Browser Isolation with Microsoft Windows Defender Application Guard (WDAG): What It Does, How It Works and What It Means

Microsoft brings hardware isolation to the web browser Bromium and Microsoft have similar approaches to browser isolation using virtualization Microsoft protects only their own OS and proprietary Microsoft applications Bromium works with all Microsoft … Continue reading Browser Isolation with Microsoft Windows Defender Application Guard (WDAG): What It Does, How It Works and What It Means

Virtualization-Based Security is Helping Security Professionals Relax

Virtualization’s continued journey across the enterprise led inevitably to security Enhanced security benefits using virtualization are powerful and compelling Virtualization takes the security responsibility off users and delivers control to IT Detection-based security doesn’t work. It’s an exhausted concept. The battle’s been waged for 30 years and the cyber criminals won. Why? Because detection will […]

The post Virtualization-Based Security is Helping Security Professionals Relax appeared first on Bromium.

Continue reading Virtualization-Based Security is Helping Security Professionals Relax

Breachless Threat Intelligence: A Pain-Free Approach to CyberSecurity

Enterprises need a steady stream of actionable, timely, and accurate threat intelligence on targeted malicious intrusions and attempts into their networks They need this information without suffering breaches and cannot rely solely on post-compromise forensics or sandbox simulations to continuously tighten and adapt their defenses Pre-breach targeted intelligence eludes most organizations today, even among security […]

The post Breachless Threat Intelligence: A Pain-Free Approach to CyberSecurity appeared first on Bromium.

Continue reading Breachless Threat Intelligence: A Pain-Free Approach to CyberSecurity

Disposable Computing is the Essence of Bromium’s Micro-Virtualization

We live in a disposable society, from our ever-present convenience foods in throw-away packaging to online speed-dating tailor-made for today’s low attention-span, instant gratification, swipe-left culture. Why be stuck with the same cruddy old PC filled up with accumulated digital gunk day after day, when you can have a squeaky-clean brand new computer each and […]

The post Disposable Computing is the Essence of Bromium’s Micro-Virtualization appeared first on Bromium.

Continue reading Disposable Computing is the Essence of Bromium’s Micro-Virtualization

Disposable Computing is the Essence of Bromium’s Micro-Virtualization

We live in a disposable society, from our ever-present convenience foods in throw-away packaging to online speed-dating tailor-made for today’s low attention-span, instant gratification, swipe-left culture. Why be stuck with the same cruddy old PC filled up with accumulated digital gunk day after day, when you can have a squeaky-clean brand new computer each and […]

The post Disposable Computing is the Essence of Bromium’s Micro-Virtualization appeared first on Bromium.

Continue reading Disposable Computing is the Essence of Bromium’s Micro-Virtualization

Signatures Not the Root of Prevention

Faulty file definitions strike once again! On April 24, anti-virus provider Webroot issued an automated update to its signature definitions. This inadvertently quarantined hundreds of critical customer files and applications that it erroneously flagged as malicious. At one time or another, it seems that every anti-malware endpoint security provider has fallen victim to the same […]

The post Signatures Not the Root of Prevention appeared first on Bromium.

Continue reading Signatures Not the Root of Prevention

Zero-Day Exploits – Your Days are Numbered! [infographic]

News stories involving zero-day Windows kernel exploits seemingly never end. Fresh examples abound with alarming regularity and devastating effects, often involving defects with a dwell time of many months before they are formally addressed by patch updates. Despite a sustained focus by Microsoft on improving cybersecurity top to bottom, dubious new records were set in […]

The post Zero-Day Exploits – Your Days are Numbered! [infographic] appeared first on Bromium.

Continue reading Zero-Day Exploits – Your Days are Numbered! [infographic]