Bromium was founded in 2010 with a mission to restore trust in computing. The company’s founders, Gaurav Banga, Simon Crosby, and Ian Pratt, have a long and deep history of innovation in virtualization and security. Inspired by the isolation principles of traditional virtualization, the Bromium team has created a game-changing new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware. Bromium has its headquarters in Cupertino, California, and an R&D center in Cambridge, UK. The company is backed by top-tier investors, including Andreessen Horowitz, Ignition Capital, Highland Capital Partners, Intel Capital, Meritech Capital and Lightspeed Venture Partners.
Bromium is focused on the global enterprise security market, projected by Gartner to grow to $30B in 2014. This market has long been dominated by detection-based security products, which use signatures, behaviors, or heuristics to identify potential threats. However, these technologies have become ineffective and unable to detect or protect against the growing number of polymorphic cyber threats, zero-day attacks, and APTs that are impacting enterprise organizations worldwide.
Bromium Endpoint Protection provides protection at the endpoint against all advanced malware. Bromium Endpoint Protection automatically creates hardware-isolated micro-VMs that secure every user task—such as visiting a web page, downloading a document, or opening an email attachment. Each task runs in its own micro-VM, and all micro-VMs are separated from each other, and from the trusted enterprise network. If malware targets the end user, the threat is contained in the hardware-isolated micro-VM. Consequently, it is never able to steal or damage the user or enterprise’s information, and is destroyed when the task is completed. Bromium Endpoint Protection is transparent to the end user, and has no discernable impact on user experience or system performance.
Bromium Threat Analysis is a complementary module that adds enormous value for Security Operation Centers (SOCs). Bromium Threat Analysis converts each micro-VM in the enterprise into a honeypot and automates the time-consuming post-attack malware analysis process. For example, if an endpoint is attacked within an isolated micro-VM, the entire attack is automatically and instantly recorded, and then forwarded to the Bromium Threat Analysis console in the SOC. This provides security teams with the results of an automatic in-depth analysis of the advanced malware.