Virtualization-Based Cybersecurity Solution Protects Common Attack Vectors Targeting End Users

February 1, 2018 –

Bromium®, Inc., the pioneer and leader in virtualization-based enterprise security that stops advanced malware attacks, today announced it now supports Citrix XenServer 7.3 nested virtualization with superior performance. Citrix XenServer is an open source platform for cost-effective application, desktop, cloud, and server virtual infrastructures. When Bromium is used for cybersecurity, any supported application or task is completely isolated inside a micro virtual-machine (micro-VM) so that any malicious behavior is contained and cannot impact the host or VDI environment. Adding application isolation as a security layer is the smartest way to allow employees to get back to work while containing malware.

“As the most integrated hypervisor with world’s leading VDI and application delivery product, XenDesktop, Citrix XenServer gives our customers an enterprise hypervisor platform for hosting their virtual desktop workloads on-premises,” says David Cottingham, Director of XenServer Product Management & Partner Engineering at Citrix. “With today’s ever-increasing sophistication of threats, additional layers of protection are more important than ever. Bromium Secure Platform gives our customers a unique solution for protecting their virtual desktop infrastructure in new ways to safeguard against ransomware – combating sophisticated threats with sophisticated protection.”

“Citrix and virtualization are part of our DNA,” explains Gregory Webb, CEO at Bromium. “Our founders created XenSource, which was acquired by Citrix, and they went on to create new ways for virtualization to improve business by focusing on applying the strengths of virtualization to security.” Ian Pratt, the current President and Head Engineer at Bromium, was one of the original creators of XenSource. The technology was later acquired by Citrix] “Ian is committed to helping Western democracies put an end to cybercrime,” said Webb.

“Our customers count on application isolation to protect one of their biggest threat vectors – end users – who are targeted by cybercriminals who know that humans make mistakes,” said Gavin Hill, VP of Products and Strategy for Bromium. “Email attachments, phishing links, and malicious downloads are very easy ways to target employees to get to the network and steal or encrypt intellectual property, customer data, and more. We put each of those activities in a container so malware can’t escape. End users are protected and can click with confidence.”

Every endpoint protected by Bromium becomes part of the Sensor Network that collects, shares, and learns about new attack vectors and compromise indicators as they happen. Application isolation and control is a critical part of the 2018 security stacks because it works as the last line of defense to protect against common attacks that continue to slip by layered
defenses. “And we actually improve performance. Testing conducted in a VDI environment shows that Bromium protected systems use 35 percent less CPU than non-Bromium systems and also 10 percent less IOPS,” Hill explains.

Bromium protects your brand, data and people using virtualization-based security via application isolation. We convert an enterprise’s largest liability – endpoints – into its best defense. By combining our patented hardware-enforced containerization to deliver application isolation and control, with a distributed Sensor Network to protect across all major threat vectors and attack types, we stop malware in its tracks. Unlike traditional security technologies, Bromium automatically isolates threats and adapts to new attacks using behavioral analysis and instantly shares threat intelligence to eliminate the impact of malware. Bromium offers defense-grade security and counts a rapidly growing set of Fortune 500 companies and government agencies as customers.

Visit Bromium:
Follow Bromium on Twitter:
Follow Bromium on LinkedIn:

Media Contacts
2018-02-01T16:24:25+00:00February 1st, 2018|

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.