Good things come in small packages

5:24 PM
Good things come in small packages -

Now that Brom launched, we have asked our Citrix friends come visit their blog for a spot of tea (as Simon Crosby could say) and to write a few words about what we do, what they do, and how we can solve customer problems together. Ok, ditching the king 'us' and move to me.

Four months after leaving Citrix, I'm super excited to be officially tell you about the Bromium Microvisor ™, our second-generation virtualization platform that takes a revolutionary new approach to the use hardware virtualization. As the title of this blog states, good things come in small packages - we call ours micro-virtualization, in order to manufacture inherently safe and dignified end trusted devices

The Bromium Microvisor protects automatically each task on the vulnerable. operating system and hardware instantly isolates in a virtual computer, which is a lightweight material of insulation container argued that access to all services of the operating system policy. virtual computers running natively on the operating system without impact on performance, but to protect the system permanently - even against unknown threats: A micro-VM can only access the services of the operating system or peripheral via simple commands pausing the tasks and instantly arbitrate access by the Microvisor. This provides a safety net of unbreakable material for all insulation technologies the software used by the operating system and applications, and impose strict controls on access to sensitive data, networks and other resources .

In the desktop arena, applies Bromium micro-virtualization in a Windows desktop running to automatically identify and instantly isolate individual tasks, protection against current and future attacks targeted design. The technology has broad applicability, protection terminals to the consumerization of IT. But let's talk about desktop virtualization.

XenDesktop fulfills an essential role in enterprise IT. workstations and Windows applications are here to stay. However, users will still human (and by that I mean gullible and fallible, like me and you) and the software will always be vulnerable, so that the wicked will enter. The architecture of the system Brom assumes that users will make mistakes, and that zero-day vulnerabilities are inevitable. It is built from the ground with the presumption that micro-VM will be compromised at some point, but ensures that the attacker could not gain access to sensitive data or applications, or continue an attack. A micro-VM can only access data on a "need to know", and all the changes it makes are nulled soon as the user closes the application, and automatically disabling malware and eliminate costs sanitation, even for PCs that have not been patched.

In Citrix-speak, whatever the FlexCast flavor you can use to deliver your Windows desktops and applications, our technology can guarantee the security of end to end users on laptops using Citrix Receiver to access their hosted sessions. Brom protects data on the device while running, and to prevent attacks from all external vectors (USB, web, applications, MIME types, etc.) on the client by design - so there is no risk of "personal" of a user's activities, such as browsing the web or web-mail receiver compromise, browser, office or business. To this end, we are working with Citrix on the development of Brom plug-in receiver and are looking for beta customers who put Receiver in their business.

With the Bromium Microvisor on all company laptops, there would be no risk of an attack, as the APT RSA compromise, in which a user can click on an infected attachment and expose the most sensitive company information for malware. In addition, our technology provides secure end to end access for enterprise web applications, SaaS or enterprise apps / clouds isolating individual websites in virtual computers that are not only protected against Outside vectors mentioned above, but also from each other. This translates to complete security for anyone using a rich client to access a hosted Citrix environment.

If we start thinking outside the endpoint, Bromium micro-virtualization could also be used to protect server-side browsers or other hosted productivity applications and vulnerable MIME type, which prevents attack compromise the Windows Server instances running client applications ... But I'm ahead of me.

From the Bromium plug-in for the receiver, we continue to explore the data state, workstations and applications in nature, I am sure we will find many more cases of use, and we look forward to working closely with Citrix on joint solutions that will benefit all types desktop deployment in the enterprise. Bromium micro-virtualization is the only technology that can enable secure applications and data secure and not to coexist on a single system with guaranteed mutual isolation. Please give us a visit to www.bromium.com to learn more and join the conversation!

Previous
Next Post »
0 Komentar