Bromium Customers Praise Fast, Easy Deployment

“Easy to deploy and easy to use!” Every software vendor seems to use this slogan to assure prospects that once they purchase the license, the rest of the journey is going to be a breeze, and the client is going to recover their investment i… Continue reading Bromium Customers Praise Fast, Easy Deployment

We Have Answers: Questions from 2018 Cybersecurity Core Capabilities Webinar

Nicolas Chaillan, cybersecurity architect who worked for Homeland Security in the United States provided guidelines for your 2018 cybersercurity strategy. It is based on what he built for Cyber.gov – a strategy that takes the best of the best and… Continue reading We Have Answers: Questions from 2018 Cybersecurity Core Capabilities Webinar

Bromium Now Provides Application Isolation for Citrix XenServer 7.3

Bromium now supports Citrix XenServer 7.3 nested virtualization with superior performance. Use application isolation to stop common attack vectors that layered defenses miss. Real-time, high-fidelity alerts trigger the Bromium Sensor Network to provide… Continue reading Bromium Now Provides Application Isolation for Citrix XenServer 7.3

Virtualization-Based Security…Bromium 4.0 Takes Isolation Mainstream

We’ve been working hard to get ready for the long anticipated launch of Bromium Secure Platform 4.0. Many of our customers, 35 to be exact, have already had the opportunity to test the release candidates and give feedback. Register now for the upcoming webinar on April 27 to learn more about what’s in the new […]

The post Virtualization-Based Security…Bromium 4.0 Takes Isolation Mainstream appeared first on Bromium.

Continue reading Virtualization-Based Security…Bromium 4.0 Takes Isolation Mainstream

My Artificial Intelligence is Better than Your Artificial Intelligence – Or How to Truly Stop Malware

At RSA 2017, there was one resounding message that attendees were bombarded with; artificial intelligence is here to solve our security problems. The problem is, cybercrime continues because the bad guys are using the same techniques. It’s time to change the game. For years, it’s been humans vs. humans. Cybercriminals and cybersecurity organizations constantly change […] Continue reading My Artificial Intelligence is Better than Your Artificial Intelligence – Or How to Truly Stop Malware

Serious Security is Easy: 10 Misconceptions about Virtualization Based Security

Myth: Micro-virtualization makes daily user tasks difficult and does not block malicious activity. Fact: End users can effortlessly carry on with their day-to-day tasks as usual, including opening and using files sourced from the internet. Fact: All malware activity is contained, recorded, analyzed for network detection, and then destroyed – all without remediation. Let us […] Continue reading Serious Security is Easy: 10 Misconceptions about Virtualization Based Security

The Evolution of Ransomware and What You Can Do To Fight It

Ransomware is this year’s most buzz worthy malware story. Access is easy – your end users simply click on something that appears trusted and the bad guys are in. While old methods attempt to stop the threat, we offer a different approach that will protect your data and your network. The cybercriminal world is not […] Continue reading The Evolution of Ransomware and What You Can Do To Fight It