Why Virtualization Rocks; Stopping Nation-State, Polymorphic Malware (video)

Blog Why Virtualization Rocks; Stopping Nation-State, Polymorphic Malware (video)

Ian Pratt hates polymorphic malware.

May 16, 2017 Category: Threats By: Jennifer Carole Comments: 0

Why Virtualization Rocks; Stopping Nation-State, Polymorphic Malware (video)

  • The WannaCry ransomware attack was a call to arms.
  • We actually were lucky; it could have been a lot worse.
  • Employees need to open attachments; you need to stop worrying about that.

In the shadow of WannaCry, we hosted a live webcast with our co-founder, Ian Pratt and team members, Robert Wiggenhorn and Simon Plant, to answer questions about the ransomware attack. To get a foothold, WannaCry had to deliver its payload. As we understand it, that came through a downloaded file. The attack was simple and most next-gen anti-virus caught the malware once it was known, but next time, it could be a polymorphic breach and companies might not be so lucky. Update: while it appears WannaCry gained velocity via worm on unpatched SMB v1 servers, security firm, Zscaler has discovered new variants using phishing email or drive-by-download. Bromium protects attacks from, and isolates all content delivered via these vectors. 

To learn more about what went down, watch the video below.

Then consider these questions when doing a self-assessment to see if virtualization might be for you:

  1. Are you worried about stopping malware that is unknown: nation-state, polymorphic, or zero-day?
  2. Are your teams currently restricted by what they can do (e.g blocked websites, fear of attachments) and is that limiting productivity?
  3. Do you run Windows 7 or above and use Internet Explorer?
  4. Do you have legacy applications that rely on Java or Flash?
  5. Are your employees signed up to obey your security policies (our latest research suggest humans – your humans(!) are still the biggest risk to security)?

If you answered yes to any of these questions, you owe it to yourself to learn more.

We are serious security for those who are serious about protecting their assets. We offer a low cost Risk Assessment that makes sure your environment is a fit for virtualization and to identify where we can instantly add value. If you decide to purchase Bromium, there’s no charge for the assessment. A typical installment starts with 1,000 endpoints (we’ll do the assessment on just 500 endpoints to make sure you see value).

The easiest way to get started is to contact us. We’ll work with you to address your needs.

Please note: This demonstration shows one example—malicious documents—of how ransomware like WannaCry can enter your network. Bromium stops ransomware in its tracks. We use virtualization to contain threats – from applications, downloads, files, and while browsing – and you can then choose to let it run or shut it down. 

Subscribe

Enter your email address to receive notifications.

About the Author

Jennifer Carole

Recent Posts

Categories
2017-05-16T01:11:12+00:00May 16th, 2017|Threats|

Leave a Reply

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.
Share
Tweet
Share

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close