You are on page 1of 12

Bromium Advanced

Endpoint Security
Realizing the Potential of Next-Generation Endpoint Protection
Contents Introduction
Preventing zero-day attacks
Detect to protect: a flawed model
99% is not the answer
Adopting a new approachthe adaptive security architecture
Summary
BROMIUM ADVANCED ENDPOINT SECURITY 02
Introduction
Cyber security seems to be repeating itself. Each year brings the According to leading research
analysts, cyber-security spending
promise of improved security solutions, but this promise falls approached $75B in 2015; however,
short against the reality of continuous data breaches. according to the Identity Theft
Resource Center, the number of
It has become apparent that the majority of security solutions dont U.S. data breaches totaled 781
in 2015 with millions of records
live up to the hype, yet cyber-security spending has become irrational. compromised.
Security solutions continue to repeat the same mistakes as their SOURCE: WWW.IDTHEFTCENTER.ORG

predecessors, yet security professionals continue to purchase them,


expecting a different result. Some have defined this as insanity.
We must unlock the hidden potential of our computer systems to
develop infrastructure that is secure by design. This is not a problem
that can be solved by throwing money and manpower at it because
there are far too many attacks and alerts to manage. Instead, we
must unlock the hidden potential of our systems to make them
secure by design.

BROMIUM ADVANCED ENDPOINT SECURITY 01


Preventing One of the greatest
challenges for any security
are spending more and
more on layered security

zero-day
team is preventing zero- solutions, which add cost
day attacks and detecting and complexity, but do not
attempted breaches in solve the problem since
attacks. progress. Enterprises are
fighting a losing battle against
they are based on detection.
The endpoint is by far the
todays advanced, targeted weakest link and the number
and often undetectable one attack vector.
cyber attacks. Enterprises

Your organization does not have to


fall prey to the fatalism of the youve
already been breached but dont know
it yet set. Those are the narratives of
executives who know they are failing
and seek solace in collective failure.
SIMON CROSBY, CTO AND
CO-FOUNDER, BROMIUM

Those who cannot learn from history


are doomed to repeat it.
GEORGE SANTAYANA
Only 50% of organizations patch
zero-day vulnerabilities in the first week

BROMIUM ADVANCED ENDPOINT SECURITY 03


Detect to From an endpoint protection
perspective, solution vendors,
crafted by determined and
skilled threat actors. The
bad. Moreover, as reported
by Verizon, more than 70%

protect:
for the most part, rely on latest approach gaining of breaches used malware
trying to detect malicious attention, machine learning, that was customized to the
activity. However, detection is similarly challenged. specific environment of the
a flawed rates for todays advanced
threats are typically around
Normal behavior cannot be
easily defined, which makes it
target. Antivirus and other
security products that claim
model. 5-10%. Whether incorporating
techniques such as behavioral
difficult to detect anomalies.
Training a machine-learning
to be able to detect malware
quite simply cannot keep
analysis, heuristics or artificial engine with human experts up. The arms race between
intelligence, the fact is is time consuming and attackers and vendors favors
detection-based approaches expensive, and no guarantee the attacker.
hinge on the ability to for success.
accurately distinguish We need to accept that, just
legitimate applications and like us, our computers cannot
files from malicious threats reliably distinguish good from

IT and security administrators


said too many false positives
are keeping them from being
confident on breach detection.
ENTERPRISE MANAGEMENT
ASSOCIATES

BROMIUM ADVANCED ENDPOINT SECURITY 04


99% is not In controlled test
environments, traditional
the course of 2015. This
nets out to approximately
particularly when you consider
that the 1% that gets

the answer.
and next-gen AV vendors 230,000 new malware through likely comprises
split hairs at the 99% catch- samples per day. This figure, the more difficult and
rate level. With each year compounded with other catastrophic threats. The
proving to be a banner year disturbing trends highlighted question remains: should
for malware variants and in the 2016 Verizon Data customers feel safe even
evasion techniques, running Breach Investigations Report, with a 99% protection rate
the math exposes the fallacy underscore how quickly over critical threat vectors?
of detection even more starkly. cybercriminals are modifying Given the stakes involved,
According to a new report their code to avoid detection. organizations cannot afford
from Panda Security more 1% of 84,000,000 is an to settle for good enough.
than 84 million new malware unacceptable number,
samples were collected over

