Bromium sets up business net around malware (Update)

Sep 19, 2012 by Nancy Owano report
Credit: Bromium

(Phys.org)—Bromium has announced the availability of a product intended to make a significant difference in how enterprises cope with relentless attempts to attack their systems with malware, burdening IT departments and preventing employees from carrying on business as usual. The only headaches inherent in Bromium's product might beset rival security companies that do business in anti-virus software and data protection. Ian Pratt, Bromium co-founder, said, "Traditional security products rely on being able to look at any document in advance and decide whether it contains malicious code which can be identified by `signatures' already reported.... Yes, a bit like after the horse has bolted."

Bromium's software product is called vSentry, and the technology approach rests on a micro-virtual machine—an isolated environment— that protects the underlying operating system and whatever content is stored on the machine from malware.

The microVM isolates attacks, trapping malware and analyzing it so that IT staff can explore it further without interruption to employee computer users. According to its designers, a PC user at a company would not be aware that it is installed. The machine tracks employee use of the web. All the data from a website visit is contained. vSentry places each document into this virtual machine. If someone clicks a bad link, the micro-VM will keep it until the IT administrator views and disposes of it. The virus cannot escape from the safety shield of this environment to enter the actual computer.

The company's target is the enterprise customer, because that is where the opportunity lies for the virtual machine approach. vSentry is licensed per-user, enterprise wide, and priced according to volume. Security teams may have ample expertise but they cannot actively block attacks they never saw before. The vSentry appeal is not just that employees can be free to work without fear of bringing up viruses, but that the information captured for the dashboard provides information on the malware attempts. The company says that the information via vSentry's "Live Attack Visualization and Analysis" (LAVA) feature delivers information about the attack's origin, techniques, and targets.

Rather than reducing the need for a security team, the product gives them more power to work on security protection for the business with better success. Bromium says its LAVA delivers high malware detection rates. Micro-VM analysis can look at forms of attack that include rootkits and bootkits and generate signatures for otherwise undetectable attacks. The idea is that an enterprise security team can in turn update security mechanisms or fortify defenses of specific attack targets.

The drawback is that the product only works on Windows. Platform requirements in full are given as Intel i3, i5, i7 processor; 4 GB RAM; Windows 7 64-bit. It does not run on Macs and it does not run on ARM architectures.

This video is not supported by your browser at this time.
Credit: Bromium

Some outsiders say that this represents lost opportunity for the company as, on the enterprise level, more employees are using iPads and mobile devices to do their work. Nonetheless, the company co-founders have told reporters that in time wider support is in the works including versions for Windows 8 and Mac OSX. This week's product announcement had some sites voicing superlatives, implying the software can do a lot to mitigate the business angst and costs of computer malware.

Explore further: Microsoft expands ad-free Bing search for schools

More information:
www.bromium.com/
www.bromium.com/misc/Bromium_vSentry_WP.pdf

Related Stories

Malware can take ugly leap forward to virtual machines

Aug 23, 2012

(Phys.org) -- A piece of malware categorized as a malicious rootkit can spread via an installer disguised as an Adobe Flash Player installer and is capable of spreading to four different platform environments, ...

'Sabpab' Trojan seeks out Mac OS X

Apr 17, 2012

(Phys.org) -- Three compelling reasons that Mac loyalists say justify their love for Macs have been that Macs are 1) the prettiest computers around (2) ideal for any new-age brain that prefers visually rich ...

Intel-McAfee preview new rootkit weapon

Sep 16, 2011

(PhysOrg.com) -- Letting everyone know that today's computing is no longer about running good anti-virus software, McAfee this week presented a new technology approach in computer protection called DeepSAFE, ...

No News Is Big News for Sana Security

Apr 23, 2007

Sana Security today announced version 2.2 of the Primary Response SafeConnect anti-malware utility, which works exactly the same in Vista as in Windows XP.

Recommended for you

Microsoft expands ad-free Bing search for schools

17 hours ago

Microsoft is expanding a program that gives schools the ability to prevent ads from appearing in search results when they use its Bing search engine. The program, launched in a pilot program earlier this year, is now available ...

Growing app industry has developers racing to keep up

Apr 20, 2014

Smartphone application developers say they are challenged by the glut of apps as well as the need to update their software to keep up with evolving phone technology, making creative pricing strategies essential to finding ...

Android gains in US, basic phones almost extinct

Apr 18, 2014

The Google Android platform grabbed the majority of mobile phones in the US market in early 2014, as consumers all but abandoned non-smartphone handsets, a survey showed Friday.

Hackathon team's GoogolPlex gives Siri extra powers

Apr 17, 2014

(Phys.org) —Four freshmen at the University of Pennsylvania have taken Apple's personal assistant Siri to behave as a graduate-level executive assistant which, when asked, is capable of adjusting the temperature ...

Microsoft CEO is driving data-culture mindset

Apr 16, 2014

(Phys.org) —Microsoft's future strategy: is all about leveraging data, from different sources, coming together using one cohesive Microsoft architecture. Microsoft CEO Satya Nadella on Tuesday, both in ...

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

alfie_null
not rated yet Sep 20, 2012
Some part of the browsing process is done within a VM. But at some point downloaded content has to be re-integrated with that on the real host. So any that still contain malicious payloads can infect the host. Then, there's always social engineering. So, this isn't going to help mediate all attack vectors.

It sounds like a cool idea, but if the Bromium product becomes sufficiently popular, it too will become an attractive target.

More news stories

US urged to drop India WTO case on solar

Environmentalists Wednesday urged the United States to drop plans to haul India to the WTO to open its solar market, saying the action would hurt the fight against climate change.