Data Talks: Bromium Analyzes Live Running Malware from a Unique Threat Vantage Point

Bromium Threat Labs debuts a new multi-part blog series called Data Talks The series features highlights of “live capture” threat research using aggregated data voluntarily reported by Bromium customers Look for deep-dives, trends, and predictions to guide you when you know that detection isn’t enough to keep you safe Today ... Read More
What's New in Bromium Secure Platform, version 4.1

Bromium Secure Platform 4.1 Streamlines Virtualization-based Security

Prioritize security around common customer pain points with targeted use case deployment Run native Chrome on the host for low-risk browsing while safely isolating web file downloads Transform raw data into actionable security insights with interactive dashboards and reports Virtualization-based security has changed the way organizations approach the idea of ... Read More
Application Isolation Stops Malicious Email Attachments

Phone the Sender – Best or Worst New Security Practice?

| | Uncategorized
Sophisticated phishing attacks may originate from compromised email accounts of legitimate business partners New “best practice” security recommendation is to phone the sender whenever an unexpected attachment arrives Bromium isolates each email attachment so that users can click with confidence and maximize their productivity Do you receive a lot of ... Read More

Bromium vs. Remote Browsers: Downloads Make the Difference

Remote browsers stop web exploits but do little to solve the much larger problem of malicious file downloads Users expect to download the actual documents they’ve selected, not remote renderings or hollow substitutes Bromium isolates web downloads so users can work safely with them fully-functional in their native file formats ... Read More
Designate Microsoft Edge as Ingress Application for Bromium

How to use Bromium Application Isolation to Secure Microsoft Edge Downloads

Microsoft Edge browser does not isolate web file downloads Learn how to use Bromium to isolate your Microsoft Edge web file downloads Bromium works with all Microsoft virtualization-based security (VBS) technologies Microsoft jumps on the application isolation bandwagon. In December 2017, Bromium welcomed the arrival of the Windows Defender Application ... Read More
browser isolation

Browser Isolation with Microsoft Windows Defender Application Guard (WDAG): What It Does, How It Works and What It Means

Microsoft brings hardware isolation to the web browser Bromium and Microsoft have similar approaches to browser isolation using virtualization Microsoft protects only their own OS and proprietary Microsoft applications Bromium works with all Microsoft VBS technologies, and together we secure far more of the Windows attack surface than Microsoft does ... Read More
Webinar: Securing the Modern Endpoint

Securing the Modern Endpoint the SANS Maturity Way

In Case You Missed It Bromium recently engaged in a series of communications and events on the topic of Securing the Modern Endpoint, covering timely and provocative concepts including: How detection consistently fails to secure the enterprise and why new thinking is desperately needed How to realign your defenses around ... Read More
A Cybersecurity Proof: The Application is the Endpoint

A Cybersecurity Proof: The Application is the Endpoint

Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes It’s time to rethink information security defense around fewer, smarter, yet more effective layers You have many more endpoints than you ... Read More

Virtualization-Based Security is Helping Security Professionals Relax

Virtualization’s continued journey across the enterprise led inevitably to security Enhanced security benefits using virtualization are powerful and compelling Virtualization takes the security responsibility off users and delivers control to IT Detection-based security doesn’t work. It’s an exhausted concept. The battle’s been waged for 30 years and the cyber criminals ... Read More

Breachless Threat Intelligence: A Pain-Free Approach to CyberSecurity

Enterprises need a steady stream of actionable, timely, and accurate threat intelligence on targeted malicious intrusions and attempts into their networks They need this information without suffering breaches and cannot rely solely on post-compromise forensics or sandbox simulations to continuously tighten and adapt their defenses Pre-breach targeted intelligence eludes most ... Read More