Seamlessly Isolate Risky Clicks with Bromium Secure Platform 4.1 [Demo Video]

2018-08-13T16:11:45+00:00July 9th, 2018|Innovation|

Most breaches start with the user performing a risky click Windows 10 and modern browsers are more secure, but still susceptible to risky clicks Bromium’s virtualization-based security seamlessly isolates risky clicks inside unbreakable virtual machines Let’s face it, Internet Explorer, along with its plugins such as Flash, Java, and Silverlight, cannot be used to safely [...]

Bromium Secure Platform 4.1 Streamlines Virtualization-based Security

2018-07-20T17:47:57+00:00July 2nd, 2018|Innovation|

Prioritize security around common customer pain points with targeted use case deployment Run native Chrome on the host for low-risk browsing while safely isolating web file downloads Transform raw data into actionable security insights with interactive dashboards and reports Virtualization-based security has changed the way organizations approach the idea of protecting their intellectual property from [...]

Research Uncovers the Hidden Costs of Detection-based Cybersecurity [Infographic]

2018-02-06T04:01:03+00:00February 6th, 2018|Company News|

Our new research conducted by Vanson Bourne finds detect-to-protect security costs organizations more than $16 million per year. This is despite the fact that detection-based cybersecurity is failing to keep up with increasingly sophisticated malware. The infographic below explains the only effective way to reduce threats is to render them harmless with virtualization-based application isolation. [...]

How to Use Bromium Application Isolation to Secure Microsoft Edge Downloads

2018-02-05T07:40:16+00:00February 5th, 2018|Innovation|

Microsoft Edge browser does not isolate web file downloads Learn how to use Bromium to isolate your Microsoft Edge web file downloads Bromium works with all Microsoft virtualization-based security (VBS) technologies Microsoft jumps on the application isolation bandwagon. In December 2017, Bromium welcomed the arrival of the Windows Defender Application Guard (WDAG) for Microsoft Edge, [...]

Get the Report: CISO Recommendations for Endpoint Security by Security Current

2017-12-19T07:45:33+00:00December 19th, 2017|Company News|

New Security Current report compiles advice and recommendations for endpoint security solutions from 13 CISOs across a variety of industries Hear why CISOs recommend application isolation for endpoint security protection See the value of application isolation provided via virtualization-based security when compared to traditional endpoint security approaches Download the report: CISOs Investigate: Endpoint Security Cloud. Mobile. [...]

Browser Isolation with Microsoft Windows Defender Application Guard (WDAG): What It Does, How It Works and What It Means

2017-12-11T06:00:56+00:00December 11th, 2017|Innovation|

Microsoft brings hardware isolation to the web browser Bromium and Microsoft have similar approaches to browser isolation using virtualization Microsoft protects only their own OS and proprietary Microsoft applications Bromium works with all Microsoft VBS technologies, and together we secure far more of the Windows attack surface than Microsoft does on its own Creating momentum [...]

Securing the Modern Endpoint the SANS Maturity Way

2017-10-30T05:46:05+00:00October 30th, 2017|Threats|

In Case You Missed It Bromium recently engaged in a series of communications and events on the topic of Securing the Modern Endpoint, covering timely and provocative concepts including: How detection consistently fails to secure the enterprise and why new thinking is desperately needed How to realign your defenses around a modern threat risk model [...]

The Godfathers of Virtualization Returning to VMWorld

2017-08-15T10:28:32+00:00August 15th, 2017|Company News|

Ian Pratt and Simon Crosby sold XenSource to Citrix in 2007. After working at Citrix, they decided to once again spin off and focus on cybersecurity. They are available to meet during VMWorld if you’d like to talk virtualization and security. We think of them as The Godfathers of Virtualization. The work they did with [...]

Zero-Day Exploits – Your Days are Numbered! [infographic]

2017-04-21T16:27:39+00:00April 21st, 2017|Threats|

News stories involving zero-day Windows kernel exploits seemingly never end. Fresh examples abound with alarming regularity and devastating effects, often involving defects with a dwell time of many months before they are formally addressed by patch updates. Despite a sustained focus by Microsoft on improving cybersecurity top to bottom, dubious new records were set in [...]

Busting the Non-Persistent VDI Security Myth!

2017-03-13T06:01:38+00:00March 13th, 2017|Government, Threats|

VDI, including non-persistent VDI, does little or nothing to stop today’s malware. VDI is just as susceptible to malware as physical desktops. Virtualization-based Security (VBS) helps solve the cyber security challenges for both physical and virtual desktops. Running Bromium’s Federal Professional Services team, I get the opportunity to meet with some of the largest and [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close