Data Talks: Bromium Analyzes Live Running Malware from a Unique Threat Vantage Point

2018-08-01T19:12:37+00:00 August 2nd, 2018|Threats|

Bromium Threat Labs debuts a new multi-part blog series called Data Talks The series features highlights of “live capture” threat research using aggregated data voluntarily reported by Bromium customers Look for deep-dives, trends, and predictions to guide you when you know that detection isn’t enough to keep you safe Today we’re kicking off a new [...]

Protection First Strategy: Application Isolation as the Last Line of Defense

2018-07-24T09:13:17+00:00 July 24th, 2018|Threats|

Endpoint security is a top priority for enterprise organizations and government agencies, but despite gains in detection-based tools, cybercriminals continue to find ways to bypass layered defenses Relying on detection-based solutions alone will not protect your systems and infrastructure from attacks New approaches, such as virtualization, can provide the desperately needed last line of defense [...]

Malware & Fileless Malware: How It’s Created, How It Spreads, and What To Do About It [On-Demand Webinar]

2018-07-20T17:47:52+00:00 July 19th, 2018|Threats|

In this Dark Reading webinar, experts in cybersecurity share their views on what’s going on with malware, and how it evolves to outsmart even your most elaborate defenses Hear about the growing proliferation of “fileless malware” — malware that uses trusted programs in sinister ways, instead of delivering the usual malicious payloads — and find [...]

Five Reasons Why Marketing Needs to Care About Cybersecurity

2018-02-20T06:04:50+00:00 February 20th, 2018|End Users|

Marketing moves fast and worrying about cybersecurity is often the least of our worries. Cybercriminals understand we're working fast and target our computers because we are likely to do what comes naturally: click, download, forward, open. Alas, organizational security teams struggle to keep us safe and often put limits on our ability to get stuff [...]

Hackers Keep it Simple: Malware Evades Detection by Simply Copying a File

2018-02-13T10:45:09+00:00 February 13th, 2018|Threats|

New malware technique evades detection by simply copying a file We break it down step-by-step to show you how it works Innovative hackers continue to deliver sophisticated malware that evades detection The Bromium Lab is back to break down a recent outbreak of sneaky malware, shared with us by some of our customers who caught [...]

We Have Answers: Questions from 2018 Cybersecurity Core Capabilities Webinar

2018-02-01T10:00:39+00:00 February 1st, 2018|Government, Innovation|

Nicolas Chaillan, cybersecurity architect who worked for Homeland Security in the United States provided guidelines for your 2018 cybersercurity strategy. It is based on what he built for Cyber.gov - a strategy that takes the best of the best and delivers results based on the level of security you need. His recommendations work for both [...]

Bromium Now Provides Application Isolation for Citrix XenServer 7.3

2018-01-24T06:01:24+00:00 January 24th, 2018|Company News|

Bromium now supports Citrix XenServer 7.3 nested virtualization with superior performance. Use application isolation to stop common attack vectors that layered defenses miss. Real-time, high-fidelity alerts trigger the Bromium Sensor Network to provide extended protection. XenServer is an open source platform for cost-effective application, desktop, cloud, and server virtual infrastructures. When Bromium is used for [...]

Come See Bromium at AFCEA West 2018 in San Diego in February

2018-01-23T12:34:24+00:00 January 23rd, 2018|Government|

Our public sector team will be at the show looking forward to meeting you. Set up a meeting now by simply contacting us. We can show you how application isolation works. AFCEA West 2018 is in San Diego this year starting February 6th. Our guys will be there. We'll have demos, be able to talk [...]

Bromium Honored for Excellence in Government Cybersecurity

2018-01-09T14:21:37+00:00 January 9th, 2018|Company News, Government|

We have a successful track record protecting federal government customers from known and unknown attacks Leading government security awards program recognizes Bromium’s continued commitment to the public sector Bromium provides defense-grade protection, allowing government employees to work as usual On January 8th, we received exciting news that we won two Government Security News Homeland Security [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close