Virtualization Security Resources

Virtualization Security news and support resources, featuring the hottest solutions, technologies and vendors in the Virtualization Security world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Virtualization Security"

Ian Pratt, Bromium Co-Founder, Speaks on Spectre and Meltdown – Video, Part 1

Bromium
0
The Intel chip vulnerability triggered Spectre and Meltdown – information leakage vulnerabilities. Both let attackers that have execution in some unprivileged user space to read data belonging to other processes, even more privileged ones including the kernel itself. Meltdown only effects Intel CPUs, whereas the Spectre vulnerability is present on pretty much all modern CPUs […]

Bromium Response Intel CPU Design Flaw Remediation

Bromium
0
The design flaw has been in existence for the last decade and does not affect Bromium. Operating system vendors are the only ones who can remediate the vulnerability. The Microsoft patch – out today – requires Bromium customers to upgrade before patching Windows. Spectre or Meltdown cannot be directly used to steal information from an […]

Malicious Phishing Stopped Via Application Isolation from Bromium

Bromium
0
Use Bromium to stop malicious phishing and safely open any shared web link from email or chat clients Eliminate restrictive IT security policies that limit user access to shared URLs Protect remote and roaming endpoints from malicious links when outside of layered defenses The news isn’t good. Malicious phishing links in email and chat clients […]

Malicious Email Attachments Stopped Via Application Isolation

Bromium
0
Safely open any email attachment from Outlook or web mail, even if it contains malware Eliminate restrictive IT security policies that limit access to email attachments Improve user productivity by removing the risk of opening malicious email attachments Email attachments drive cybersecurity experts nuts. Despite advancements in malware detection, malicious email attachments are still getting […]

Protect against the undetectable Process Doppelgänging with Bromium

Bromium
0
Process Doppelgänging is a new code injection technique that bypasses most security tools and works on all Windows versions. Relying on detect-to-protect security solutions will leave you vulnerable to Process Doppelgänging. Bromium executes untrusted tasks in a hardware-isolated virtual machine, so you are always protected, even from zero-days and new, undetectable technique. What is Process […]

CISOs discuss micro-virtualization (VM) for endpoint security protection

Bromium
0
New Security Current report compiles advice and recommendations for endpoint security solutions from 13 CISOs across a variety of industries Hear why CISOs recommend application isolation for endpoint security protection See the value of application isolation provided via virtualization-based security when compared to traditional endpoint security approaches Download the report: CISOs Investigate: Endpoint Security Cloud. Mobile. […]

Browser Isolation with Microsoft Windows Defender Application Guard

Bromium
0
Microsoft brings hardware isolation to the web browser Bromium and Microsoft have similar approaches to browser isolation using virtualization Microsoft protects only their own OS and proprietary Microsoft applications Bromium works with all Microsoft VBS technologies, and together we secure far more of the Windows attack surface than Microsoft does on its own Creating momentum […]

Bromium Emotet Banking Trojan polymorphic malware analysis

Bromium
0
We analyzed samples containing the Emotet banking trojan and broke down the findings in a side-by-side comparison. Malware authors are repacking their malicious software into a unique executable for each potential victim, avoiding any-and-all signature-based detection. Repacked dropped executables on this scale are unprecedented, and this is why application isolation and control is so important. […]

Phishing Trojan Campaign Morphs at Scale to Defeat Legacy Detection

Bromium
0
Phishing attacks are nothing new, but we are noticing a new trend for polymorphism, both in the wrapping document and in the dropped executable. In samples that are literally minutes old, we see the control server is re-obfuscating and updating the malware faster than anti-virus programs are updating their awareness. The changes made are more […]

VMware: HyTrust Celebrates 10 Years & The Future Of Multi-Cloud Security

VMware
0
As cloud adoption in the enterprise continues to rise, security in the cloud remains one of the top concerns for organizations going through or planning a cloud migration. Survey after survey shows that security is still a top concern and partial barrier for many cloud migrations. As part of our most recent RoadCast video series, we met […]

Protect your intellectual property with application isolation

Bromium
0
Detection-based IT security solutions have never worked, and will never work. More security layers is not the answer, but smarter layers can work. Shift your mindset from “prevent, detect, and respond” to “isolate, contain, and control.” Layer after layer of security is not stopping breaches. We can’t keep the bad guys out. Oddly enough, 80+ years […]

CISO’s Dilemma When Productivity and Cybersecurity Face Off

Bromium
0
Today organizations are struggling with the best way to protect against attacks that are targeting the endpoint. Too often, the security strategy has been to put the onus on the individual employee. Research has shown, over and over again, that training and user restrictions are both tedious and expensive, and have a very low success […]

The Application is the Endpoint

Bromium
0
Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes It’s time to rethink information security defense around fewer, smarter, yet more effective layers You have many more endpoints than you think. How many endpoints do […]

IBM and VMware Partnership Speeds Cloud Adoption in the Enterprise

VMware
0
More than 1,400 Enterprises such as Honeywell International Tapping into IBM Cloud for VMware Solutions VMworld® Europe 2017, IBM (NYSE: IBM) and VMware, Inc. (NYSE: VMW) announced that more than 1,400 enterprises in nearly every industry around the world are extending their VMware environments to the IBM Cloud. Through the partnership, clients such as Honeywell International and Vodafone are using IBM Cloud’s global reach and cloud-native services, and the infrastructure […]

Visit Our Sponsors

Close