Seamlessly Isolate Risky Clicks with Bromium Secure Platform 4.1 [Demo Video]

2018-08-13T16:11:45+00:00July 9th, 2018|Innovation|

Most breaches start with the user performing a risky click Windows 10 and modern browsers are more secure, but still susceptible to risky clicks Bromium’s virtualization-based security seamlessly isolates risky clicks inside unbreakable virtual machines Let’s face it, Internet Explorer, along with its plugins such as Flash, Java, and Silverlight, cannot be used to safely [...]

Why Cyber Defense Fails at Enterprise Scale and What You Can Do About It

2018-02-15T06:00:04+00:00February 15th, 2018|Company News|

Anti-malware solutions often fail to prevent cyber attacks on end-user applications at an enterprise level. Most endpoint detection platforms are reactive and time-sensitive, so enterprises do more damage control than preventing risk. Isolation and micro-virtualization of endpoints proactively minimizes the attack surface to dramatically reduce breaches and false alerts. You’ve heard the saying, “the best [...]

Hackers Keep it Simple: Malware Evades Detection by Simply Copying a File

2018-02-13T10:45:09+00:00February 13th, 2018|Threats|

New malware technique evades detection by simply copying a file We break it down step-by-step to show you how it works Innovative hackers continue to deliver sophisticated malware that evades detection The Bromium Lab is back to break down a recent outbreak of sneaky malware, shared with us by some of our customers who caught [...]

Seasons Greetings? Not When That’s Malware In Your e-Card

2018-01-29T05:45:39+00:00January 29th, 2018|Threats|

Over Christmas, one of our customers was hit by a Trojan and they asked us to take a look at the threat. Sixteen of their users were fooled into opening a Word document. Fortunately, they had Bromium, so it safely ran inside a micro-VM and was unable to affect their host or their intranet. Seasons [...]

Process Doppelgänging Can’t be Detected, but Isolation Will Keep You Protected

2017-12-20T16:04:44+00:00December 20th, 2017|Threats|

Process Doppelgänging is a new code injection technique that bypasses most security tools and works on all Windows versions. Relying on detect-to-protect security solutions will leave you vulnerable to Process Doppelgänging. Bromium executes untrusted tasks in a hardware-isolated virtual machine, so you are always protected, even from zero-days and new, undetectable technique. What is Process [...]

Get the Report: CISO Recommendations for Endpoint Security by Security Current

2017-12-19T07:45:33+00:00December 19th, 2017|Company News|

New Security Current report compiles advice and recommendations for endpoint security solutions from 13 CISOs across a variety of industries Hear why CISOs recommend application isolation for endpoint security protection See the value of application isolation provided via virtualization-based security when compared to traditional endpoint security approaches Download the report: CISOs Investigate: Endpoint Security Cloud. Mobile. [...]

Protecting Legacy Applications from Attacks with Modern Hardware Isolation

2017-09-11T05:34:08+00:00September 11th, 2017|Company News|

Legacy applications are integral to most businesses and are heavily relied upon in the public sector Many legacy applications were written in a time when security was much less of a concern than today Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes Detection is obsolete and the future of [...]

Disposable Computing is the Essence of Bromium’s Micro-Virtualization

2017-06-21T04:51:04+00:00June 21st, 2017|Innovation|

We live in a disposable society, from our ever-present convenience foods in throw-away packaging to online speed-dating tailor-made for today’s low attention-span, instant gratification, swipe-left culture. Why be stuck with the same cruddy old PC filled up with accumulated digital gunk day after day, when you can have a squeaky-clean brand new computer each and [...]

Disposable Computing is the Answer to Cyber Security for Business

2017-06-20T12:12:48+00:00June 20th, 2017|Innovation|

Disposability has become a regular thing in our lives; but you may have taken for granted the value it brings. Cost, convenience and risk are the cornerstones of successful disposability. Disposable computing offers a solution to cyber security and provides you with valuable threat information. This is the first in our two-part series on disposable computing [...]

Microsoft Office Malware Captured in a Micro-VM on an Unpatched Computer

2017-04-17T08:03:13+00:00April 17th, 2017|Breaking News, Government, Threats|

The Bromium Labs team was able to get their hands on some live malware exploiting the Microsoft office vulnerability. First and foremost, on an unpatched workstation Bromium did its job by hardware isolating the Microsoft Word document into a protected virtual machine so that the host workstation was never infected. Secondly, it shows the amazing analytics [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close