- Our new relationship was announced today. Read the release.
- You can see a demo of the computer at RSAC at the Bromium booth (at the back of South Hall).
- This is the first step in shifting security to be built-in rather than bolted on.
Today HP® announced HP Sure Click, a massively secure, built-in feature of enterprise laptops and PCs, to protect customers from web-based attacks.
HP worked closely with Bromium to create a solution that protects users and their organizations from malware and ransomware delivered via the browser. HP Sure Click will be introduced as a standard feature on the award-winning HP EliteBook x360 1030 G22 in the spring and on Elite PC platforms in the second half of the year.
New to Bromium? Get our overview.
A key achievement is that the solution seamlessly complements and extends Microsoft® Windows 10 Virtualization Based Security (VBS) – on which Bromium was proud to partner with Microsoft.
- Today we announced our new streamlined channel program for easy deployment of Bromium.
- Open to commercial and government partners and offers incentives to those willing to start immediately.
- We allow for innovation, because users don’t have to be held back.
We are pleased to announce a new streamlined channel program that focuses on rapid and easy deployment of our solutions, and will add speed time-to-value for both our partners and customers.
We’re finding that enterprises who have deployed next-gen anti-virus and stand-alone monitoring solutions aren’t getting enough protection, and attackers continue to get through. We work well with the NGAV solutions because we catch what falls through their net.
Sign-up! Apply to be a partner here.
- Safer Internet Day promotes the safe, responsible and positive use of digital technology for children and young people.
- Education can never completely protect from cybercrime and relying on humans is not a solid strategy.
- Bromium’s virtualization-based technology means that end-users are protected from malware, so they can browse the internet freely and safely.
Safer Internet Day is celebrated globally in more than 100 countries on February 7th. This year’s theme is ‘Be the change: unite for a better internet’. Hundreds of organisations get involved to help promote the safe, responsible and positive use of digital technology for children and young people.
Using Education to Make the Internet Safer
The UK Minister for Online Safety, Tracey Crouch is a supporter of Safer Internet Day and believes that “the internet has provided young people with some amazing opportunities”. She also explains that protecting them from risks they might face online is a top priority. Safer Internet Day highlights positive uses of technology and explores the role we all play in helping to create a better and safer online community.
- No one disputes that virtualization-based security is the most secure and effective approach to solving the endpoint security challenge!
- Bromium has now reduced its virtualization resource footprint to run effectively even on devices with only 4 GB RAM!
- You can now leverage the power of virtualization based security without having to upgrade your endpoint hardware or operating system!
In my last blog entitled Client-Side Virtualization Security at Warp Speed, I discussed some of the incredible performance improvements we made to our Bromium Secure Platform in our recent release and showed how we have reduced our resource footprint at load to be equal to (and sometimes lower) than the resources consumed without Bromium.
At the end of my previous blog there is a link to a YouTube video on the Bromium channel showing a side-by-side comparison of a laptop running with and without Bromium. The laptop was running Windows 8.1 and had 8 GB RAM. For that last two years we find that most customers purchasing new hardware are choosing 6 – 8 GB RAM as their baseline. If you have 6 GB RAM+, there has never been a problem running Bromium’s virtualization-based security from a memory perspective. However, there are still a large number of desktops and laptops in enterprises today that have only 4 GB RAM and there will be for quite some time.
- Cybercrime continues to increase with the economic consequences impacting global businesses and their shareholders.
- End users are growing weary of passwords, rules, bans and are basically giving up.
- Exhausted security owners are settling for “good enough” because they’re getting pounded from all sides.
Technology is amazing. It has increased productivity, created a global community, fostered commerce and improved the human condition. Unfortunately – as with anything – there are those who work to exploit it for personal gain. In our world those are usually cybercriminals. But we all know this.
So what do we do about it?
- By now we all probably agree that last weekend was one of the most dramatic in US Government history.
- If you don’t know what I’m talking about, then this blog is not for you.
- It concerns me because it puts our cybersecurity at risk. Hackers don’t typically follow the rules.
Trump signed an executive order that bans certain categories of individuals from entering the USA. Mass chaos followed at US airports that process inbound international flights, including demonstrations by US citizens.
