VIRTUALIZATION-BASED SECURITY LEADER BROMIUM PUBLISHES NIST-MODELED SECURITY CONFIGURATION CHECKLIST

Press Releases / VIRTUALIZATION-BASED SECURITY LEADER BROMIUM PUBLISHES NIST-MODELED SECURITY CONFIGURATION CHECKLIST

VIRTUALIZATION-BASED SECURITY LEADER BROMIUM PUBLISHES NIST-MODELED SECURITY CONFIGURATION CHECKLIST

Pioneer in application isolation releases NIST-standard configuration guide to fortify systems used by DoD, civilian and state governments

May 15, 2018 –

Bromium®, Inc., the leader in application isolation using virtualization-based security, has released a Secure Configuration Checklist for its customers, in compliance with the National Checklist Program (NCP) set forth by the National Institute of Standards and Technology (NIST) in an effort to further bolster the security of federal operating systems and better protect end users.

The NCP is the U.S. government repository of publicly available security benchmarks that provide detailed, low-level guidance on setting the security configurations of operating systems and applications. The creation of the Bromium Secure Configuration Checklist comes on the heels of recent warnings from Pentagon officials including Deputy Defense Secretary Patrick Shanahan that CEOs must either secure their networks or risk losing government contracts.

“Both our civilian and defense customers are moving away from detection-based solutions that require a patient-zero to identify a threat,” explained Robert Wiggenhorn, Sr. Director of Professional Services at Bromium. “Today’s best practice is to use hardware-enforced virtualization to isolate and contain the threat so it doesn’t get to the endpoint or the network. This drastically reduces the threat surface and stops polymorphic, nation-state and zero-day threats.”

As more agencies choose application isolation and containment – as outlined by the NSA – to get true protection against targeted and ransomware attacks, Bromium has created a security configuration checklist with step-by-step instructions on how to confidently configure Bromium Secure Platform to customers’ operational environments in compliance with NIST.

“A security configuration checklist – also called a lockdown, hardening guide, or benchmark – is a series of instructions or procedures for configuring an IT product to a particular operational environment, for verifying that the product has been configured properly, and/or for identifying unauthorized changes to the product”, said Murugiah Souppaya, Computer Scientist at NIST.

“Using checklists that emphasize both hardening of systems against software flaws by applying patches and eliminating unnecessary functionality, for example, and configuring systems securely will typically reduce the number of ways in which the systems can be attacked, resulting in greater levels of product security and protection from future threats.”

The Bromium Secure Platform provides endpoint malware protection by creating hardware-isolated micro-VMs that secure every user task, from surfing the web to opening emails and downloading attachments. Tasks are separated from each other and the rest of the system inside the micro-VMs to keep threats contained. When a task is closed, the task micro-VM and any threat it contained, is disposed of without any breach. Through isolation, Bromium safeguards systems against spear phishing attacks, ransomware, kernel and zero-day exploits, and APTs, and is then able to run Breachless Threat Reports™ with forensics on these threats for real-time responses and preventative action.

Get the checklist from NIST: https://nvd.nist.gov/ncp/checklist/825
Learn more on the Bromium blog: https://blogs.bromium.com/nist/

ABOUT BROMIUM, INC.
Bromium protects your brand, data and people using virtualization-based security via application isolation. We convert an enterprise’s largest liability – endpoints – into its best defense. By combining our patented hardware-enforced containerization to deliver application isolation and control, with a distributed Sensor Network to protect across all major threat vectors and attack types, we stop malware in its tracks. Unlike traditional security technologies, Bromium automatically isolates threats and adapts to new attacks using behavioral analysis and instantly shares threat intelligence to eliminate the impact of malware. Bromium offers defense-grade security and counts a rapidly growing set of Fortune 500 companies and government agencies as customers.

Visit Bromium: https://www.bromium.com
Follow Bromium on Twitter: https://twitter.com/bromium
Follow Bromium on LinkedIn: https://www.linkedin.com/company/bromium

Media Contacts

Sage Communications fedbromium@aboutsage.com +1 925-246-3433

 

Sage Communications
fedbromium@aboutsage.com
+1 925-246-3433

 
 
2018-05-15T16:05:55+00:00May 15th, 2018|

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.
Share
Tweet
Share

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close