Bromium was founded in 2010 with a mission to restore trust in computing. The company’s founders, Simon Crosby, and Ian Pratt, have a long and deep history of innovation in virtualization and security. Inspired by the isolation principles of traditional virtualization, the Bromium team has created a game-changing new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware. Bromium has its headquarters in Cupertino, California, and an R&D center in Cambridge, UK

Bromium is focused on the global enterprise security market, which has long been dominated by detection-based security products, which use signatures, behaviors, or heuristics to identify potential threats. However, these technologies have become ineffective and unable to detect or protect against the growing number of polymorphic cyber threats, zero-day attacks, and APTs that are impacting enterprise organizations worldwide.


  • Bromium vSentry

    Bromium vSentry provides protection at the endpoint against all advanced malware. vSentry automatically creates hardware-isolated micro-VMs that secure every user task - such as visiting a web page, downloading a document, or opening an email attachment. Each task runs in its own micro-VM, and all micro-VMs are separated from each other, and from the trusted enterprise network. If malware targets the end user, the threat is contained in the hardware-isolated micro-VM. Consequently, it is never able to steal or damage the user or enterprise’s information, and is destroyed when the task is completed. vSentry is transparent to the end user, and has no discernable impact on user experience or system performance.

  • Bromium LAVA (Live Attack Visualization and Analysis)

    Bromium LAVA (Live Attack Visualization and Analysis) is a complementary product to vSentry that adds enormous value for Security Operation Centers (SOCs). LAVA converts each micro-VM in the enterprise into a honeypot and automates the time-consuming post-attack malware analysis process. For example, if a vSentry endpoint is attacked within an isolated micro-VM, the entire attack is automatically and instantly recorded, then forwarded to the LAVA console in the SOC. This provides security teams with the results of an automatic in-depth analysis of the advanced malware.

  • Bromium Enterprise Controller™ (BEC)

    Bromium offers a complete solution, including the Bromium Enterprise Controller™ (BEC), which enables centralized policy management and control of broad vSentry deployments across the enterprise. BEC provides a centralized web service for collection and correlation of LAVA security events from all desktops in the enterprise, both on and off network. BEC and LAVA provide real-time, automated analysis for the security operations team and serve as an integration point between Bromium products and the rest of the enterprise security infrastructure.


State & Local Contracts

Orange County National IPA Co-Op

Through May 31, 2020 (with 2 option years)


Archived Events


Every day, enterprises around the world are confronted with cyber attacks that evade traditional security technologies, such as antivirus, host intrusion prevention, and even network protections. Current security solutions that detect and block malware using signatures, behaviora...

Imagine a world where mobile and remote workers were secure from the most advanced known and unknown cyber attacks. Mobility is one of the key driving forces behind productivity and innovation today. Traditional laptop computers are still the greatest threat to business acco...

This whitepaper describes the technology and how it works in terms useful to a security architect who needs to reason about security properties of the system in a more formal way. It dives under the hood of Bromium vSentry® to show how micro-virtualization works to make enterprise en...

Despite all of the industry hype touting "new and improved detection methods" to protect zero-day attacks and APTs, enterprises continue to be compromised via the endpoint, resulting in the costly (and in some cases, irreparable) theft of sensitive data. This happens because legacy security solution...

Every day, enterprises and government organizations are confronted with malware attacks that evade firewalls, network protection devices, and traditional endpoint security. What if there was a way to safely record and analyze the complete attack, without risk to the organization?...

Enterprises today are experiencing a crisis of confidence in their traditional security technologies and strategies. Rapid adoption of business-enabling trends like mobility, the cloud, and consumerization of applications coupled with the unceasing onslaught of advanced, evasive ...

There isn’t a federal government agency CIO that hasn’t played out the following scenario in their minds, or worse yet, lived it: “Department breached. User clicked on spear-phishing link. Nation-state penetrates department, data exfiltrated. Clean up still in process. TTPs being collected....