Bromium Threat Intelligence and Analysis

2019-05-14T19:42:38+00:00May 7th, 2019|

At Bromium, we encourage our customers to share their threat data. All data is reviewed and triaged by our analysts to provide your organization with actionable insights about recent threats and most notable techniques used by attackers. Find out more about how you can become a part of the threat sharing community to help improve [...]

Bromium Threat Insights Report: April 2019

2019-05-14T11:59:02+00:00May 6th, 2019|

Application isolation gives Bromium a unique advantage – the ability to observe malware as it detonates and learn its tactics. Bromium analysts compile their key observations and findings into the Threat Insights Report. The report highlights the most noteworthy threats and techniques used by attackers, talks about emerging trends in malware, and shares actionable recommendations [...]

2019 SANS Vulnerability Management Survey

2019-04-09T09:50:33+00:00April 9th, 2019|

Vulnerability management programs must continue to evolve to match rapidly changing technology environments. In this report, SANS experts examine the results of a 2019 survey to assess organizations’ vulnerability management practices. The report, sponsored by Bromium, also offers practical advice to help teams prioritize their efforts and align security programs with organizational goals.

Presenting the Findings from the “Social Media Platforms and the Cybercrime Economy” Research

2019-03-29T13:58:10+00:00March 29th, 2019|

Listen to Dr. Michael McGuire present the key findings of his landmark new study that examines the role of social media platforms in the cybercrime economy. Dr. McGuire’s research details the strategies and techniques employed by cybercriminals and highlights the range of criminal services being offered on social networks. This study is the next chapter [...]

Key Findings from the “Social Media Platforms and the Cybercrime Economy” Research

2019-03-27T17:05:33+00:00February 26th, 2019|

Social Media Platforms and the Cybercrime Economy is the second chapter of the “Into the Web of Profit” report. The in-depth, academic report examines the role of social media platforms in the cybercrime economy and details the strategies and techniques employed by cybercriminals to exploit user trust and enable rapid malware infection across social media. [...]

Report: Social Media Platforms and the Cybercrime Economy

2019-02-26T09:29:11+00:00February 26th, 2019|

This report is the second chapter of ‘Into the Web of Profit’ and examines the role of social media platforms in the cybercrime economy. It details the strategies and techniques employed by cybercriminals to exploit user trust and enable rapid malware infection across social media. Learn how social media platforms provide backdoor access to enterprise [...]

Fast and Secure: Bromium Solutions for Healthcare

2019-02-26T10:17:04+00:00February 25th, 2019|

When antivirus can’t cope with multi-layered medical imaging data fast enough, it causes backlog in patient processing, delays in care, and cost overruns. Bromium helps remove the “slow load” traffic jam by replacing conventional security with application isolation. Now images can load faster and with higher resolution, while endpoints remain protected against risky activities, like opening email attachments, downloading files, or browsing unknown [...]

Defining a Modern Endpoint Security Stack

2018-10-30T16:46:22+00:00October 30th, 2018|

The combination of containment (Application Isolation and Containment) and Endpoint Detection and Remediation (EDR) technologies provides the most comprehensive protection for the endpoint as well as High-Value Assets, along with the fastest breach response times. Two prominent enterprise security experts, Bromium and McAfee, have joined forces to deliver an integrated solution that approaches cyber threats [...]

voke Impact Note: A Focus on Bromium Protected App

2018-10-24T16:04:04+00:00October 24th, 2018|

An Impact Note from an industry research firm voke Inc. urges enterprises and government agencies to change their mindset about cyber security by assuming that everything is hostile – the endpoints and the corporate network. Yet, you can still access applications that drive your business activities and host your sensitive data and IP – by [...]

How Virtualization Protects Your High-Value Assets

2018-10-24T15:42:51+00:00October 24th, 2018|

On-demand webinar: Theresa Lanowitz, an industry analyst with voke, Inc. and the Bromium team discuss the importance of protecting your High Value Assets in an environment where security breaches are inevitable. Assume that endpoints are compromised and hostile and focus on securing what’s most important to your organization. Bromium Protected App isolates applications that have direct access [...]

See Bromium in Action

Request a demo and see how Bromium isolation will put an end to malware and attacks once and for all.

Request a Demo

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close