Implementing Security Best Practices in the Virtual Data Center

|
Virtual data center security must be agile and mapped in real-time to virtual infrastructure management tools Offloading of anti-malware scanning improves user experience, reduces redundant scans, and provides high availability Born-secure VM instantiation ensures compliance, improves virtualization density, and minimizes application latency ... Read More
Threat Forwarding Augments Threat Intelligence with Automated Triage and Categorization

Threat Forwarding Augments Threat Intelligence with Automated Triage and Categorization

Bromium customers have long had the option to securely transmit their proprietary threat data to Bromium analysts either manually or using our one-way Cloud Connector. Now, with Bromium Secure Platform 4.1.5, we've improved upon Threat Forwarding, introducing a two-way connection from the customer's Bromium Controller directly to Bromium Cloud Services ... Read More
Bromium Secure Browsing Isolates Intelligently and Maximizes Browser Choice

Bromium Secure Browsing Isolates Intelligently and Maximizes Browser Choice

Web browsing is intensely personal, even at work. Users develop strong preferences, tend to lock in a browser early, and are fiercely loyal to their favored choice. Forcing them to change browsers—or even strongly suggesting it—is often met with resistance, and sometimes with outright subversion by installing and using unauthorized ... Read More

Threatscape Predictions for 2019

| | Data Talks, predictions, threats
Breaches will appear to be more frequent, more public, and more dramatic than in previous years New attack vectors will emerge just as the industry figures out how to foreclose on older ones Artificial intelligence (AI) and machine learning (ML) will increase the stakes for both attackers and defenders Threatscape ... Read More

Why Customers Trust Bromium to Let Malware Run on their Endpoints

Bromium customers enthusiastically choose to let malware keep running in isolated micro-VMs 86% of the time This seemingly counterintuitive approach maximizes threat intelligence, made possible only by virtualization-based security Traditional solutions try to terminate malware upon discovery to minimize breaches, but often act too late and sacrifice learning Let malware ... Read More

Bromium Secure Platform 4.1.4 Adds Threat Intelligence, Firefox Browsing, and More

Leverage Bromium Threat Cloud intelligence for real-time malware family and severity classifications Enjoy safe native browsing using Mozilla Firefox with risky sites isolated in Bromium Secure Browser Securely isolate the latest versions of Microsoft Office, Adobe Reader, and malicious link files Bromium 4.1 Update 4 has arrived, and we’ve packed ... Read More

Browser Isolation Eliminates Risk in Context

Browser isolation: Secure, user-centric browsing isolates phishing links, plus high-risk and lightly-trafficked websites Context awareness preserves native browsing for low-risk websites and trusted online enterprise resources Browser isolation fully quarantines web downloads, which comprise most attacks, yet are handled poorly by remote browsing proxies Everyone wants a safe web browsing ... Read More
Bromium-Attachments-vs-Downloads-Overall

Data Talks: Download Attacks Ignite While Attachments Cool Their Heels

Bromium customers see a significant increase in attacks via downloads as compared to email attachments "Compound attacks" are increasingly common, with cybercriminals employing multiple attack vectors in tandem No matter how the threats arrive, it’s critical to secure their ultimate targets, the vulnerable applications Welcome to the third edition of ... Read More
Bromium-Application-Isolation-and-Control-Last-Line-of-Defense

Data Talks: Bromium Analyzes Live Running Malware from a Unique Threat Vantage Point

Bromium Threat Labs debuts a new multi-part blog series called Data Talks The series features highlights of “live capture” threat research using aggregated data voluntarily reported by Bromium customers Look for deep-dives, trends, and predictions to guide you when you know that detection isn’t enough to keep you safe Today ... Read More

Bromium Secure Platform 4.1 Streamlines Virtualization-based Security

Prioritize security around common customer pain points with targeted use case deployment Run native Chrome on the host for low-risk browsing while safely isolating web file downloads Transform raw data into actionable security insights with interactive dashboards and reports Virtualization-based security has changed the way organizations approach the idea of ... Read More

Secure Guardrails