Bromium was founded in 2010 with a mission to restore trust in computing. The company’s founders, Gaurav Banga, Simon Crosby, and Ian Pratt, have a long and deep history of innovation in virtualization and security. Inspired by the isolation principles of traditional virtualization, the Bromium team has created a game-changing new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware. Bromium has its headquarters in Cupertino, California, and an R&D center in Cambridge, UK. The company is backed by top-tier investors, including Andreessen Horowitz, Ignition Capital, Highland Capital Partners, Intel Capital, Meritech Capital and Lightspeed Venture Partners.
Bromium is focused on the global enterprise security market, projected by Gartner to grow to $30B in 2014. This market has long been dominated by detection-based security products, which use signatures, behaviors, or heuristics to identify potential threats. However, these technologies have become ineffective and unable to detect or protect against the growing number of polymorphic cyber threats, zero-day attacks, and APTs that are impacting enterprise organizations worldwide.
Bromium vSentry provides protection at the endpoint against all advanced malware. vSentry automatically creates hardware-isolated micro-VMs that secure every user task – such as visiting a web page, downloading a document, or opening an email attachment. Each task runs in its own micro-VM, and all micro-VMs are separated from each other, and from the trusted enterprise network. If malware targets the end user, the threat is contained in the hardware-isolated micro-VM. Consequently, it is never able to steal or damage the user or enterprise’s information, and is destroyed when the task is completed. vSentry is transparent to the end user, and has no discernable impact on user experience or system performance.
Bromium LAVA (Live Attack Visualization and Analysis) is a complementary product to vSentry that adds enormous value for Security Operation Centers (SOCs). LAVA converts each micro-VM in the enterprise into a honeypot and automates the time-consuming post-attack malware analysis process. For example, if a vSentry endpoint is attacked within an isolated micro-VM, the entire attack is automatically and instantly recorded, then forwarded to the LAVA console in the SOC. This provides security teams with the results of an automatic in-depth analysis of the advanced malware.Independent Software Vendor (ISV)
Use of the SDxCentral service directory is governed by our Terms of Service, including without limitation those sections under the headings "CONTENT", "LICENSING AND OTHER TERMS APPLYING TO CONTENT POSTED ON THE SDXCENTRAL SITES", "INDEMNITY; DISCLAIMER; LIMITATION OF LIABILITY" AND "COPYRIGHTS". Under no circumstances will SDxCentral be liable in any way for any Content, including, but not limited to, liability for any errors or omissions in any Content or for any loss or damage of any kind incurred as a result of the use of any Content posted, emailed or otherwise transmitted via the Sites.