Bromium Secure Platform 2018-07-25T13:48:49+00:00

BROMIUM SECURE PLATFORM

The Bromium Secure Platform stops attacks and protects your endpoints using virtualization-based security. Every time a user opens a web page, downloads a file, or clicks on an email link, Bromium creates a micro-virtual machine, isolating each task and any malware it may contain. When the task is closed, the micro-VM is terminated, and any potential threats are destroyed.

CONTAIN THREATS WITH HARDWARE-ENFORCED ISOLATION

  • Safely access files from any inbound source — Open any file or document without risk of infection, whether downloaded from the web, received in email, or saved via portable USB drives
  • Harden your entire defensive infrastructure — Use Bromium indicators of attack and indicators of compromise to quarantine files and search for malware lurking on servers and non-Bromium devices
  • Stop malware — Micro-VMs isolate and contain malicious activity, while malware is destroyed when the file or document closes, no remediation needed

The Bromium Secure Platform contains three key components:

Bromium Secure Browsing, Bromium Secure Files, and Bromium Secure Monitoring

SECURE, USER-CENTRIC WEB BROWSING

Bromium Secure Browsing – Stops browser exploits with isolated browsing using the Bromium Secure Browser, Internet Explorer, or Firefox. Each browser tab runs in its own secure container, completely isolating web threats from the host so that they have no place to go. When the browser tab is closed, the threat is terminated along with the micro-VM. Run native Chrome on the host for low-risk browsing and isolate the web file downloads with Bromium Secure Files.

SECURE INBOUND FILE DOWNLOADS AND ACCESS

Bromium Secure Files – Hardware-isolates Microsoft Office documents, PDFs, and other files from the host operating system and the internal network. If a malicious document is saved via an ingress application, such as Skype or email, or even using a USB drive, it is hardware-isolated in a micro-VM every time it is opened.

COMPREHENSIVE MONITORING AND ANALYSIS

Bromium Secure Monitoring – Delivers real-time alerts with complete forensic intelligence for each attack, including a full kill-chain analysis. Bromium Secure Monitoring correlates thousands of low-level monitoring events in real time, transforming raw data into higher-level intelligence, helping security teams maintain awareness of the overall threat posture at all times.

BROMIUM APPLICATION ISOLATION OFFERS CLEAR BENEFITS

STOP RELYING ON DETECTION

Bromium stops polymorphic, nation-state, and zero-day threats – because we aren’t signature-based, we stop attacks that others are powerless against.

ENDPOINTS DON’T GET OWNED

You no longer need to spend money and resources chasing false-positive alerts and on remediation, rebuilds, or emergency patching.

HARDWARE-ENFORCED SECURITY

Bromium hardware-enforced security sits below the kernel at the CPU level, dramatically reducing your attack surface.

ALLOW MALWARE TO FULLY EXECUTE

Malware runs inside the micro-VM. Bromium collects the data, including full kill-chain analysis, and sends it directly to your SOC.

REAL-TIME THREAT INTELLIGENCE

Harden your defenses with real-time threat intelligence. High-fidelity Breachless Threat Alerts™ are immediately shared with the security team and other endpoints.

Bromium is a great product. I love the isolation and how it captures everything the malware is trying to do. This product is awesome and provides a great deal of protection.

System Administrator, State & Local Government

Learn More

Data Sheet
Bromium Secure Platform
Data Sheet
Bromium Secure Browsing
Data Sheet
Bromium Secure Monitoring
Video
What's New in Bromium Secure Platform, Version 4.1

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.
Share
Tweet
Share

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close