Featured speaker Frank Dickson, IDC Research Director for Security Products, presented his new research: “Validating the Known: A Different Approach to Cybersecurity” He discussed why detection of malicious code can no longer protect your IT systems against cyberattacks Frank showed how new tactics based on “validating the known” can help boost IT security, and focused on […]
Nicolas Chaillan, cybersecurity architect who worked for Homeland Security in the United States provided guidelines for your 2018 cybersercurity strategy. It is based on what he built for Cyber.gov – a strategy that takes the best of the best and delivers results based on the level of security you need. His recommendations work for both […]
Bromium now supports Citrix XenServer 7.3 nested virtualization with superior performance. Use application isolation to stop common attack vectors that layered defenses miss. Real-time, high-fidelity alerts trigger the Bromium Sensor Network to provide extended protection. XenServer is an open source platform for cost-effective application, desktop, cloud, and server virtual infrastructures. When Bromium is used for […]
We hear about cybersecurity fails all the time. We’re happy to tell you it doesn’t have to be that way. Application isolation and containment based on virtualization is delivering results. In the US, the NSA has called out this strategy as the way forward for stopping advanced threats. This post has been updated to reflect […]
We’ve been working hard to get ready for the long anticipated launch of Bromium Secure Platform 4.0. Many of our customers, 35 to be exact, have already had the opportunity to test the release candidates and give feedback. Watch this webinar to learn more about what’s in the new release of Bromium Secure Platform. Virtualization-based […]
Detection-based techniques will always be one step behind the attacker. Extend NGAV using next gen virtualization with application isolation and control. Applications with the sensitive data are completely hardware-isolated from the host. In 2016, organizations spent over $80 billion on cybersecurity, while cybercriminals made $3 trillion in profit. Cybersecurity is a constant arms race and when […]
My Artificial Intelligence is Better than Your Artificial Intelligence – Or How to Truly Stop Malware
At RSA 2017, there was one resounding message that attendees were bombarded with; artificial intelligence is here to solve our security problems. The problem is, cybercrime continues because the bad guys are using the same techniques. It’s time to change the game. For years, it’s been humans vs. humans. Cybercriminals and cybersecurity organizations constantly change […]
For the last +20 years there has been a cyber arms race. Cybercriminals spend every waking moment figuring out how to bypass security controls and take advantage of software vulnerabilities to ultimately gain access to networks and steal data for profit, economic acceleration, or to promote a political agenda. On the cyber security side of […]
Myth: Micro-virtualization makes daily user tasks difficult and does not block malicious activity. Fact: End users can effortlessly carry on with their day-to-day tasks as usual, including opening and using files sourced from the internet. Fact: All malware activity is contained, recorded, analyzed for network detection, and then destroyed – all without remediation. Let us […]
Thanks to virtualization, security does not have impact your system performance. In fact, by using virtualization-based security you can actually reduce resource consumption that would normally be used for malicious inspection. Bromium employs micro-virtualization to perform introspection of threats to fully map the kill chain without the need for any signatures.
Microsoft’s security enhancement to Windows 10 using virtualization-based security (VBS) that hardware isolates their Edge browser is exciting news. It validates what we pioneered (and have multiple patents for) years ago.
Ransomware is this year’s most buzz worthy malware story. Access is easy – your end users simply click on something that appears trusted and the bad guys are in. While old methods attempt to stop the threat, we offer a different approach that will protect your data and your network. Watch how Bromium handles ransomware […]