BROMIUM SECURE PLATFORM
The Bromium Secure Platform stops attacks and protects your endpoints using virtualization-based security. Every time a user opens a web page, downloads a file, or clicks on an email link, Bromium creates a micro-virtual machine, isolating each task and any malware it may contain. When the task is closed, the micro-VM is terminated, and any potential threats are destroyed.
CONTAIN THREATS WITH HARDWARE-ENFORCED ISOLATION
- Safely access files from any inbound source — Open any file or document without risk of infection, whether downloaded from the web, received in email, or saved via portable USB drives
- Harden your entire defensive infrastructure — Use Bromium indicators of attack and indicators of compromise to quarantine files and search for malware lurking on servers and non-Bromium devices
- Stop malware — Micro-VMs isolate and contain malicious activity, while malware is destroyed when the file or document closes, no remediation needed
The Bromium Secure Platform contains three key components:
Bromium Secure Browsing, Bromium Secure Files, and Bromium Secure Monitoring
SECURE, USER-CENTRIC WEB BROWSING
Bromium Secure Browsing – Stops browser exploits with isolated browsing using the Bromium Secure Browser, Internet Explorer, or Firefox. Each browser tab runs in its own secure container, completely isolating web threats from the host so that they have no place to go. When the browser tab is closed, the threat is terminated along with the micro-VM. Run native Chrome on the host for low-risk browsing and isolate the web file downloads with Bromium Secure Files.
SECURE INBOUND FILE DOWNLOADS AND ACCESS
Bromium Secure Files – Hardware-isolates Microsoft Office documents, PDFs, and other files from the host operating system and the internal network. If a malicious document is saved via an ingress application, such as Skype or email, or even using a USB drive, it is hardware-isolated in a micro-VM every time it is opened.
COMPREHENSIVE MONITORING AND ANALYSIS
Bromium Secure Monitoring – Delivers real-time alerts with complete forensic intelligence for each attack, including a full kill-chain analysis. Bromium Secure Monitoring correlates thousands of low-level monitoring events in real time, transforming raw data into higher-level intelligence, helping security teams maintain awareness of the overall threat posture at all times.
BROMIUM APPLICATION ISOLATION OFFERS CLEAR BENEFITS
STOP RELYING ON DETECTION
Bromium stops polymorphic, nation-state, and zero-day threats – because we aren’t signature-based, we stop attacks that others are powerless against.
ENDPOINTS DON’T GET OWNED
You no longer need to spend money and resources chasing false-positive alerts and on remediation, rebuilds, or emergency patching.
Bromium hardware-enforced security sits below the kernel at the CPU level, dramatically reducing your attack surface.
TAKE DEFENSIVE ACTION
Risky activity is isolated inside hardware-enforced containers. You can gather information about the attackers’ behavior without risk of a breach.
REAL-TIME THREAT INTELLIGENCE
Harden your defenses with real-time threat intelligence. High-fidelity Breachless Threat Alerts™ are immediately shared with the security team and other endpoints.