U.S. Department of Defense Validates Bromium for Application Isolation and Containment on the Endpoint2018-06-20T16:48:49+00:00

U.S. Department of Defense Validates Bromium for Application Isolation and Containment on the Endpoint

Defense Information Systems Agency publishes first influential Security Technical Implementation Guide (STIG) for an isolation and containment security solution

June 20, 2018

Bromium®, Inc., the leader in virtualization-based security that stops advanced malware attacks via application isolation and containment, announced today that the U.S. Department of Defense’s (DoD) Defense Information Systems Agency (DISA) has added the Bromium Secure Platform to its list of commercially available technology products with a Security Technical Implementation Guide (STIG). The DoD issues STIGs for software solutions from vendors that meet or exceed the DoD’s rigorous security requirements for use by military agencies. Today’s announcement reflects Bromium’s strategic role and expanding presence within the U.S. Government and DoD.

As the first application isolation and containment solution with a published STIG, Bromium has met the security standards required for deployment on Department of Defense (DoD) networks. The new STIG guidelines allow the DoD, it’s Agencies and other Federal Agencies to deploy Bromium’s virtualization-based security with the necessary technical policies, configuration settings, and implementation information to bring advanced security and threat intelligence to the endpoint.

“The STIG’s validation of Bromium’s capabilities provides an important milestone towards a strengthened cyber posture within the DoD,” said Sherban Naum, Senior Vice President of Corporate Strategy and Technology at Bromium. “This new STIG quickens internal processes for agencies seeking the unparalleled security benefits of application isolation and containment, which solves critical cybersecurity challenges by focusing on protection rather than detection. This is a significant achievement for Bromium and it comes as a result of many years of collaboration with the DoD agencies to integrate our technology and proven capabilities within the military’s demanding worldwide infrastructure and systems.”

Application isolation provides a crucial line of defense in the new security stack. Bromium securely isolates applications in a virtual environment that allows users to click on links or download files without the risk of compromise and protects against both known and unknown attacks including zero-day attacks, polymorphic malware, spear-phishing, and unpatched Windows machines. Bromium also significantly reduces false positives, and SOC teams are only alerted to real threats. Triage time is drastically reduced because the full kill chain is provided with every attempted attack.

Defense agencies and contractors can download DISA’s overview memo and STIG for Bromium at: https://iase.disa.mil/stigs/Pages/index.aspx.

About Bromium, Inc.

Bromium protects your brand, data and people using virtualization-based security. We convert an enterprise’s largest liability—endpoints and servers—into its best defense. By combining our patented hardware-enforced containerization to deliver application isolation and control, with a distributed Sensor Network to protect across all major threat vectors and attack types, we stop malware in its tracks. Unlike traditional security technologies, Bromium automatically isolates threats and adapts to new attacks using behavioral analysis and instantly shares threat intelligence to eliminate the impact of malware. Bromium offers defense-grade security solutions and counts a rapidly growing set of Fortune 500 companies and government agencies as customers.

For more information or interviews, please contact:

Sage Communications
fedbromium@aboutsage.com
+1 925-246-3433

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.
Share
Tweet
Share