Video Resources

Bromium Advanced Endpoint Security

2018-04-12T12:16:04+00:00 March 22nd, 2018|

Bromium co-founder Simon Crosby describes why detection fails and how Bromium provides enterprise-grade security through application isolation.

Protecting the host from malicious downloads

2018-04-12T12:18:17+00:00 March 22nd, 2018|

End-users have become a primary target for attacks using malicious links and attachments. In this example, we show you how the attacker is attempting to breach security by sending the employee an email containing a link for downloading a file. Bromium marks the downloaded file as coming from an external source and opens it inside [...]

How Bromium virtualization provides protection from Meltdown and Spectre

2018-04-12T12:23:10+00:00 March 22nd, 2018|

Micro-virtualization can help mitigate the effects of Meltdown and Spectre attacks. Bromium’s co-founder Ian Pratt explains what happens when a Bromium-protected PC gets compromised and how application isolation helps stop attackers from stealing any valuable information from the host.

Application isolation protects users from malicious phishing links

2018-04-11T08:55:27+00:00 March 22nd, 2018|

Phishing attacks are delivered as links in your emails, chat, or files to penetrate your layered defenses. These types of attacks are ideal for cyber criminals to steal personal or corporate information and build a back door for future attacks. Bromium isolates each browser tab in its own micro virtual machine. Not only does Bromium [...]

Application isolation stops malicious email attachments

2018-03-26T19:41:32+00:00 March 22nd, 2018|

Malicious email attachments are sent to employees every day, seeking to expose intellectual property and customer-sensitive information. Even the most benign email can open the door for a cyber criminal. Bromium isolates email attachments from Outlook or webmail without changing the users’ workflow. Bromium application isolation puts potentially malicious email attachments in hardware-enforced containers.

Bromium forensic demo

2018-04-11T08:56:21+00:00 March 22nd, 2018|

A quick look at the threat analysis performed by Bromium to help understand the nature of the attack and prevent it from happening in the future

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close