Release: Bromium vSentry

Today, September 19, Bromium Inc, an enterprise and virtualization startup based in Cupertino, CA, introduced the release of a new security software, Bromium vSentry.
The company is a new start-up founded in 2010, working on security and virtualization, its new product is a micro-vm that would capture and analyzes malwares, delivering a  secure virtual infrastructure for large clouds and enterprise datacenters. Bromium vSentry is product created to permit a safe navigation, apparently the solution would give protection against system security attacks and would protect a desktop computer against attacks on the system from within.

According to the press release :

Bromium vSentry transforms information and infrastructure protection with a revolutionary new architecture that isolates and defeats advanced threats targeting the corporate endpoint through web, email and documents. vSentry protects desktops without requiring patches or updates, defeating and automatically discarding malware, and eliminating costly remediation.

Traditional security solutions rely on detection and hence fail to block targeted attacks which often use zero day exploits. Bromium uses hardware level isolation to stop even “undetectable” attacks without disrupting the user.

vSentry is built on the Bromium Microvisor™ – a security-focused hypervisor that automatically, instantly and invisibly hardware-isolates each vulnerable Windows task in a micro-VM that cannot modify Windows or gain access to enterprise data or network infrastructure.

Gaurav Banga, Bromium co-founder and CEO, says:

Productive users need to access the web, attachments and documents – typical vectors used by undetectable advanced malware.  Bromium vSentry defeats undetectable malware by design – relying on hardware-enforced isolation to protect sensitive information and networks, when polymorphic malware strikes, vSentry automatically protects the desktop, enterprise data and networks.  It heralds a revolution in enterprise information security by relying on hardware rather than software to isolate and protect enterprise information and infrastructure.