Government Application Isolation and Control Demo with Video
- We will be at TechNet Augusta on August 7-11. Visit us at booth 112.
- We will be at DoDIIS Worldwide Conference on August 13-16 in St. Louis. Visit us at booth 739.
- Discover how application isolation and containment is the long-term strategy for cyber resilience.
If you’re responsible for government cybersecurity, we’ve got something you’ll want to see. We will be attending both TechNet Augusta and DoDIIS and we hope you take this opportunity to meet with us and find out how we’re securing democracies around the world.
What we do is called application isolation and containment and it’s the recommended approach to stopping malware from entering via the endpoint. The moniker, application isolation and containment, has been made popular by the National Security Agency (NSA). They detailed how Application Isolation is the way forward for finally stopping advanced, zero-day, and nation-state malware. It’s based on virtualization. Each time a user opens a browser tab, runs an application and launches a file or downloads something, it’s executed inside a micro-VM – an isolated container. Since the execution is contained, the malware can’t escape and the endpoint and network are not compromised. Moreover, our reporting and monitoring let you act quickly on the information contained inside the micro-VM so SOC teams can immediately review the threat information. It’s pretty cool – you can see a demo of ransomware being contained below.
Read the entire article here, government application isolation and control demo
via the fine folks at Bromium