Seamlessly Isolate Risky Clicks with Bromium Secure Platform 4.1 [Demo Video]

Most breaches start with the user performing a risky click Windows 10 and modern browsers are more secure, but still susceptible to risky clicks Bromium’s virtualization-based security seamlessly isolates risky clicks inside unbreakable virtual m… Continue reading Seamlessly Isolate Risky Clicks with Bromium Secure Platform 4.1 [Demo Video]

Why Cyber Defense Fails at Enterprise Scale and What You Can Do About It

Anti-malware solutions often fail to prevent cyber attacks on end-user applications at an enterprise level. Most endpoint detection platforms are reactive and time-sensitive, so enterprises do more damage control than preventing risk. Isolation and mic… Continue reading Why Cyber Defense Fails at Enterprise Scale and What You Can Do About It

Hackers Keep it Simple: Malware Evades Detection by Simply Copying a File

New malware technique evades detection by simply copying a file We break it down step-by-step to show you how it works Innovative hackers continue to deliver sophisticated malware that evades detection The Bromium Lab is back to break down a recent out… Continue reading Hackers Keep it Simple: Malware Evades Detection by Simply Copying a File

Seasons Greetings? Not When That’s Malware In Your e-Card

Over Christmas, one of our customers was hit by a Trojan and they asked us to take a look at the threat. Sixteen of their users were fooled into opening a Word document. Fortunately, they had Bromium, so it safely ran inside a micro-VM and was unable t… Continue reading Seasons Greetings? Not When That’s Malware In Your e-Card

Get the Report: CISO Recommendations for Endpoint Security by Security Current

New Security Current report compiles advice and recommendations for endpoint security solutions from 13 CISOs across a variety of industries Hear why CISOs recommend application isolation for endpoint security protection See the value application isola… Continue reading Get the Report: CISO Recommendations for Endpoint Security by Security Current