeling software, use Wasm for their core processing logic. If an enterprise application requires Wasm, the user will likely encounter a broken feature or a total failure to load the application's most advanced functions.

Organizations should be wary of the modest performance improvement claim from Island. Island will say, basic web browsing works fine, maybe even better. You’ll love us. Later, when the high-value, compute-intensive business applications identified above hamper productivity or just don’t work for all users in all locations, they’ll say, Sorry, security has its impacts

Second, organizations adopting replacement browsers risk hobbling their users with a limited toolset.  Both Microsoft and Google regularly add new productivity and security features to Edge and Chrome, and such innovations are often delayed or not available in Chromium or the replacement browsers based on the Chromium project.  And because we can’t see the future, organizations adopting replacement browsers risk being left behind as leading browsers integrate with other productivity tools like Google Workspace and Microsoft Office 365, and increasingly, with emerging GenAI technologies. A feature like Microsoft Edge Workspaces, which enables browser-based collaboration, is not available within Chromium, leaving replacement browsers unable to offer similar capabilities. 

Ultimately, replacement browser vendors must choose between pursuing their primary mission- trying to close the browser security gap- and ongoing browser development that supports the latest capabilities in leading browsers. And since their development resources are dwarfed by the size of the browser giants, the customer is asked to make a big leap of faith, trading innovation for security, only to wind up with neither.

Unplanned Choice Can Be Even Riskier

I just got off a customer call. The customer is using IE-11. We asked why, and the answer was that we have some custom apps that require IE-11. On an earlier customer call, we were talking about Chrome, and the customer said, We have a new application that requires Chrome. We don’t know why it requires Chrome, but it does. A replacement browser cannot be IE-11 – changing the reporting user-agent field works in a few cases, but certainly not for applications designed for a very old browser. 

When business requirements outweigh the mandate to universally deploy a replacement browser, then the replacement browser is not covering everything, leaving a general security gap. Worse, unmanaged endpoints, such as contractors, with access to a custom app, can infect it. Also, privileged attackers on unmanaged endpoints could harvest data from the custom app.

The clear alternative to this is cloud-based browser security through the Menlo Cloud, which supports nearly any browser. The proof of this is that our customer mentioned above, using IE-11, is securing it through the Menlo Cloud.

User Choice

Once again, here we will focus on replacement browsers. Removing browser choice from users can compromise productivity and potentially breed resentment against IT. Now, let’s get one counterpoint out of the way: users are always forced to use something at work: a PC rather than a Mac, a VPN, and, of course, one or more SaaS or desktop apps upon which an organization depends. But… there’s just something about the browser – that we use it on every device, that it’s both a personal and work UI, that it’s the gateway to the Internet — that makes it different.

I do realize that organizational choice will and should override user choice.. But in the absence of such an override, keeping users happy and productive should be on the mind of everyone in the security team.

Wrapping Up

Among the many considerations on closing the browser security gap that need examination, I think we’ve demonstrated that both organization and user choice may each have ramifications that have to be dealt with, ideally before making any architectural decisions. I hope this discussion about the challenges around both organizational and user browser choice has been helpful.

Menlo Security

menlo security logo
linkedin logotwitter/x logoSocial share icon via eMail