Cocoon relies on cloud technology to create a smarter and safer method for navigating the internet.
- Anti-virus and malware protection
- Anonymous online browsing
- Powered by cloud storage technology
- No need to download software to get access to features
- Encrypts all of your web traffic
- Portability across multiple devices makes things convenient
- The need for an encrypted connection results in high latency
- Quality of malware blocking produces mixed results
As long as the internet's existed, there's been a constant push and pull between the personal security of users and the intentions of those who would exploit personal information for criminal gain. Cocoon signifies a new vanguard in online security protection by drawing on the advantages offered by modern cloud technology. Cocoon can keep your information secure and protect your devices against the threat of viruses and other malicious scripts. Cocoon takes an interesting approach to online security. While much of the competition relies on locally stored programs to scan existing threats and safeguard you against potentially malicious sites, Cocoon takes a more proactive approach. Cocoon users are required to log in through the Cocoon gateway before they start browsing. That means that whenever they're online, they'll have access to the features that Cocoon offers. This approach to segregation is especially apparent in how it segregates your hard drive from the sites you choose to visit. When you browse the web through Cocoon, you're doing so through a portal, not dissimilar to how virtual private networks operate. That provides a layer of protection between your hard drive and potentially malicious software or programs looking to exploit it. Potential viruses are channeled away to an endpoint remote from your PC, so they never run the risk of actually accessing your machine. The level of anti-virus technology available users depends on their subscription plan, but some features come standard. Cocoon blocks off all automatic downloads, one of the main sources of infections, by default. You won't have to worry about getting tricked into downloading malware again. Their email protections apply a strict vetting process to notoriously open web clients like Gmail and Hotmail and scan all downloaded files before they even touch your desktop. While a malicious infection can wreak havoc on your machine, identity tracking can be just as insidious. Whether you're looking to protect your data from potential scammers or companies trying to build a profile of your habits, Cocoon will make sure that there's no trail for them to follow. Similarly to how their anti-virus software works, this technology relies on the cloud to get the job done. Whenever you enter information in forms, it will be stored in the cloud, rather than remotely -- and since you're channeled through a remote server, administrators will see Cocoon's information and have no access to your location or IP address. You can do all the browsing you need without having to worry about web hosts peering back at you. Cocoon even protects your history from other users on the same machine. This is a valuable asset to both businesses and individuals who share devices, as none of the information is stored locally. As soon as you log out of your Cocoon, your information is carefully filed away remotely. Since Cocoon doesn't require a software download, you can access it on all of your devices by just logging in.