Videos

Published on May 31st, 2018 📆 | 5879 Views ⚑

0

Here’s a better way to defeat ALL malware with Bromium from Alpha Gen


https://www.ispeech.org



We live in an imperfect world. Which is all very well but when the only perfectly secure computer is one encased in concrete and thrown in a river, giving safe access to my network makes my job as Chief Information Security Officer very difficult.

The traditional model of defence, especially cyber defence is DETECT to PROTECT, but detection isn’t a perfect model and, we haven’t reached the stage where I can issue my users with a new laptop everytime they click on something bad. - OR HAVE WE?

I had a chance meeting with a guy from BROMIUM and he said they can do exactly that. He said I can let my users get back to work because if they click on something bad, be that public internet access or downloading an unknown file and then, they can dispose of that environment completely.

Rather than re-inventing a slightly different wheel and finding a better way to DETECT, BROMIUM use a container to PROTECT. I can segment my user’s PCs, splitting their individual sessions between trusted and untrusted applications.

Now, using BROMIUM, I can protect each user’s laptop so they can run their Windows applications, intranet, internal emails and access their databases and share files, all within an isolated portion of their PC

In a separate segment, every untrusted process runs in its own little containerised box , enabling them to access the wider internet, open attachments from external sources and even read from a USB stick without the fear of cross contamination due to an attack.





My other layers of protection, such as Firewalls, IDS/IPS and malware scanning, can still remain in place and do their best to detect incoming attacks, but by using BROMIUM I don’t have to wait to ‘owned’ by the threat to detect the malware.

These boxes, or MICRO VIRTUAL MACHINES, as BROMIUM call them, all run within the user’s PC, so any malware that tries to infect or embed will fail because it can’t get out of its own box and when the user finishes their task the box disappears. It’s like using a laptop once and then disposing of it.

So, I have created a disposable solution that also disposes of the tyranny of a cyber-attack on my existing Windows users without training them to be security officers or issuing them with a bag of single use laptops.

So, if you want to protect your network, your users and, your job! Think inside the box! Give BROMIUM a call.

source

Tagged with: • • • • • • • • • • • •



Comments are closed.