He also signed an executive order that mandates that US Federal “Agencies shall, to the extent consistent with applicable law, ensure that their privacy policies exclude persons who are not United States citizens or lawful permanent residents from the protections of the Privacy Act regarding personally identifiable information”.
Even now the implications of the directive are unclear. For the past 15 years the US and EU have operated under a Safe Harbor agreement that effectively shielded EU citizens from arbitrary privacy invasion by the US, but even that agreement was in trouble because of increased concern on the part of the EU courts. Given the lack of specificity in the most recent executive order the effect will be confusion, and the result of confusion will be broadly negative for the US.
Here’s why: Read more…
- It’s inevitable that we’ll have to fight off some sort of strain of flu during the winter season. Without adequate protection, the same goes for malware.
- Flu inoculations are unreliable due to the virus’ unpredictable polymorphic nature. If there was a reliable inoculation, you’d get it, right?
- Bromium’s micro-virtualization technology does offer reliable protection against malware, no matter how unknown, complex or persistent the attack is, meaning you don’t need to be at risk anymore.
It’s that time of year… flu is here and it’s been a particularly nasty variant this winter too. The flu virus puts you on your back – and there have certainly been a lot of unfortunate souls in that position recently. The same goes for malware, where there’s been a 600% rise in active ransomware families alone since 2013. Whether it’s PopcornTime or CryPy, hackers are continually finding new ways to attack organizations. And as with the flu virus, they don’t discriminate, with a target range stretching as far as schools, hospitals and the government.
So, is it time for your flu inoculation?
Find out how our micro-virtualization technology works here.
- For the last +20 years there has been a cyber arms race.
- Cybercriminals spend every waking moment figuring out how to bypass security controls and take advantage of software vulnerabilities to ultimately gain access to networks and steal data for profit, economic acceleration, or to promote a political agenda.
- On the cyber security side of the house, we have cyber security professionals trying to keep up and anticipate the advisories next move.
We’ve recently released a whitepaper “Closing the 1% Gap” that explores the security benefits and cost savings the average large enterprise organization can gain from adopting a combination of a Bromium and Microsoft solution as a security strategy.
Is antivirus dead?
To answer this we first need to evaluate the efficacy of AV and NGAV. The well-known AV-test.org has been conducting AV efficacy testing for vendors that choose to participate. The goal for every security vendor that does participate is to be the best at detecting and remediating threats. Despite advancements in cybersecurity, when comparing AV test results over the last few years, not much has changed.
Get the whitepaper: Closing the 1% Gap
- I’ve seen IT Security solutions change a lot since the ILOVEYOU outbreak in 2000, when I sold anti-virus solutions on CDs.
- Despite the dramatic changes, I still see a lot of companies paying a high price for inadequate strategy against ransomware.
- In order to be prepared against tomorrow’s threats, you have to change the game. We do that at Bromium by providing protection to defeat ransomware, instead of relying on detection.
In the many years that I have worked as a security professional in the IT industry, I have experienced the evolution of malware first hand. I will never forget one of the first major worldwide malware outbreaks “ILOVEYOU” back in 2000. Most companies at that time did not have adequate security solutions in place for blocking the malware and were hit hard.
Working for an IT security distributor at that time, we had customers coming over in a taxi to pick-up an anti-virus solution on CD (yes CD not DVD). While malware was written in those days by kiddies with too much knowledge and most likely too much time, today’s malware is created by professional criminal organizations with a lot of money doing all they can to make even more. As many things have changed over the years, one thing remains the same and that is that most companies still do not have an adequate strategy to deal with today’s biggest malware threat: ransomware.
- Simon Crosby reflects on the day’s events as President Trump in inaugurated.
- Red tape, bureaucracy, apparently things in a swamp – all slow down the government’s ability to move quickly.
- A presidential mandate for change could make a substantial difference.
I have recently been fortunate to have the opportunity to advise key leaders in the U.S. government who are seeking to improve government and even national cyber-resilience.
Sadly, many of those with enough clout to mandate fundamental changes (e.g. my recommendation to move to the cloud) are unable to grasp the fundamental technological advantages of infrastructure that is massively more secure “by design.”