Is Security Everyone’s Business?

There is no security silver bullet Review of the complete attack timeline of Cobalt Strike Layered defenses need to work together ... Read More

Bromium Customers Praise Fast, Easy Deployment

“Easy to deploy and easy to use!” Every software vendor seems to use this slogan to assure prospects that once they purchase the license, the rest of the journey is going to be a breeze, and the client is going to recover their investment in no time through saving delivered ... Read More

Evolution of the security stack – voke Impact Note

| | Uncategorized
The security stack is changing to include application isolation Employees demand fewer restrictions to do their jobs IT operations teams need help to balance security with user productivity The security landscape is continuously changing in response to the advances in the severity of attacks on organizations. Let’s face it, most ... Read More

Protection First Strategy: Application Isolation as the Last Line of Defense

Endpoint security is a top priority for enterprise organizations and government agencies, but despite gains in detection-based tools, cybercriminals continue to find ways to bypass layered defenses Relying on detection-based solutions alone will not protect your systems and infrastructure from attacks New approaches, such as virtualization, can provide the desperately ... Read More
IDC | Frank Dickson | Validating the Unknown - 2018 Cybersecurity Strategies

We have Answers: Questions from the “Validating the Known” Webinar with IDC

Featured speaker Frank Dickson, IDC Research Director for Security Products, presented his new research: “Validating the Known: A Different Approach to Cybersecurity” He discussed why detection of malicious code can no longer protect your IT systems against cyberattacks Frank showed how new tactics based on “validating the known” can help ... Read More
14 Core Capabilities for Thwarting Cybercrime

We Have Answers: Questions from 2018 Cybersecurity Core Capabilities Webinar

Nicolas Chaillan, cybersecurity architect who worked for Homeland Security in the United States provided guidelines for your 2018 cybersercurity strategy. It is based on what he built for – a strategy that takes the best of the best and delivers results based on the level of security you need ... Read More
Bromium Helps You Defeat Ransomware

Bromium Now Provides Application Isolation for Citrix XenServer 7.3

Bromium now supports Citrix XenServer 7.3 nested virtualization with superior performance. Use application isolation to stop common attack vectors that layered defenses miss. Real-time, high-fidelity alerts trigger the Bromium Sensor Network to provide extended protection. XenServer is an open source platform for cost-effective application, desktop, cloud, and server virtual infrastructures ... Read More