Why Virtualization Rocks; Stopping Nation-State, Polymorphic Malware (video)

Author: No Comments Share:
Ian Pratt hates polymorphic malware.
  • The WannaCry ransomware attack was a call to arms.
  • We actually were lucky; it could have been a lot worse.
  • Employees need to open attachments; you need to stop worrying about that.

In the shadow of WannaCry, we hosted a live webcast with our co-founder, Ian Pratt and team members, Robert Wiggenhorn and Simon Plant, to answer questions about the ransomware attack. To get a foothold, WannaCry had to deliver its payload. As we understand it, that came through a downloaded file. The attack was simple and most next-gen anti-virus caught the malware once it was known, but next time, it could be a polymorphic breach and companies might not be so lucky. Update: while it appears WannaCry gained velocity via worm on unpatched SMB v1 servers, security firm, Zscaler has discovered new variants using phishing email or drive-by-download. Bromium protects attacks from, and isolates all content delivered via these vectors. 

To learn more about what went down, watch the video below.

Then consider these questions when doing a self-assessment to see if virtualization might be for you:

  1. Are you worried about stopping malware that is unknown: nation-state, polymorphic, or zero-day?
  2. Are your teams currently restricted by what they can do (e.g blocked websites, fear of attachments) and is that limiting productivity?
  3. Do you run Windows 7 or above and use Internet Explorer?
  4. Do you have legacy applications that rely on Java or Flash?
  5. Are your employees signed up to obey your security policies (our latest research suggest humans – your humans(!) are still the biggest risk to security)?

If you answered yes to any of these questions, you owe it to yourself to learn more.

We are serious security for those who are serious about protecting their assets. We offer a low cost Risk Assessment that makes sure your environment is a fit for virtualization and to identify where we can instantly add value. If you decide to purchase Bromium, there’s no charge for the assessment. A typical installment starts with 1,000 endpoints (we’ll do the assessment on just 500 endpoints to make sure you see value).

The easiest way to get started is to contact us. We’ll work with you to address your needs.

Please note: This demonstration shows one example—malicious documents—of how ransomware like WannaCry can enter your network. Bromium stops ransomware in its tracks. We use virtualization to contain threats – from applications, downloads, files, and while browsing – and you can then choose to let it run or shut it down. 

Previous Article

As Vendors Talk WannaCry, We Want You to Know What You Can Expect from Bromium

Next Article

Cybersecurity Virtualization Expert Ian Pratt Explains WannaCry Exploit

You may also like