You are here

Endpoint Protection and Endpoint Security Webinars

Making Ransomware Irrelevant New

Michael Charland, security officer at Masonicare, discusses how top security professionals are dealing with the rise of advanced cyber attacks and how he transformed his security to prevent breaches.

Learn about:

  • Security trends in today’s market
  • Why crypto-ransomware is one of the biggest security threats
  • Why many “next-gen” approaches are flawed
  • Why Masonicare decided on CPU-enforced isolation to secure their endpoints
  • How Bromium defeats crypto-ransomware, making it totally irrelevant

Protecting the Endpoint Using CPU-enforced Security

Paul Hershberger, head of security at The Mosaic Company, shares his thoughts on the effectiveness of traditional security technologies and why Bromium’s next-generation security platform was deployed to protect against advanced cyber attacks.


  • What the top priorities and concerns of CISOs are
  • Why traditional security is ineffective against modern zero-day and targeted attacks
  • How Mosaic decided on CPU-enforced security to ensure security at the endpoints
  • How to consistently make ransomware a non-issue

Protecting Government Agencies From Advanced Cyber Attacks

Government agencies are under siege as a top attack target for cybercriminals. Despite the enormous efforts employed by the U.S. government with legacy detection-based tools, organizations are easily compromised. Simon Crosby, the co-founder and CTO of Bromium, and Robert Bigman, the former CISO of the CIA, discuss how to protect your agency against the changing threat landscape.


  • How advanced malware and zero-days are evading traditional government defenses
  • What you can do to shrink the #1 attack surface and eliminate endpoint breaches
  • How to move from a costly and time-consuming reactive approach to a preventative approach

A Conversation with Roland Cloutier, CSO of ADP

Roland Cloutier, the CSO of ADP and one of the “Most Influential People in Security” according to Security Magazine, discusses the top CISO priorities and concerns and his decision to deploy Bromium to prevent data breaches at ADP. 

In this Q&A discussion, Mr. Cloutier shares his perspective on:

  • Top priorities for CISOs
  • Top concerns that keep CISOs up at night
  • How to protect your enterprise from advanced cyber attacks in a mobile and cloud era
  • Where to put your next security dollar
  • How ADP moved to a protect-first approach to security using micro-virtualization
  • How ADP deployed Bromium at mass scale to prevent breaches rather than react to them

Keep Calm and Avoid the IE Upgrade Panic

As of January 2016, Microsoft will end support, including security updates, for versions of Internet Explorer (IE) other than IE11. Meeting the deadline for upgrading will be a logistical challenge for many enterprises with critical web applications that require earlier versions of IE, which will become an open door to security risk. Manish Kalia, the SVP of product management at Bromium, and Fareed Bukhari, Bromium product marketing, examine the implications of Microsoft's decision.


  • What legacy IE users can do to prevent attackers from bypassing existing defenses
  • How micro-virtualization can protect unsupported browsers from being compromised
  • How you can protect your organization from attacks targeting unprotected software

The Future of AV

Bill Gardner, a senior director of products at Bromium, examines the future of AV technology and discusses what can be done to prevent breaches today. Bromium's unique approach to endpoint security through isolation delivers both protection and visibility against the latest attacks and enables organizations of all types to avoid becoming the latest in a growing list of data breach statistics. 

This webinar examines the following topics:

  • Do you still need AV?
  • What is the best path forward for AV?
  • What you can do today to protect against file based malware and prevent breaches?

How Malware Is Evading Your Current Defenses

Bromium’s unique approach to endpoint security through isolation delivers both protection against and visibility into the latest attacks, enabling organizations from joining a growing list of data breach statistics.

Bill Gartner, a senior director of products at Bromium, examines these attacks and explores the following questions:

  • How are attackers bypassing your existing defenses?
  • What techniques are being used most often?
  • How can you protect your organization against these new forms of attack?

Bromium and Microsoft: The World’s Most Secure PC

On July 20, 2015, Bromium announced a strategic partnership with Microsoft. Microsoft is endorsing Bromium micro-virtualization as a powerful tool to protect endpoints, and is aligning with Bromium in adopting a security architecture based on isolating critical information on the endpoint in Windows 10.  The combination of Bromium and Windows 10 results in the most secure PC available today. This on-demand webinar features Simon Crosby, the co-founder and CTO of Bromium, and Chris Hallum, a senior product manager at Microsoft.

Learn how:

  • Microsoft and Bromium deliver the industry's most secure endpoint
  • Windows 10 will raise the bar on security and deliver the most secure version of Windows ever
  • Bromium secures existing and future Windows systems and delivers unmatched threat intelligence

Living in the Bull's-Eye

It’s a dangerous time for everyone, but those responsible for securing financial services and other highly targeted enterprises are in the bull's-eye. Bromium and Ken Pfeil,  the CISO of Pioneer Investments,  discuss the challenges and opportunities of securing a leading global financial services company from cyber-attacks.


  • How a leading enterprise is preventing breaches
  • How to get actionable and accurate threat intelligence versus a flurry of false alerts
  • How to dramatically reduce the churn in your organization that typically comes from urgent patching and never-ending remediation

Changing the Economics of Security

Simon Crosby, the co-founder and CTO of Bromium, explores how to change the economic equation of enterprise security while minimizing risk in the new information economy.


  • How to embrace and profit from new computing trends while minimizing risk
  • How to transform the security organization into a strategic corporate resource
  • How to maximize the return on your organization's security investment