99% of malware hashes are seen for


only 58 seconds or less. In fact, most
malware was seen only once
BROMIUM ADVANCED ENDPOINT SECURITY 05
Adopting In the report, Designing an
Adaptive Security Architecture
protection requires an
adaptive protection process
deliver strong monitoring
capabilities in the isolation

a new for Protection From Advanced


Attacks, Gartner analysts
integrating predictive,
preventive, detective and
environment. Virtualization
enables endpoints to
Neil MacDonald and response capabilities. hardware isolate each task
approach Peter Firstbrook wrote,
Enterprises are overly
Adopting this approach that processes untrusted
content, defeating attacks
the adaptive dependent on blocking
and prevention mechanisms
requires solutions that
can address the entire automatically even if the
endpoint is unpatched,
threat life cycle. Isolation
security that are decreasingly
effective against advanced
solutions are an excellent
complement to detection
eliminating potential
breaches or the requirement

architecture. attacks. Comprehensive solutions, particularly if they for remediation.

PREDICTIVE PREVENTIVE

ADAPTIVE

RETROSPECTIVE DETECTIVE

BROMIUM ADVANCED ENDPOINT SECURITY 06


Bromium Advanced Proactive Endpoint
Endpoint Security Protection
Bromium Advanced Bromium Endpoint Protection
Endpoint Security is the only enables complete protection
solution that protects an against both known and
enterprise from breaches unknown attacks. Micro-
while enabling users to click virtualization hardware
on anything without risk isolates untrusted websites,
of compromise. There are email, documents, USB
three core components that and executables to defeat all
enable Bromium to deliver malware including viruses,
the worlds most secure Trojans and zero-day attacks,
endpoint: Protect, Detect even on unpatched machines
and Respond. and untrusted networks.

Protect Detect Respond

BROMIUM ADVANCED ENDPOINT SECURITY 07


Sophisticated Monitoring Real-time Analysis
Eliminates Security Gaps Enables Instant Response
Bromium Endpoint Bromium Threat Analysis
Monitoring delivers real-time provides real-time attack
detection and monitoring visualization and threat
of threat activity. Micro- intelligence. Bromium
virtualization enables consolidates and correlates
introspection, delivering all sensor data for real-time
continuous host monitoring visualization of the entire
for untrusted execution. attack kill chain. The Bromium
Enterprises can quickly threat cloud provides
detect and contain an intelligence into known-bad
attempted breach on and newly discovered attacks,
unprotected systems. which integrates with SIEM
solutions. Continuous host
monitoring and live attack
visualization deliver real-time
intelligence, without false
positives, for rapid incident
response.

BROMIUM ADVANCED ENDPOINT SECURITY 08


Summary
Bromium has pioneered the next generation of endpoint protection
that eliminates breaches. Just as virtualization transformed IT,
Bromium is transforming security with its unique micro-virtualization
technology. Bromium provides the worlds most advanced endpoint
security, even against the most sophisticated zero-day malware.
Unlike traditional security technologies, such as antivirus or virtual
containers, which rely on ineffective detection techniques, Bromiums
solution automatically isolates each user task in a lightweight, CPU-
enforced, micro-VM. This enables users to click on anything without risk
of compromise, protecting the enterprise. Bromiums technological
innovations have earned the company numerous industry awards.

The worlds most advanced


endpoint security

BROMIUM ADVANCED ENDPOINT SECURITY 09


Bromium, Inc. Bromium UK Ltd. For more information go to www.bromium.com
20813 Stevens Creek Blvd Lockton House or contact sales@bromium.com
Cupertino, CA 95014 2nd Floor, Clarendon Road
info@bromium.com Cambridge CB2 8FH Copyright 2016 Bromium, Inc. All rights reserved.
+1.408.213.5668 +44.1223.314914 EB.BAES.US-EN.1606

You might also like