Your users aren’t downloading files to their desktops anymore. They’re not running local applications. They’re working in Google Docs, Salesforce, Slack, and dozens of other browser-based platforms. The endpoint—the place where work actually happens—has moved entirely into the browser.
Your security tools haven’t made that move with them.
Legacy vendors built traditional Secure Web Gateways and Endpoint Detection and Response solutions for a different era. These tools monitor network traffic and inspect files on disk, but they can’t see what’s happening inside the browser itself. To these tools, the browser is essentially a black box. They can see requests going in and responses coming out, but the context of what the user is doing, what the browser renders, and how the browser reassembles malicious code? That’s invisible.
Attackers have figured this out, and they’re exploiting it systematically:
Recent attacks have used seemingly trivial files like malicious RDP configurations. When opened, these files mount all of the victim’s local drives onto the attacker’s device for exfiltration. The file itself looks harmless in transit.
SquareX explained the concept of Browser Detection and Response during the recent Security Field Day, positioning it as the security layer that finally operates where the threats materialize.
BDR functions like EDR, but for the browser. It monitors activity, enforces policies, and detects threats inside the browser environment itself—where identity attacks, malicious extensions, phishing, and evasive file delivery occur.
The architecture consists of a browser extension deployed via MDM and a web platform for policy management. The extension runs on Chromium-based browsers, Safari, and Firefox, acting as the enforcement point with full visibility into what’s happening in the browser context.
SquareX provides control at the exact moments that matter most:
One of SquareX’s technical differentiators is its use of Lua scripting running entirely client-side within the browser extension. This enables security teams to create complex, custom policies that respond to novel threats without waiting for cloud updates or vendor releases.
Security teams can build policies using a standard interface, generate them with an AI-based tool that accepts plain-language descriptions, or write custom Lua scripts for specific threats. This flexibility allows rapid response to emerging attack techniques—like blocking RDP files that contain specific commands used for drive redirection.
When a suspicious event occurs, SquareX generates an Attack Graph that maps the user’s complete path to the malicious page. This goes beyond showing just the source URL. It details whether the user clicked a search result, followed a link from Outlook, or arrived through a redirect chain.
This visibility fills a critical gap that EDRs currently leave open. Understanding how a user ended up at a malicious page helps security teams identify the initial vector and assess whether other users might be at similar risk.
The platform also provides visibility and control over browser extensions and enables granular policies for OAuth permissions—blocking users from granting risky access to applications.
For high-risk user groups, Attack Vision can be selectively enabled. This feature captures lightweight DOM changes (not video) to reconstruct what the user saw during an attack, helping security teams understand why a particular phishing attempt or social engineering tactic succeeded.
SquareX deliberately chose an extension-based approach over building an enterprise browser. Enterprise browsers face adoption challenges—asking employees to switch browsers meets resistance. They also create reliability concerns, acting as a single point of failure, and they inherit security patching delays because they depend on upstream Chromium updates.
The extension approach is lightweight and doesn’t disrupt the user experience. It requires MDM deployment with administrative permissions but leverages the native security controls and performance optimizations already built into major browsers. Background service workers and offscreen workers handle intensive tasks like OCR without impacting user performance.
The browser has become the primary workspace for modern organizations. Network-based SWGs can’t see what’s being assembled inside it. Endpoint-based EDRs can’t inspect what never touches the disk. The visibility gap is real, and attackers are actively exploiting it.
Browser Detection and Response provides the security layer that operates precisely where these threats materialize. It offers last-mile control against file-based malware hidden in web resources, first-mile control for data loss prevention, and Attack Graph visibility that transforms incident response.
The endpoint moved. Your security needs to move with it.
Recent Articles By Author