Seamlessly Isolate Risky Clicks with Bromium Secure Platform 4.1 [Demo Video]

2018-08-13T16:11:45+00:00 July 9th, 2018|Innovation|

Most breaches start with the user performing a risky click Windows 10 and modern browsers are more secure, but still susceptible to risky clicks Bromium’s virtualization-based security seamlessly isolates risky clicks inside unbreakable virtual machines Let’s face it, Internet Explorer, along with its plugins such as Flash, Java, and Silverlight, cannot be used to safely [...]

Bromium Secure Platform 4.1 Streamlines Virtualization-based Security

2018-07-20T17:47:57+00:00 July 2nd, 2018|Innovation|

Prioritize security around common customer pain points with targeted use case deployment Run native Chrome on the host for low-risk browsing while safely isolating web file downloads Transform raw data into actionable security insights with interactive dashboards and reports Virtualization-based security has changed the way organizations approach the idea of protecting their intellectual property from [...]

How to Use Bromium Application Isolation to Secure Microsoft Edge Downloads

2018-02-05T07:40:16+00:00 February 5th, 2018|Innovation|

Microsoft Edge browser does not isolate web file downloads Learn how to use Bromium to isolate your Microsoft Edge web file downloads Bromium works with all Microsoft virtualization-based security (VBS) technologies Microsoft jumps on the application isolation bandwagon. In December 2017, Bromium welcomed the arrival of the Windows Defender Application Guard (WDAG) for Microsoft Edge, [...]

We Have Answers: Questions from 2018 Cybersecurity Core Capabilities Webinar

2018-02-01T10:00:39+00:00 February 1st, 2018|Government, Innovation|

Nicolas Chaillan, cybersecurity architect who worked for Homeland Security in the United States provided guidelines for your 2018 cybersercurity strategy. It is based on what he built for Cyber.gov - a strategy that takes the best of the best and delivers results based on the level of security you need. His recommendations work for both [...]

Browser Isolation with Microsoft Windows Defender Application Guard (WDAG): What It Does, How It Works and What It Means

2017-12-11T06:00:56+00:00 December 11th, 2017|Innovation|

Microsoft brings hardware isolation to the web browser Bromium and Microsoft have similar approaches to browser isolation using virtualization Microsoft protects only their own OS and proprietary Microsoft applications Bromium works with all Microsoft VBS technologies, and together we secure far more of the Windows attack surface than Microsoft does on its own Creating momentum [...]

Watch: SANS Maturity Model Describes How to Grow Your Security Strategy [Webinar]

2017-10-10T11:58:46+00:00 October 10th, 2017|Innovation|

Setting your security strategy is a challenging task that comes with lot of opinions (and vendors!). SANS provides a rationale for growing protection that is logically calibrated to growth and expanding needs. Register for this webinar and even if you can't make it, we'll send you the recording (and a whitepaper). With so many security [...]

Virtualization-Based Security is Helping Security Professionals Relax

2017-08-03T05:05:40+00:00 August 3rd, 2017|Innovation|

Virtualization’s continued journey across the enterprise led inevitably to security Enhanced security benefits using virtualization are powerful and compelling Virtualization takes the security responsibility off users and delivers control to IT Detection-based security doesn’t work. It’s an exhausted concept. The battle’s been waged for 30 years and the cyber criminals won. Why? Because detection will [...]

Breachless Threat Intelligence: A Pain-Free Approach to CyberSecurity

2017-07-17T03:07:58+00:00 July 17th, 2017|Innovation|

Enterprises need a steady stream of actionable, timely, and accurate threat intelligence on targeted malicious intrusions and attempts into their networks They need this information without suffering breaches and cannot rely solely on post-compromise forensics or sandbox simulations to continuously tighten and adapt their defenses Pre-breach targeted intelligence eludes most organizations today, even among security [...]

Disposable Computing is the Essence of Bromium’s Micro-Virtualization

2017-06-21T04:51:04+00:00 June 21st, 2017|Innovation|

We live in a disposable society, from our ever-present convenience foods in throw-away packaging to online speed-dating tailor-made for today’s low attention-span, instant gratification, swipe-left culture. Why be stuck with the same cruddy old PC filled up with accumulated digital gunk day after day, when you can have a squeaky-clean brand new computer each and [...]

Disposable Computing is the Answer to Cyber Security for Business

2017-06-20T12:12:48+00:00 June 20th, 2017|Innovation|

Disposability has become a regular thing in our lives; but you may have taken for granted the value it brings. Cost, convenience and risk are the cornerstones of successful disposability. Disposable computing offers a solution to cyber security and provides you with valuable threat information. This is the first in our two-part series on disposable computing [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close