Bromium vSentry

Datasheet
Bromium vSentry
Hardware-Isolated Endpoint Security
Key Benefits
DEFEAT CYBER ATTACKS
Revolutionary micro-virtualization
technology prevents sophisticated,
stealthy threats from compromising
endpoints and your corporate network
STREAMLINE IT
Urgent security patching and
reimaging PCs are minimized, freeing
up IT for more productive projects
EMPOWER USERS
Users can safely access the Web,
use Java-based applications, and
work anywhere—from home, branch
offices, airports, and cafes—without
the need for restrictive policies
REDUCE COSTS
Spend less on complex and
costly security solutions and trim
operational costs by reducing the
need for IT remediation
Key Features
MAKE WEB BROWSING SAFER
vSentry defends against drive-by
downloads, browser-based attacks,
and exploits that target Java
vulnerabilities in Adobe applications
and browser plug-ins like Flash
WORK WITH ANY TYPE OF DOCUMENT
Email attachments and all common
document formats, including PDF
and Microsoft Office are supported
PROTECT MOBILE USERS
Locally installed protection guards
against attacks even when users are
off the corporate network
Every day, enterprises around the world are confronted with cyber
attacks that evade traditional security technologies, such as antivirus,
host intrusion prevention, and even network protections. Current
security solutions that detect and block malware using signatures,
behavioral blocking, post-infection analysis, or other means are
ineffective when it comes to today’s sophisticated threats.
Bromium® vSentry® offers a better
way to defeat cyber attacks that
target the endpoint, where more than
70% of breaches originate. vSentry
transforms endpoint security with
powerful new hardware-isolation
technology that protects your business
from malware, while empowering
your users and delivering real-time
threat intelligence to IT.
vSentry can create hundreds of
micro-VMs dynamically in real time.
It supports multiple concurrent
user tasks using industry-standard
systems by leveraging advanced
memory management techniques
and unlocking the power of standard
virtualization hardware built into
today’s PCs and laptops.
vSentry works in concert with
Bromium Live Attack Visualization
and Analysis (LAVA™), which provides
unprecedented insights into all phases
of every attack. With Bromium’s
isolation technology threats can
execute completely within the safe
confines of the micro-VM. IT can
discover the nature, scope, and
trajectory of attacks in minutes rather
than hours or days, enabling swift
distribution of threat intelligence
throughout your infrastructure. It’s like
having a black box flight recorder for
threats on the host.
Bromium vSentry: How It Works
vSentry uses proprietary microvirtualization (micro-VM) technology
to automatically and instantly isolate
all user tasks and the associated
content—such as opening an email
attachment or a Web page—in a microvirtual machine. This secure container
is automatically discarded when the
user closes a Web session or document.
As a result, malware that may enter
the micro-VM through infected email
attachments or malicious websites
cannot compromise the operating
system, applications, data, or network.
vSentry is easy to manage and
There’s no longer any need for
monitor with Bromium Management
signatures or security software updates.
Server (BMS). With BMS, IT can
Malware essentially becomes irrelevant.
1
Datasheet
BROMIUM vSENTRY
Innovative Technology
POWERED BY XEN
vSentry is powered by the Xen
Hypervisor, the same technology
that drives global computing
BROMIUM MICROVISOR TM
This purpose-built, security-focused
hypervisor is based on Xen and leverages
advanced hardware capabilities to
deliver unprecedented granularity,
security, and performance
HARDWARE ENFORCED ISOLATION
vSentry uses hardware virtualization
features built into today’s PCs and
laptops to enforce the isolation of
untrusted tasks and implement the
principle of least privilege between the
protected system and unknown code
Supported Platforms
Intel i3, i5, i7 processor, 4 GB RAM
Microsoft Windows 7 32-bit or 64-bit
Apple OSX
About Bromium
Bromium has transformed endpoint
security with its revolutionary isolation
technology to defeat cyber attacks.
Unlike antivirus or other detectionbased defenses, which can’t stop
modern attacks, Bromium uses
micro-virtualization to keep users
secure while delivering significant
cost savings by reducing and even
eliminating false alerts, urgent patching,
and remediation—transforming the
traditional security life cycle.
manage all Bromium-protected
endpoints, whether they are on or
off the corporate network. BMS is
scalable and can support the needs of
organizations of any size—even those
with the largest networks.
Defeat Attacks. Protect Endpoints
and Your Entire Enterprise.
Traditional endpoint security solutions
rely on detection and often fail to block
targeted and zero-day attacks. vSentry
defends the endpoint by isolating
all content for each task—including
threats—through breakthrough
micro-virtualization technology that
leverages CPU hardware technology.
vSentry even stops “undetectable”
attacks without disrupting the user.
Streamline IT. Simplify Security
and Boost Efficiency.
IT teams are challenged to find critical
threats in a sea of false alerts and
insignificant events. vSentry simplifies
IT processes, dramatically reducing
and even eliminating: compromises
on endpoints, costly remediation and
Bromium US
20813 Stevens Creek Blvd
Cupertino, CA 95014
[email protected]
+1.408.598.3623
Bromium UK
Lockton House
2nd Floor, Clarendon Road
Cambridge CB2 8FH
+44.1223.314914
reimaging, urgent security-related
patching, noise and cost of security
alerts, and wasted efforts chasing
false positives.
Empower Users. Support Mobility
and Enhance Productivity.
The continuing trends toward mobility
and “bring your own device” (BYOD)
are transforming the way people work.
Users demand the freedom to work
from home and on the road without
having to worry about compromise.
vSentry empowers users, allowing them
to access the resources they need to
be productive anytime, anywhere.
Reduce Costs. Cut Operational
Overhead and Avert Costly Breaches.
vSentry pays for itself in just a matter
of months. It helps organizations
dramatically reduce operational costs
related to remediation, lost productivity,
forensic analysis, and urgent security
patching. In addition, vSentry helps
avoid the financial losses associated
with breaches—lost customer revenues,
regulatory fines, legal fees, and PR costs.
For more information refer to www.bromium.com,
contact [email protected] or call at 1-800-518-0845
Copyright ©2014 Bromium, Inc. All rights reserved.
DS.VSENTRY.US-EN.1410
2