Application Isolation in the Spotlight

2019-03-21T15:32:21-07:00March 21st, 2019|End Users, Threats|

Two major announcements bring application isolation into the spotlight Microsoft and HP elevate the importance of isolation in the endpoint security stack Isolate risky browser activity, but don’t forget files are risky too This week, two major announcements came out highlighting the need for application isolation in the security stack for endpoint security – HP [...]

Bromium Secure Browsing Isolates Intelligently and Maximizes Browser Choice

2019-01-08T10:30:00-07:00January 8th, 2019|Innovation, Threats|

Web browsing is intensely personal, even at work. Users develop strong preferences, tend to lock in a browser early, and are fiercely loyal to their favored choice. Forcing them to change browsers—or even strongly suggesting it—is often met with resistance, and sometimes with outright subversion by installing and using unauthorized browsers. With the web so [...]

Magellan and the Security Pitfalls of Third-Party Code

2019-06-10T18:57:49-07:00December 22nd, 2018|Threats|

The Security Pitfalls of Third-Party Code As the web evolves, webpages are offering new powerful and interactive features Vulnerabilities in these features may allow remote attackers to run malware on your machine Bromium uses hardware-enforced isolation to protect against these attacks by design The recent Magellan vulnerability in SQLite allows attackers to exploit affected applications [...]

The HP EliteBook is Shipping – You Are Free to Safely Browse the Internet

2017-04-18T04:29:52-07:00April 18th, 2017|Company News, End Users|

As we announced in February, HP Sure Click begins shipping on the new HP EliteBook x360 starting today. This beauty not only has a secure BIOS but also offers secure browsing - security built-in, not bolted-on. With this launch, virtualization-based security goes completely mainstream, direct to the prosumer. We are so pleased to share the news [...]

See Bromium in Action

Request a demo and see how Bromium isolation will put an end to malware and attacks once and for all.

Request a Demo

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.