We've unified Citrix solutions and our portfolio. Learn more .

Bromium Secure Platform

Citrix Ready Product Image / Logo

vSentry is innovative software that hardware-isolates and defeats advanced targeted attacks, protecting endpoints and empowering users to safely leverage the Internet regardless of where it's working.

Request Product Details

Compatible with

  • Citrix Receiver for Windows
  • XenDesktop 7.0
  • XenDesktop 7.1
  • XenDesktop 7.15 LTSR
  • XenDesktop 7.16
  • XenDesktop 7.5
  • XenDesktop 7.6
  • XenDesktop 7.6 LTSR
  • XenDesktop 7.7
  • XenDesktop 7.8
  • XenServer 7.3

Compatibility

  • Citrix Virtual Desktops (XenDesktop)
  • Citrix Workspace app (Receiver)
  • Citrix Hypervisor (XenServer)

Product Details

Bromium Secure Platform provides application isolation and control. Using hardware-enforced isolation technology to dramatically decrease attack surfaces and contain threats online or offline inside micro-VMs, Bromium is invisible to the end user in an easy to deploy and quick time-to-value platform. Each endpoint protected by Bromium is part of the sensor network that performs threat analysis and instantly shares indicators of compromise with the rest of the network for faster time to resolution. SOC teams can perform detailed analysis with the full kill chain information and visualization garnered from each micro-VM.

The Bromium Microvisor™ - a Xen-based, security-focused hypervisor is designed to automatically and invisibly hardware-isolate each vulnerable or untrusted user task. It includes browsing to a web site, opening a document, or viewing media in a micro-VM. Malware entering a micro-VM cannot modify the operating system or gain access to enterprise data or network infrastructure.

Bromium Secure Files: protects you from malicious E-mail attachments and all common document formats, including PDF and Microsoft Office™ supported. Common use cases:

  • Ransomware
  • File-less malware
  • Macro-enabled threats

Bromium Secure Browsing: protects you from web-borne threats for Internet Explorer, Chrome, and Firefox. Common use cases:

  • Drive-by downloads and malvertising
  • Man-in-the browser attacks
  • Browser plugin exploits like JAVA and Adobe™ Flash
  • Phishing email

Bromium Secure Monitoring: to detect persistent attackers on the network, blacklist and quarantine threats. Common use cases:

  • Protect Servers and Endpoints
  • Blacklist threats from executing
  • Identify authorized software

Resources