Bromium Secure Browsing Isolates Intelligently and Maximizes Browser Choice

Bromium Secure Browsing Isolates Intelligently and Maximizes Browser Choice

Web browsing is intensely personal, even at work. Users develop strong preferences, tend to lock in a browser early, and are fiercely loyal to their favored choice. Forcing them to change browsers—or even strongly suggesting it—is often met with resistance, and sometimes with outright subversion by installing and using unauthorized ... Read More

Threatscape Predictions for 2019

| | Data Talks, predictions, threats
Breaches will appear to be more frequent, more public, and more dramatic than in previous years New attack vectors will emerge just as the industry figures out how to foreclose on older ones Artificial intelligence (AI) and machine learning (ML) will increase the stakes for both attackers and defenders Threatscape ... Read More

Why Customers Trust Bromium to Let Malware Run on their Endpoints

Bromium customers enthusiastically choose to let malware keep running in isolated micro-VMs 86% of the time This seemingly counterintuitive approach maximizes threat intelligence, made possible only by virtualization-based security Traditional solutions try to terminate malware upon discovery to minimize breaches, but often act too late and sacrifice learning Let malware ... Read More
What's New in Bromium Secure Platform, Version 4.1 Update 4

Bromium Secure Platform 4.1.4 Adds Threat Intelligence, Firefox Browsing, and More

Leverage Bromium Threat Cloud intelligence for real-time malware family and severity classifications Enjoy safe native browsing using Mozilla Firefox with risky sites isolated in Bromium Secure Browser Securely isolate the latest versions of Microsoft Office, Adobe Reader, and malicious link files Bromium 4.1 Update 4 has arrived, and we’ve packed ... Read More

Browser Isolation Eliminates Risk in Context

Browser isolation: Secure, user-centric browsing isolates phishing links, plus high-risk and lightly-trafficked websites Context awareness preserves native browsing for low-risk websites and trusted online enterprise resources Browser isolation fully quarantines web downloads, which comprise most attacks, yet are handled poorly by remote browsing proxies Everyone wants a safe web browsing ... Read More
Bromium-Attachments-vs-Downloads-Overall

Data Talks: Download Attacks Ignite While Attachments Cool Their Heels

Bromium customers see a significant increase in attacks via downloads as compared to email attachments "Compound attacks" are increasingly common, with cybercriminals employing multiple attack vectors in tandem No matter how the threats arrive, it’s critical to secure their ultimate targets, the vulnerable applications Welcome to the third edition of ... Read More
Bromium-Data-Talks-Web-vs-File-Based-Attacks-Over-Time

Data Talks: The Big Shift to File-Based Attacks Scrambles the Security Industry

Bromium sees a dramatic drop in the percentage of browser-based attacks in 2018 compared to file-based attacks Microsoft’s legacy Internet Explorer is now the only major web browser with serious remaining security concerns The clear majority of threats reaching endpoints today arrive via email attachments and browser file downloads Welcome ... Read More
Bromium-Application-Isolation-and-Control-Last-Line-of-Defense

Data Talks: Bromium Analyzes Live Running Malware from a Unique Threat Vantage Point

Bromium Threat Labs debuts a new multi-part blog series called Data Talks The series features highlights of “live capture” threat research using aggregated data voluntarily reported by Bromium customers Look for deep-dives, trends, and predictions to guide you when you know that detection isn’t enough to keep you safe Today ... Read More
What's New in Bromium Secure Platform, version 4.1

Bromium Secure Platform 4.1 Streamlines Virtualization-based Security

Prioritize security around common customer pain points with targeted use case deployment Run native Chrome on the host for low-risk browsing while safely isolating web file downloads Transform raw data into actionable security insights with interactive dashboards and reports Virtualization-based security has changed the way organizations approach the idea of ... Read More
Application Isolation Stops Malicious Email Attachments

Phone the Sender – Best or Worst New Security Practice?

| | Uncategorized
Sophisticated phishing attacks may originate from compromised email accounts of legitimate business partners New “best practice” security recommendation is to phone the sender whenever an unexpected attachment arrives Bromium isolates each email attachment so that users can click with confidence and maximize their productivity Do you receive a lot of ... Read More
Loading...