Browsing: How Do Companies Secure Machine Identities?