We use it for malware protection.
We use it for malware protection.
We've seen a significant decrease in our need to respond to malware infections. It has reduced desktop re-imaging and really reduced the amount of lost productivity across the environment.
Our overall security posture has absolutely improved as a result of adding Bromium to our security stack. We continue to have less user impact through a significantly reduced amount of malware infections. It's become a non-event.
The most valuable feature is the process isolation because it simply stops malware from infecting the machines.
The secure browser for isolating high-risk web activities is the core of the product. We isolate all untrusted content, be it through email, be it through browsers. You name it. Anything that does not originate from a trusted source is isolated by default.
In terms of using forensic data reported from the solution, reporting is actually one of the shortcomings of the product. We do mine the data that's in there from a forensics perspective, and we use it to raise awareness and make sure that the organization understands the type of threats we see on a day-to-day basis.
The solution itself just quietly protects and the user doesn't really see it. We have to go in and actually mine the data to understand the events that have been protected against with the solution. It becomes very difficult because you have to spend a lot of time digging through the volumes of data. So reporting is absolutely the biggest shortcoming.
The stability is very solid. It's a stable product. As long as you're maintaining it and operating it, it just runs.
It's very scalable. Scalability is not anything that concerns me with the product.
Both the technical support and customer success teams are very responsive, very effective.
We've used a variety of anti-virus solutions and we switched because anti-virus simply doesn't work.
The setup is complex. It's a solution that forces behavior changes throughout the environment. Because you're isolating processes individually within a host, things behave a little bit differently. The set-up part of it is:
There are some different behavior issues that the users will see, and that was really where the majority of the time and effort went in getting the solution up and running.
To truly to get where we wanted to be it took some nine to ten months.
Our initial implementation strategy was to start rolling it out quietly. But we paused that and actually started going on more of a very active awareness campaign. We had to start marketing what we were doing more, so people would understand the little nuances that were changing and not react negatively to them. That's a big part of why it took us a little bit longer to actually get rolled out.
We used Bromium's Professional Services and they were very good.
We have not worked to quantify a dollar amount. This is a risk-mitigation strategy. Everything that we do is about deferring potential negative impact. We could spend a lot of time and effort trying to quantify that. For us as a business, it's not worth the time and effort to try to put a dollar amount to it.
We've had definitely fewer malware issues that we've had to respond to, which results in less lost productivity.
Pricing is reasonable.
Invincea was the competing product, outside of just the anti-virus space. We evaluated both products and we looked at how they worked technically, and Bromium was integrated at the hardware layer, while Invincea was at a software layer. At a software layer, there are too many ways that you could actually circumvent the controls, that you just simply couldn't do when it is hardware-enforced isolation. We went for the more effective solution.
If you want something that is actually effective, versus easy, this is a solution that is effective. It won't necessarily be the easiest tool to implement but, in the end, the work and effort are absolutely worth it.
We haven't really removed solutions as a result of using Bromium but we've looked at them in a different way. We try to make sure that we have the appropriate layers within our environment because every tool has a function. What we've done is actually focused on tuning to make sure every solution that we're using is keyed to be most effective where we need it to be. That includes Bromium. It has a very specific part of our overall security strategy and posture, and we've been focused very heavily on making sure that it is positioned correctly and operating effectively to manage that perspective.
We have roughly 8,000 to 10,000 people whose machines are protected by Bromium and we have everything from mine workers to plant workers to our CFO and our CEO. It is installed on all of our desktops and we are continuing, as we refresh hardware, to expand it as well. In terms of administration and maintenance, we have two people who focus on it, around troubleshooting issues as they come out, and making sure that we have a strategy for keeping up to date with new releases.
I rate Bromium at eight out of ten. It's an effective solution, but no solution out there is going to cover everything. There are always going to be gaps in whatever solution you go with. Bromium is a very solid one and it is extremely effective in what it does.