Overview

Bromium was founded in 2010 with a mission to restore trust in computing. The company's founders, Simon Crosby, and Ian Pratt, have a long and deep history of innovation in virtualization and security. Bromium uses hardware-enforced virtualization-based security to protect your intellectual property from theft via cyber-attacks. We restore productivity because your team members can use apps, download and browse confidently without restriction. With application isolation and control, we contain threats to the endpoint and provide real-time threat intelligence so you can see what's happening without any risk of breach.

Products

Bromium Secure Monitoring™

Improve Performance over Native Systems.

Key Benefits:

  1. Safely access websites without risk of infection
  2. Malicious sites contained & rendered harmless
  3. Protection for the way your users work
  4. Bromium secure platform integration

Key Features:
  1. Protect against malicious URLs and websites
  2. Control over trusted websites
  3. High-performance web browsing
  4. Enterprise browser support


Bromium-protected systems actually improve their resource utilization over native Windows systems that are not protected by Bromium across a range of important metrics.
Including: Improved CPU performance, faster page file access, and increased input/output operations on Virtual Desktop Infrastructure.

Bromium Secure Files™

Interact with Files in the Usual Expected Ways.

Key Benefits:

  1. Safely access files from any inbound source
  2. Malware is contained and rendered harmless
  3. Simplified deployment and management
  4. Bromium secure platform integration

Key Features:

  1. Protect against malicious files
  2. Ingress application and email protection
  3. Secure editing and printing
  4. Granular policy controls

Even though each untrusted file opens within a secure micro-VM, users still have full access to do their jobs-they can read, edit, save, copy, and perform other file actions based on your administrative settings-safe in the knowledge that no malicious activity can ever reach the host PC, the file system, or network resources.

Bromium Secure Browsing™

Secure Platform Integration and Customization

Key Benefits:

  1. Complete attack visibility
  2. Comprehensive protection
  3. Reduced total cost of ownership

Key Features:

  1. Real time monitoring
  2. Application flow analysis
  3. Threat data auditing

Bromium Secure Monitoring integrates with Bromium Secure Files and Bromium Secure Browsing for unmatched protection and visibility. Administrators can customize the threat model, allowing enterprises or government agencies to specify custom rules to flag malicious behavior. This threat model is applied in real time to the Application Flow to identify active malware.

Contracts

Federal

GSA Schedule 70

GS-35F-0119Y
Dec 20, 2011- Dec 19, 2016

SEWP V

NNG15SC03B/NNG15SC27B
May 01, 2015- Apr 30, 2020

State and Local

CMAS

3-12-70-2247E
Aug 28, 2012- Dec 19, 2016

City of Seattle Contract

0000003265
Jul 11, 2014- Dec 19, 2016

Department of General Services PA - Symantec

4400004253
May 01, 2009- Jun 17, 2017

Orange County National IPA Co-Op

MA-017-16010236
Jun 01, 2015- May 31, 2018

State of Indiana Contract

0000000000000000000021430
Aug 01, 2017- Jul 31, 2019

State of New Mexico Contract

80-000-18-00002
Aug 01, 2017- Aug 01, 2021

Education

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022
*Additional Option Years Available

VASCUPP

UVA1482501
May 02, 2014- Dec 19, 2016

Events

Archived Events

News

Latest News

Bromium®, Inc., the leader in virtualization-based security that stops advanced malware attacks via application isolation and containment, announced today that the U.S. Department of Defense’s ...
READ MORE >
Carahsoft Technology Corp., The Trusted Government IT Solutions Provider™, today announced that it has been named an official distributor for Bromium, Inc., the leader in virtualization-based ...
READ MORE >

Resources

Datasheet





The Wanna Decryptor, also known as WannaCry, is an encryption ransomware that will take an end user’s device hostage. It’s designed to block access to your files and demands a ransom of $300-$600 in bitcoin equivalent to regain access to your data. WannaCry malware is a nonpartisan digital we...

Resource


Resources

At Bromium, we encourage our customers to share their threat data. All data is reviewed and triaged by our analysts to provide your organization with actionable insights about recent threats and most notable techniques used by attackers. Find out more about how you can become a part of the threat sh...

Solutions Brief

Bromium protects endpoints using virtualization-based security. Bromium Secure Platform stops attacks by containing each task inside a micro-virtual machine, isolating any malware. Bromium Protected App uses hardware-enforced virtualization on the endpoint, creating total isolation for the client ap...

Video

Bromium co-founder Simon Crosby describes why detection fails and how Bromium provides enterprise-grade security through application isolation.

Whitepaper

IT security teams within federal government agencies and their contractors face a daunting series of challenges in securing their networks against modern malware intrusions, including advanced persistent threats (APTs), advanced targeted attacks (ATAs), polymorphic malware, and file-less intrusions....