Virtualization Security Resources

Virtualization Security news and support resources, featuring the hottest solutions, technologies and vendors in the Virtualization Security world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Virtualization Security"

Malicious Phishing Stopped Via Application Isolation from Bromium

Bromium
Use Bromium to stop malicious phishing and safely open any shared web link from email or chat clients Eliminate restrictive IT security policies that limit user access to shared URLs Protect remote and roaming endpoints from malicious links when outside of layered defenses The news isn’t good. Malicious phishing links in email and chat clients […]

Malicious Email Attachments Stopped Via Application Isolation

Bromium
Safely open any email attachment from Outlook or web mail, even if it contains malware Eliminate restrictive IT security policies that limit access to email attachments Improve user productivity by removing the risk of opening malicious email attachments Email attachments drive cybersecurity experts nuts. Despite advancements in malware detection, malicious email attachments are still getting […]

Protect against the undetectable Process Doppelgänging with Bromium

Bromium
Process Doppelgänging is a new code injection technique that bypasses most security tools and works on all Windows versions. Relying on detect-to-protect security solutions will leave you vulnerable to Process Doppelgänging. Bromium executes untrusted tasks in a hardware-isolated virtual machine, so you are always protected, even from zero-days and new, undetectable technique. What is Process […]

CISOs discuss micro-virtualization (VM) for endpoint security protection

Bromium
New Security Current report compiles advice and recommendations for endpoint security solutions from 13 CISOs across a variety of industries Hear why CISOs recommend application isolation for endpoint security protection See the value of application isolation provided via virtualization-based security when compared to traditional endpoint security approaches Download the report: CISOs Investigate: Endpoint Security Cloud. Mobile. […]

Browser Isolation with Microsoft Windows Defender Application Guard

Bromium
Microsoft brings hardware isolation to the web browser Bromium and Microsoft have similar approaches to browser isolation using virtualization Microsoft protects only their own OS and proprietary Microsoft applications Bromium works with all Microsoft VBS technologies, and together we secure far more of the Windows attack surface than Microsoft does on its own Creating momentum […]

Bromium Emotet Banking Trojan polymorphic malware analysis

Bromium
We analyzed samples containing the Emotet banking trojan and broke down the findings in a side-by-side comparison. Malware authors are repacking their malicious software into a unique executable for each potential victim, avoiding any-and-all signature-based detection. Repacked dropped executables on this scale are unprecedented, and this is why application isolation and control is so important. […]

Phishing Trojan Campaign Morphs at Scale to Defeat Legacy Detection

Bromium
Phishing attacks are nothing new, but we are noticing a new trend for polymorphism, both in the wrapping document and in the dropped executable. In samples that are literally minutes old, we see the control server is re-obfuscating and updating the malware faster than anti-virus programs are updating their awareness. The changes made are more […]

VMware: HyTrust Celebrates 10 Years & The Future Of Multi-Cloud Security

VMware
As cloud adoption in the enterprise continues to rise, security in the cloud remains one of the top concerns for organizations going through or planning a cloud migration. Survey after survey shows that security is still a top concern and partial barrier for many cloud migrations. As part of our most recent RoadCast video series, we met […]

Protect your intellectual property with application isolation

Bromium
Detection-based IT security solutions have never worked, and will never work. More security layers is not the answer, but smarter layers can work. Shift your mindset from “prevent, detect, and respond” to “isolate, contain, and control.” Layer after layer of security is not stopping breaches. We can’t keep the bad guys out. Oddly enough, 80+ years […]

CISO’s Dilemma When Productivity and Cybersecurity Face Off

Bromium
Today organizations are struggling with the best way to protect against attacks that are targeting the endpoint. Too often, the security strategy has been to put the onus on the individual employee. Research has shown, over and over again, that training and user restrictions are both tedious and expensive, and have a very low success […]

The Application is the Endpoint

Bromium
Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes It’s time to rethink information security defense around fewer, smarter, yet more effective layers You have many more endpoints than you think. How many endpoints do […]

IBM and VMware Partnership Speeds Cloud Adoption in the Enterprise

VMware
More than 1,400 Enterprises such as Honeywell International Tapping into IBM Cloud for VMware Solutions VMworld® Europe 2017, IBM (NYSE: IBM) and VMware, Inc. (NYSE: VMW) announced that more than 1,400 enterprises in nearly every industry around the world are extending their VMware environments to the IBM Cloud. Through the partnership, clients such as Honeywell International and Vodafone are using IBM Cloud’s global reach and cloud-native services, and the infrastructure […]

Protect Legacy Applications from Cyber Attacks

Bromium
Legacy applications are integral to most businesses and are heavily relied upon in the public sector Many legacy applications were written in a time when security was much less of a concern than today Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes Detection is obsolete and the future of […]

Bromium: VMworld 2017 Virtualization-Based Security Dazzled and Amazed

Bromium
We were so happy to be in our element with folks who understand the inherent value in virtualization. From booth demos to our theater presentation on the Showcase stage to the private breakfast with The Godfathers of Virtualization, we received amazing feedback. We look forward to bringing our solution to your business – is it […]

Visit Our Sponsors

Close