Get the Report: CISO Recommendations for Endpoint Security by Security Current

2017-12-19T07:45:33+00:00December 19th, 2017|Company News|

New Security Current report compiles advice and recommendations for endpoint security solutions from 13 CISOs across a variety of industries Hear why CISOs recommend application isolation for endpoint security protection See the value of application isolation provided via virtualization-based security when compared to traditional endpoint security approaches Download the report: CISOs Investigate: Endpoint Security Cloud. Mobile. [...]

Watch: A Fresh Approach to Perimeter Protection: Application Isolation Webinar

2017-11-07T06:00:17+00:00November 7th, 2017|Company News|

Detection-based IT security solutions have never worked, and will never work. More security layers is not the answer, but smarter layers can work. Shift your mindset from “prevent, detect, and respond” to “isolate, contain, and control.” Layer after layer of security is not stopping breaches. We can’t keep the bad guys out. Oddly enough, 80+ years [...]

A Cybersecurity Proof: The Application is the Endpoint

2017-10-16T09:25:16+00:00October 16th, 2017|Threats|

Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes It’s time to rethink information security defense around fewer, smarter, yet more effective layers You have many more endpoints than you think. How many endpoints do [...]

Bromium, the Stuff Super Heroes Use

2017-04-12T08:00:01+00:00April 12th, 2017|End Users|

For any of you who were at one time in your youth a Super Hero, technology today might be a little reminiscent of that time. Unlike those childhood games, however, this is no game at all. In the world of technology the enemy engages us with weapons like phishing and malware. What is this new super-powered [...]

Why Bromium Is Not Just Protection, But Also An Enhanced Predictive Analytics Solution

2017-04-10T08:00:10+00:00April 10th, 2017|Innovation|

Zero-day attacks exploit vulnerabilities or security holes in software. In the event of a malicious attack on any microVM, malware payloads cannot infiltrate the enterprise network. LAVA provides highly specific details about every malicious breach, identifying external IP addresses, memory exploits, a list of affected files, and covert attempts to connect to external command-and-control systems. [...]

Malware’s Newest Disguise: The Humble Resume

2017-03-08T06:00:53+00:00March 8th, 2017|Threats|

Ransomware use goes back to the 1980s when developers and programmers, afraid that they would not be paid, sometimes inserted “time bombs” into the code. Ransomware plays a role in the insidious new trend where cybercriminals are targeting healthcare organizations through the use of an unsuspecting accomplice. What started with 256-bit encryption has now reached 2048-bit. To decrypt this, [...]

The OPM Breach and Why You Should Fire Your Cyber Janitor

2017-02-28T14:36:49+00:00February 28th, 2017|Government|

In June of 2015 the United States Office of Personnel Management (OPM) announced they had been the target of what became one of the largest breaches of government data in history. When the dust settled, it was determined that over 20 million people were affected. The data stolen from individuals was Social Security numbers, names, [...]

See Bromium in Action

Request a demo and see how Bromium isolation will put an end to malware and attacks once and for all.

Request a Demo

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.