We’ve been working hard to get ready for the long anticipated launch of Bromium Secure Platform 4.0. Many of our customers, 35 to be exact, have already had the opportunity to test the release candidates and give feedback. Register now for the upcoming webinar on April 27 to learn more about what’s in the new […]
Detection-based techniques will always be one step behind the attacker. Extend NGAV using next gen virtualization with application isolation and control. Applications with the sensitive data are completely hardware-isolated from the host. In 2016, organizations spent over $80 billion on cybersecurity, while cybercriminals made $3 trillion in profit. Cybersecurity is a constant arms race and when […]
My Artificial Intelligence is Better than Your Artificial Intelligence – Or How to Truly Stop Malware
At RSA 2017, there was one resounding message that attendees were bombarded with; artificial intelligence is here to solve our security problems. The problem is, cybercrime continues because the bad guys are using the same techniques. It’s time to change the game. For years, it’s been humans vs. humans. Cybercriminals and cybersecurity organizations constantly change […]
For the last +20 years there has been a cyber arms race. Cybercriminals spend every waking moment figuring out how to bypass security controls and take advantage of software vulnerabilities to ultimately gain access to networks and steal data for profit, economic acceleration, or to promote a political agenda. On the cyber security side of […]
Myth: Micro-virtualization makes daily user tasks difficult and does not block malicious activity. Fact: End users can effortlessly carry on with their day-to-day tasks as usual, including opening and using files sourced from the internet. Fact: All malware activity is contained, recorded, analyzed for network detection, and then destroyed – all without remediation. Let us […]
Thanks to virtualization, security does not have impact your system performance. In fact, by using virtualization-based security you can actually reduce resource consumption that would normally be used for malicious inspection. Bromium employs micro-virtualization to perform introspection of threats to fully map the kill chain without the need for any signatures.
Microsoft’s security enhancement to Windows 10 using virtualization-based security (VBS) that hardware isolates their Edge browser is exciting news. It validates what we pioneered (and have multiple patents for) years ago.
Ransomware is this year’s most buzz worthy malware story. Access is easy – your end users simply click on something that appears trusted and the bad guys are in. While old methods attempt to stop the threat, we offer a different approach that will protect your data and your network. Watch how Bromium handles ransomware […]