Report Resources

2019 SANS Vulnerability Management Survey

2019-04-09T09:50:33+00:00April 9th, 2019|

Vulnerability management programs must continue to evolve to match rapidly changing technology environments. In this report, SANS experts examine the results of a 2019 survey to assess organizations’ vulnerability management practices. The report, sponsored by Bromium, also offers practical advice to help teams prioritize their efforts and align security programs with organizational goals.

Report: Social Media Platforms and the Cybercrime Economy

2019-02-26T09:29:11+00:00February 26th, 2019|

This report is the second chapter of ‘Into the Web of Profit’ and examines the role of social media platforms in the cybercrime economy. It details the strategies and techniques employed by cybercriminals to exploit user trust and enable rapid malware infection across social media. Learn how social media platforms provide backdoor access to enterprise [...]

voke Impact Note: A Focus on Bromium Protected App

2018-10-24T16:04:04+00:00October 24th, 2018|

An Impact Note from an industry research firm voke Inc. urges enterprises and government agencies to change their mindset about cyber security by assuming that everything is hostile – the endpoints and the corporate network. Yet, you can still access applications that drive your business activities and host your sensitive data and IP – by [...]

IDC PERSPECTIVE: Validating the Known: A Different Approach to Cybersecurity

2018-10-12T14:48:53+00:00August 23rd, 2018|

In this report, leading IT market advisory firm, IDC, looks at alternatives to detect-to-protect security, including application isolation. · Learn why detection alone can no longer protect your IT systems against cyber criminals · See how “validating the known” can help you secure your corporate assets · Review innovative solutions to end the game of [...]

Voke Impact Note: A Focus on Bromium

2018-07-24T08:36:06+00:00July 24th, 2018|

The market is flush with security detection products that alert you when a breach has occurred to try and stop the threats or quarantine potential risks. Organizations struggle to keep up with patches to prevent known security issues. However, hackers always seem to be one step ahead, and they only have to be right once [...]

Into The Web of Profit

2018-05-31T13:58:12+00:00May 31st, 2018|

“Into the Web of Profit”, a landmark study about the cybercrime economy, looks deep into how cybercrime grows using stolen assets and stolen access. The author of this research, Dr. Mike McGuire, has spoken with experts around the world to explain what happens after the ransom is paid or intellectual property is stolen. The research [...]

The CISO’s Dilemma: Security vs. Productivity

2018-04-11T09:03:29+00:00March 22nd, 2018|

The CISO’s Dilemma: Security vs. Productivity. How far should you go to protect your organization? Download this report to learn how 500+ CISOs tackle this dilemma. Key findings include: 88% of enterprises prohibit users from accessing websites and applications due to security concerns; with 94% investing in web proxy services to restrict what users can [...]

CISOs Investigate: Endpoint Security

2018-04-11T09:04:22+00:00March 22nd, 2018|

In this new report, more than a dozen leading security experts and CISOs share their opinions on endpoint protection solutions, including application isolation and control. Download this report to learn: • Practical advice on introducing security solutions to your organization • How to gain executive support for enhancing your security stack • Approaches to calculating [...]

How Many Millions? The Hidden Costs of Detect-to-Protect

2018-04-10T16:31:18+00:00March 22nd, 2018|

When you invest in detection-based security tools, you budget for the known costs, such as purchase price and licensing fees. • Our research uncovers the surging hidden costs of reactive, detection-based security: • $16,714,186 - the annual cost to maintain detect-to-protect endpoint security for a 2,000-person organization • Organizations invest $345,300 per year on detection-based [...]

See Bromium in Action

Request a demo and see how Bromium isolation will put an end to malware and attacks once and for all.

Request a Demo

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.