Bromium Secure Platform 4.1 Streamlines Virtualization-based Security

Blog Bromium Secure Platform 4.1 Streamlines Virtualization-based Security

July 2, 2018 Category: Innovation By: Michael Rosen Comments: 0

Bromium Secure Platform 4.1 Streamlines Virtualization-based Security

  • Prioritize security around common customer pain points with targeted use case deployment
  • Run native Chrome on the host for low-risk browsing while safely isolating web file downloads
  • Transform raw data into actionable security insights with interactive dashboards and reports

Virtualization-based security has changed the way organizations approach the idea of protecting their intellectual property from malware attacks and preserving their public reputation. It has redefined what it means to have truly secure endpoints while still permitting users to roam the web, click on shared links, and open attachments in their normal business workflows.

But not all organizations have large security teams, a complete security strategy, or the realistic need to protect themselves against all conceivable attack vectors. Many entities are trying to find a flexible solution to secure their most vulnerable assets against the most common attack vectors as quickly as possible, with minimal disruption to users.

The same key attack vectors are keeping security professionals up at night across industries and organization sizes:

  • Email attachments – users click on malicious attachments, triggering ransomware, remote access trojans, and credential theft
  • Spear phishing – users are tricked into clicking on malicious links in clever targeted email, leading to browser exploits and drive-by malware attacks
  • Malicious downloads – users inadvertently download weaponized documents and malicious executable files

Out-of-the-box security for common use cases

Since these attack vectors are common to everyone, we’ve packaged them up as targeted “use cases” enabled with just a few clicks right out of the box. That’s exactly what you get with Bromium Secure Platform 4.1, which is now shipping.

With turnkey use cases, customers realize Bromium’s unique security value faster, enjoy clearer ROI, and experience smoother user adoption. Similarly, Bromium Channel Partners can quickly demonstrate these prepackaged solutions to show virtualization-based security effectiveness – one attack vector at a time.

Secure user-centric browsing

Bromium 4.1 also focuses on streamlining the secure web browsing experience. It offers users a choice of native Chrome running directly on the host for low-risk browsing, or isolated browsing in the Bromium Secure Browser for suspected phishing links and unknown websites. We’re providing users with the web experience they expect, balanced with the security results their organizations demand. As always, Bromium application isolation protects your web file downloads against malware, regardless of your browser choice.

Actionable insights at a glance

To clearly visualize Bromium’s security value, the new release adds a collection of new dashboards and reports brimming with relevant information for stakeholders across the board, including summary reports for executives and clickable dashboards for desktop operations and security teams. We’ve also streamlined the threat triage process and added contextual information for incident responders to help them maintain situational awareness and keep on top of their security posture.

Bromium Secure Platform 4.1 is available now. Click here to request a demo.

For more info, see What’s New in Bromium 4.1 or download the Bromium Secure Platform data sheet.

Subscribe

Enter your email address to receive notifications.

About the Author

Michael Rosen

Michael Rosen
Sr. Product Manager, Threat Intelligence and Technical Marketing

Recent Posts

Categories
2018-07-20T17:47:57+00:00July 2nd, 2018|Innovation|

Leave a Reply

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.
Share
Tweet
Share

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close