Bromium, a malware protection company focused on the enterprise, announced this week that it has raised $40 million in an oversubscribed Series C funding round.
Bromium’s flagship vSentry technology goes beyond common malware protection techniques and uses Intel CPU and chipset features to hardware-isolate tasks that access the Web, attachments and files could contain malware.
“vSentry automatically creates hardware-isolated micro-VMs that secure every user task – such as visiting a web page, downloading a document, or opening an email attachment,” the company explains. “Each task runs in its own micro-VM, and all micro-VMs are separated from each other, and from the trusted enterprise network. If malware targets the end user, the threat is contained in the hardware-isolated micro-VM. Consequently, it is never able to steal or damage the user or enterprise’s information, and is destroyed when the task is completed.”
The company says that vSentry is transparent to the end user, and has no discernable impact on user experience or system performance.
The company said that the new funding will be used to fuel product development and to accelerate sales in North America, EMEA, Japan and APAC.
The funding round was led by new investor Meritech Capital Partners, with participation from existing investors Andreessen Horowitz, Ignition Partners, Highland Capital Partners, and Intel Capital.
“Demand for our flagship vSentry and LAVA products continues to grow,” said Gaurav Banga, co-founder and CEO of Bromium. “We have doubled revenue each quarter this year and now plan to accelerate our international expansion and strengthen our development team.”
“Intel platforms uniquely offer customers hardware security features that can transform enterprise security,” said Rick Echevarria, VP, PC Client Group and GM, Intel Business Client Platform Division. “Bromium, as a valuable Intel partner, takes advantage of these features, and their success demonstrates the value of hardware-based security in defeating advanced malware.”
Bromium counts a rapidly growing customer base of Fortune 500 companies and government agencies, including NYSE, BlackRock, and ADP.
Related Reading: Application Sandboxes Won’t Stop Advanced Attacks

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- Watch Now: Threat Detection and Incident Response Virtual Summit
- Registration Now Open: 2023 ICS Cybersecurity Conference | Atlanta
- NetRise Adds $8 Million in Funding to Grow XIoT Security Platform
- Virtual Event Today: Zero Trust Strategies Summit
- Virtual Event Tomorrow: Zero Trust Strategies Summit
- Watch: How to Build Resilience Against Emerging Cyber Threats
- Video: How to Build Resilience Against Emerging Cyber Threats
- Webinar Today: Understanding Hidden Third-Party Identity Access Risks
Latest News
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
- Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals
