Introducing Bromium Protected App®: Protect Critical Applications Against Compromised Devices

2018-08-01T06:00:42+00:00 July 31st, 2018|Protected App|

Protected App locks down access to and from your sensitive data, keeping it secure even if networks and host PCs have been compromised Using hardware-enforced virtualization-based security, Bromium Protected App protects against threats such as keylogging, screen capture, memory tampering, and man-in-the-middle attacks IT and Application teams can rest assured the companies most sensitive data [...]

Seamlessly Isolate Risky Clicks with Bromium Secure Platform 4.1 [Demo Video]

2018-08-13T16:11:45+00:00 July 9th, 2018|Innovation|

Most breaches start with the user performing a risky click Windows 10 and modern browsers are more secure, but still susceptible to risky clicks Bromium’s virtualization-based security seamlessly isolates risky clicks inside unbreakable virtual machines Let’s face it, Internet Explorer, along with its plugins such as Flash, Java, and Silverlight, cannot be used to safely [...]

Why Cyber Defense Fails at Enterprise Scale and What You Can Do About It

2018-02-15T06:00:04+00:00 February 15th, 2018|Company News|

Anti-malware solutions often fail to prevent cyber attacks on end-user applications at an enterprise level. Most endpoint detection platforms are reactive and time-sensitive, so enterprises do more damage control than preventing risk. Isolation and micro-virtualization of endpoints proactively minimizes the attack surface to dramatically reduce breaches and false alerts. You’ve heard the saying, “the best [...]

Research Uncovers the Hidden Costs of Detection-based Cybersecurity [Infographic]

2018-02-06T04:01:03+00:00 February 6th, 2018|Company News|

Our new research conducted by Vanson Bourne finds detect-to-protect security costs organizations more than $16 million per year. This is despite the fact that detection-based cybersecurity is failing to keep up with increasingly sophisticated malware. The infographic below explains the only effective way to reduce threats is to render them harmless with virtualization-based application isolation. [...]

How to Use Bromium Application Isolation to Secure Microsoft Edge Downloads

2018-02-05T07:40:16+00:00 February 5th, 2018|Innovation|

Microsoft Edge browser does not isolate web file downloads Learn how to use Bromium to isolate your Microsoft Edge web file downloads Bromium works with all Microsoft virtualization-based security (VBS) technologies Microsoft jumps on the application isolation bandwagon. In December 2017, Bromium welcomed the arrival of the Windows Defender Application Guard (WDAG) for Microsoft Edge, [...]

Bromium Now Provides Application Isolation for Citrix XenServer 7.3

2018-01-24T06:01:24+00:00 January 24th, 2018|Company News|

Bromium now supports Citrix XenServer 7.3 nested virtualization with superior performance. Use application isolation to stop common attack vectors that layered defenses miss. Real-time, high-fidelity alerts trigger the Bromium Sensor Network to provide extended protection. XenServer is an open source platform for cost-effective application, desktop, cloud, and server virtual infrastructures. When Bromium is used for [...]

Process Doppelgänging Can’t be Detected, but Isolation Will Keep You Protected

2017-12-20T16:04:44+00:00 December 20th, 2017|Threats|

Process Doppelgänging is a new code injection technique that bypasses most security tools and works on all Windows versions. Relying on detect-to-protect security solutions will leave you vulnerable to Process Doppelgänging. Bromium executes untrusted tasks in a hardware-isolated virtual machine, so you are always protected, even from zero-days and new, undetectable technique. What is Process [...]

Get the Report: CISO Recommendations for Endpoint Security by Security Current

2017-12-19T07:45:33+00:00 December 19th, 2017|Company News|

New Security Current report compiles advice and recommendations for endpoint security solutions from 13 CISOs across a variety of industries Hear why CISOs recommend application isolation for endpoint security protection See the value of application isolation provided via virtualization-based security when compared to traditional endpoint security approaches Download the report: CISOs Investigate: Endpoint Security Cloud. Mobile. [...]

Browser Isolation with Microsoft Windows Defender Application Guard (WDAG): What It Does, How It Works and What It Means

2017-12-11T06:00:56+00:00 December 11th, 2017|Innovation|

Microsoft brings hardware isolation to the web browser Bromium and Microsoft have similar approaches to browser isolation using virtualization Microsoft protects only their own OS and proprietary Microsoft applications Bromium works with all Microsoft VBS technologies, and together we secure far more of the Windows attack surface than Microsoft does on its own Creating momentum [...]

A Cybersecurity Proof: The Application is the Endpoint

2017-10-16T09:25:16+00:00 October 16th, 2017|Threats|

Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes It’s time to rethink information security defense around fewer, smarter, yet more effective layers You have many more endpoints than you think. How many endpoints do [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close