Bromium’s Virtualization-Based Cybersecurity Now Protects Legacy Applications

Government and Business Can Now Easily Reduce Some of Its Greatest Risks


LAS VEGAS, Aug. 30, 2017 (GLOBE NEWSWIRE) -- Today at VMworld 2017, Bromium®, Inc., the pioneer and leader in virtualization-based enterprise security that stops advanced attacks, announced it has launched Bromium Secure App Extensions that extends the protection provided by the Bromium Secure Platform to legacy applications. The application isolation and control delivered by Bromium via virtualization for core enterprise applications like Microsoft Office, Adobe and web browsers can now be used to protect some of the legacy and most vulnerable software running in business and government.

“Our customers describe legacy and often unsupported applications as one of their highest risks,” said Gregory Webb, Bromium CEO. “They know it’s a problem, but these apps are often part of a company’s DNA – to swap them out requires an incredible effort. They often have hundreds of these applications, and while organizations work to move them to the cloud or a modern infrastructure, they remain at risk.”

Legacy applications are integral to most businesses and are heavily relied upon in the public sector. According to Gartner, Inc.’s 2017 CIO Agenda survey*, 51 to 60 percent of government core business applications were implemented between 1990 and 2009, depending on the tier of government. By comparison, top performing organizations in the private sector report 42 percent of their core business applications date from the same time period.

“A majority of government entities are weighed down by their legacy applications,” said Sherban Naum, Vice President, Worldwide Public Sector at Bromium. “Cybersecurity is at the core of every government mission and activity, which are severely strained in both resources and funding. Legacy applications that have been discontinued by their vendors remain vulnerable and un-patchable, yet organizations must maintain them. Now that our patented micro-virtualization technology can be extended to these highly vulnerable tools, security leaders can secure these applications without costly, complex and disruptive upgrades.”

Virtualization-based security with application isolation works silently and unobtrusively, protecting each activity. With Bromium, whenever users run these legacy applications, every activity — even a task that may be processing untrusted data or malicious code — is hardware-isolated in a micro-VM. This provides friction-free protection that allows employees to click on anything without risk of compromise.

Bromium delivers preventive cybersecurity that doesn’t require a patient zero. It self-defends and self-remediates, providing tremendous advantage over the traditional protect-and-defend approach. Bromium lets organizations protect endpoints against both known and unknown attacks, including zero-day attacks, polymorphic malware, and spear-phishing attacks, which are becoming increasingly sophisticated and frequently targeted at corporate IP and customer data and government entities by rival nation-states, cybercriminals and terrorist groups.

Bromium Secure App Extensions is initially available via Bromium professional services.

* http://www.logisticsmgmt.com/article/global_logistics_no_shortcuts_to_security

About Bromium, Inc.
Bromium protects your brand, data and people using virtualization-based security. We convert an enterprise’s largest liability - endpoints and servers - into its best defense. By combining our patented hardware-enforced containerization to deliver application isolation and control, with a distributed Sensor Network to protect across all major threat vectors and attack types, we stop malware in its tracks. Unlike traditional security technologies, Bromium automatically isolates threats and adapts to new attacks using behavioral analysis and instantly shares threat intelligence to eliminate the impact of malware. Bromium offers defense-grade security and counts a rapidly growing set of Fortune 500 companies and government agencies as customers.

Visit Bromium: https://www.bromium.com 
Read the Bromium blog: http://blogs.bromium.com/ 
Follow Bromium on Twitter: https://twitter.com/bromium 
Follow Bromium on LinkedIn: https://www.linkedin.com/company/bromium


            

Contact Data