Click on Anything without Risk of Breach The Next Generation of Endpoint Security

“Antivirus is dead, it only catches Traditional detection-based defenses like Bromium: Click on Anything 45% of cyber attacks.” antivirus and sandboxes are easily evaded Without Risk of Breach BRIAN DYE, SVP OF INFORMAT ION by today’s sophisticated threats, such as SECURITY, SYMANTEC Bromium has pioneered the next genera- zero-day attacks, advanced persistent tion of endpoint security that eliminates “Bromium isolated 100% threats and spear phishing. Mainstream breaches. Just as virtualization of advanced attacks in our security vendors using decades-old transformed IT, Bromium is transforming independent testing.” approaches have been unable to e ectively security with its unique microvirtualization NSS LABS meet these challenges, forcing enterprises technology. Bromium provides the world’s into a never-ending cycle of infections, false “With over a billion micro-VMs most advanced endpoint security, even positives and constant endpoint remedia- created, no has ever against the most sophisticated zero-day escaped and compromised a tion. This situation has opened the door for malware. Unlike traditional security a new approach to endpoint security, and a Bromium-protect ed endpoint.” technologies, such as antivirus or virtual SIMON CROSBY, CO-FOUNDER & CTO, new company to lead the way - Bromium. containers, which rely on ine ective BROMIUM detection techniques, Bromium’s solution “Bromium is the most automatically isolates each user task in a signicant advancement in lightweight, CPU-enforced micro-VM. This security in decades.” enables users to click on anything without BOB BIGMAN, FORMER CISO, CIA risk of compromise, protecting the enterprise. How We Are Unique

We prevent breaches, not detect and We have a We protect across We use react to them - endpoint breaches are prevent approach all major threat CPU-enforced eliminated, dwell time is reduced to to breaches, not vectors, attack isolation, not a zero, and there are no false positives detect and react. types and users. porous sandbox. or need for remediation. We protect all major threat vectors - we protect across Web, email, USB, les and executables; both known and unknown attacks; and users on and o the corporate network. We use CPU-enforced isolation - Bromium is far superior to a porous virtual container, vastly reducing the attack surface. Bromium has never been bypassed despite over a billion micro-VMs created to protect our customers. HOW YOUR ENTERPRISE BENEFITS

Completely secure Enable users to click Streamline security, Gain unprecedented the #1 attack surface on anything, whether reduce costs and context and visibility and source of breaches... in the oce or free up valuable into the entire attack the endpoint. on the go. resources. kill chain.

System Requirements Bromium Advanced Endpoint Security PROTECTED ENDPOINTS Endpoint Protection Endpoint Monitoring Windows 7 (32-bit and 64-bit) Complete protection against both known Real-time detection and monitoring of 8.1 (64-bit) and unknown threats threat activity Microsoft Windows 10 Mac OSX - Leverages micro-virtualization to Threat Analysis hardware isolate websites, email, Instant attack visualization and threat BROMIUM ENTERPRISE CONTROLLER documents, USB and executables to Operating System intelligence prevent endpoint compromises Microsoft Windows Server 2008, 2012 Endpoint Controller - Protects mobile users against attacks, Data Base System One-click deployment, policy orchestra- even when o the corporate network Microsoft SQL Server 2008, 2012 tion and threat management - Blocks attacker access to Intranet and Hardware high-value SaaS sites or AMD standard architecture - Eliminates malware persistence through automated remediation About Bromium Bromium has pioneered the next The Bromium Advantage generation of endpoint protection NETWORK MICRO- BEHAVIORAL APPLICATION WHITE BEHAVIORAL ANTI that eliminates breaches. Just as MALWARE VIRTUALIZATION BLOCKING SANDBOX LISTING ANALYSIS VIRUS virtualization transformed IT, Bromium ANALYSIS is transforming security with its unique Block known micro-virtualization technology. threats Bromium provides the world’s most advanced endpoint security, even Block unknown against the most sophisticated zero-day threats malware. Unlike traditional security Protect technologies, such as antivirus or virtual mobile users containers, which rely on ine ective detection techniques, Bromium’s Protect against solution automatically isolates each kernel attacks user-task in a lightweight, CPU-enforced micro-VM. This enables users to click on Hardware-enforced protection anything without risk of compromise, protecting the enterprise. Bromium’s Eliminates technological innovations have earned remediation the company numerous industry awards. Bromium counts a rapidly Unchanged user growing set of Fortune 500 companies experience and government agencies as customers. No list maintenance Visit us at www.bromium.com. or tuning

Visual attack analytics

Not reliant on detection

FULL SUPPORT PARTIAL SUPPORT NO SUPPORT