Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Bromium Launches New Endpoint Protection Solution

Endpoint security firm Bromium has introduced a new security offering that integrates threat isolation, threat analysis, and continuous host monitoring to help organizations lock down their endpoints.

Endpoint security firm Bromium has introduced a new security offering that integrates threat isolation, threat analysis, and continuous host monitoring to help organizations lock down their endpoints.

Designed to help organizations detect and thwart targeted attacks and zero-day threats, Bromium Advanced Endpoint Security is available for Windows 7, 8 and 10, along with Mac OS X. The solution can help can help protect unpatched machines and those connected to untrusted networks, Bromium said.

Bromium Endpoint Protection leverages micro-virtualization technology to isolate websites, email, documents, USB and executables to prevent endpoint compromise, while new continuous host monitoring can help determine safe content vs. potentially risky and known bad (blacklisted) content.

“Micro-virtualization eliminates persistence because each micro-VM is discarded when the task is completed. Hardware isolation separates an attacked system from the enterprise network, preventing malware from pivoting onto other machines,” Bromium explains.

The endpoint solution also delivers real-time attack forensics to enable an automated response to security events, and extends the in-box virtualization-based security of Windows 10, while also integrating with Windows 10 Device Guard, the company said.

More information on Bromium Advanced Endpoint Security is available online.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Endpoint Security

Gigabyte has announced BIOS updates that remove a recently identified backdoor feature in hundreds of its motherboards.

Endpoint Security

Several major companies have published advisories in response to the Downfall vulnerability affecting Intel CPUs.

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.

Endpoint Security

The Zero Day Dilemma

Endpoint Security

When establishing visibility and security controls across endpoints, security professionals need to understand that each endpoint bears some or all responsibility for its own...