Your invoice is overdue

The Social Engineering Behind Operation Sharpshooter, Rising Sun

We are learning more about Operation Sharpshooter, an espionage campaign that targeted financial services, government and critical infrastructure primarily focused in German, Turkey, the UK and the US. It is important to show how easily this attack was delivered to end users and how quickly it can infect your enterprise ... Read More

Application Isolation in the Spotlight

Two major announcements bring application isolation into the spotlight Microsoft and HP elevate the importance of isolation in the endpoint security stack Isolate risky browser activity, but don’t forget files are risky too This week, two major announcements came out highlighting the need for application isolation in the security stack ... Read More

Trustworthy Network Segmentation for an Untrustworthy World

Denial is not a strategy. The reality is that networks, PCs and XenApp clients are susceptible to attacks, if they haven’t been breached already. Network segmentation is an imperative. Organizations need to isolate applications that contain sensitive data, but this approach can introduce the cost and hassle of issuing a ... Read More

How to Isolate Sensitive Data from Compromised PCs and Networks

In your organization’s IT environment, the reality is that networks and end user PCs are vulnerable, which leaves your sensitive data exposed. To contend with this reality, establishing segmented networks for sensitive data is an urgent requirement, however this approach can present a host of excessive costs and risks. With ... Read More

We Have Answers: Questions the ‘How Virtualization Protects Your High-Value Assets’ Webinar

Thank you everyone who tuned in to watch our webinar on Bromium Protected App, and special thanks to our featured guest speaker – Theresa Lanowitz, Founder and Analyst with voke, Inc. We always encourage our audience to participate in the discussion by answering polls and submitting questions to the presenters ... Read More

Securing Apps When User Devices Are Compromised

Corporate networks and user PCs continue to be exploited—leaving your sensitive applications and data vulnerable. Network segmentation is a fundamental way to mitigate the risks associated with these vulnerabilities—but it only works if authorized users can still access the data they need. Bromium Protected App offers a practical way to ... Read More

Moffitt Cancer Center Replaces AV, Selects Bromium Application Isolation

High quality, multi-layered medical images are impacted by security software protecting endpoint workstations Radiology departments struggle with slow load of patient images caused by anti-virus (AV) scanning Learn how Moffitt Cancer Center secures their radiology workstations while preserving usability and performance Early detection is key to accurate diagnosis and treatment, ... Read More

Introducing Bromium Protected App®: Protect Critical Applications Against Compromised Devices

Protected App locks down access to and from your sensitive data, keeping it secure even if networks and host PCs have been compromised Using hardware-enforced virtualization-based security, Bromium Protected App protects against threats such as keylogging, screen capture, memory tampering, and man-in-the-middle attacks IT and Application teams can rest assured ... Read More