You are here

In the News

2015

Jun 23

Adobe Flash Player Zero-Day Exploited in Attack Campaign

“This latest zero-day and others before it could have been isolated in the first place. Only by isolating the threat, are security and ops teams granted the grace period needed to test and deploy these critical patches.”

Source: Source: Security Week

Jun 22

Bromium Enterprise Controller Adds Management Services to vSentry Security Microvisor

“It becomes evident that this approach is typically superior to other alternatives.”

Source: Source: Virtualization Practice

Jun 04

Bromium: Better Security Through 'Microvisors'

“Bromium works by creating a tiny hypervisor, which it calls a Bromium microvisor, that isolates specific end-user tasks like opening an e-mail attachment or Web page. If any malware is picked up along the way, it's confined to the microvisor, which exists only for that task.”

Source: Source: Virtualization Review

Jun 04

Bromium beefs up endpoint security products with enterprise controller

The Bromium Enterprise Controller “provides one-click deployment of the company’s security products, policy orchestration, as well as monitoring and threat management for enterprise endpoint infrastructure.”

Source: Source: FierceITSecurity

Jun 03

Bromium Enterprise Controller Manages vSentry And Lava Clients

“Bromium Enterprise Controller, the new management platform for vSentry and a LAVA, provides enterprises with a single pane of glass to see all of the attacks made against their protected systems.”

Source: Source: Tom's IT Pro

Jun 03

Bromium Releases Its Enterprise Controller--Unlocking The Sales Pipeline?

“One of the more interesting recent startups in the security area is Bromium.”

Source: Source: Forbes

May 13

Floppy-Drive Security Flaw Sends Cloud Companies Scrambling

“Venom is not as serious as Heartbleed and Shellshock, said Jared DeMott, a security researcher with the security company Bromium, because QEMU is neither as widespread nor as easily exploited as the software that gave rise to those vulnerabilities. Still, it could serve as a launch point for an attack, he added.”

Source: Source: Wall Street Journal

May 13

Navigating containerization security

“Containers are enabling a much faster pace of releasing consistent software, but architects need to rethink how to secure applications.”

Source: Source: SearchSOA

Apr 28

Legacy security products leave enterprises vulnerable, RSA survey finds

The results of this survey serve as yet another proof point in a long line of data about the shortcomings of legacy security solutions.

Source: Source: FierceITSecurity

Apr 24

Industry wary of House-passed cyber bills

“A survey of cybersecurity professionals conducted by Bromium showed some 78 percent believed their company would benefit from sharing information about cyber threats but only 48 percent said their company would actually participate.”

Source: Source: Federal Times

Pages