Bromium Overview

What is Bromium?

Bromium vSentry offers a better way to defeat cyber attacks that target the endpoint, where more than 70% of breaches originate. vSentry transforms endpoint security with powerful new hardware-isolation technology that protects your business from malware, reduces costs, while empowering your user.

Bromium is also known as Bromium vSentry.

Buyer's Guide

Download the Endpoint Protection (EPP) for Business Buyer's Guide including reviews and more. Updated: May 2021

Bromium Customers

Valspar

Bromium Video

Filter Archived Reviews (More than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
HP
Manager of Cyber Security Operations at a healthcare company with 1,001-5,000 employees
Real User
Enabled us to remove AV defenses from the endpoints protected with this solution

What is our primary use case?

Our primary use case is in our radiology department. We see a lot of our patients daily. What would happen was, a traditional antivirus would scan each Radiologist's files. The files can be massive, 4 or 5-plus gigs, because they are radiation imaging files. The scans would slow down the process, as the radiologists need to see a bunch of images in a specified amount of time. A big complaint was that the AV was really slowing things down, it was ruining productivity.

Pros and Cons

  • "The feature that stands out the most is that when someone clicks on a link in an email... [if] that link is malicious and it has some malware or keylogger attached to it, when it opens up in that Bromium virtualized browser, there's no chance of it actually being on the machine and running, because as soon as they click that "X" in the upper right-hand side of the browser, everything just vanishes. That is an added plus."
  • "Initially, when we came in contact with Bromium a few years ago, it had a nice threat analyst, or a LAVA Pop, which is what they used to call it. Once it detected malware, it would show us the malware's path... I don't see that on the computers now. We only get to see that in the console. I would like to still see that on the individual machines because when we go out to look at a machine, we don't necessarily have access to the console."

What other advice do I have?

Bromium is a very good choice. It will make your life a lot easier and you should definitely implement it, especially if you're in a hospital environment and you have a radiology department that uses traditional AV. We do not use the forensic data reported from Bromium to help protect our data center. We don't use the secure browser to isolate high-risk web activities. We use the regular browsers here. Our browsers are hardened: Internet Explorer and Google Chrome. I would rate Bromium as an eight out of ten. What comes to mind is the ease of use. What also comes to mind is that if you are in…
JR
Director of Information Security with 1,001-5,000 employees
Real User
Forensic data helps us analyze a situation to make sure there isn't a larger problem involved

What is our primary use case?

We use it for endpoint protection. We use it for browsing and for documents: Microsoft, PDF, etc. We use all the capabilities.

Pros and Cons

  • "Now, instead of us having to go through that analysis, they actually give us a monthly report that shows us: "Here's what you got hit with, here's what would have happened, here are the forensics behind the attack," and, obviously, Bromium stopped it."
  • "They have always struggled with usability. The protection that it offers you is tremendous, but there's definitely an impact with use of resources on the computer. It's gotten a lot better now with Win 10. But sometimes, when you open up a website, it's going to take longer than it would without Bromium, and it's the same with documents."

What other advice do I have?

Make sure that you meet their specs as far as hardware requirements go. Having a standard hardware configuration, as we do, is huge, where you don't have to deal with different hardware things that may get affected by the resources that Bromium needs. We're very happy with the product, for both things that I mentioned already: protecting endpoints for when our users are accessing the internet, for unknown websites, and the same for docs and PDF. We've had this for a little over three years, we were one of their early customers. It was a rocky implementation initially because it was when they…
Find out what your peers are saying about HP, BlackBerry, Sophos and others in Endpoint Protection (EPP) for Business. Updated: May 2021.
510,534 professionals have used our research since 2012.
PH
Director of IT Security, Risk and Compliance. at a pharma/biotech company with 1,001-5,000 employees
Real User
Reduces lost productivity across our environment by making malware infections a non-event

What is our primary use case?

We use it for malware protection.

Pros and Cons

  • "Our overall security posture has absolutely improved as a result of adding Bromium to our security stack. We continue to have less user impact through a significantly reduced amount of malware infections. It's become a non-event."
  • "The most valuable feature is the process isolation because it simply stops malware from infecting the machines."
  • "Reporting is one of the shortcomings of the product. We do mine the data that's in there from a forensics perspective... It becomes very difficult because you have to spend a lot of time digging through the volumes of data. Reporting is absolutely the biggest shortcoming."

What other advice do I have?

If you want something that is actually effective, versus easy, this is a solution that is effective. It won't necessarily be the easiest tool to implement but, in the end, the work and effort are absolutely worth it. We haven't really removed solutions as a result of using Bromium but we've looked at them in a different way. We try to make sure that we have the appropriate layers within our environment because every tool has a function. What we've done is actually focused on tuning to make sure every solution that we're using is keyed to be most effective where we need it to be. That includes…
TJ
Product Lead at a retailer with 1,001-5,000 employees
Real User
Isolation feature contains, prevents attacks, but we have faced compatibility issues

What is our primary use case?

Our primary use for the solution is security. Our number one reason for buying it was to avoid phishing campaigns, phishing emails, and contain phishing problems.

Pros and Cons

  • "The isolation feature is the most important because it prevents attacks."
  • "They need to improve the compatibility with other applications and its stability. It works well with attacks, but it doesn't work well with all software on the clients. There is a lot of troubleshooting and a lot of things that need to be tuned to make it work and not break things."
  • "When you deploy, not only is the user asked to reboot their computer, they are also asked to wait for 20 minutes while it sits there and initializes. It definitely impacts the end-user. It takes time away from their day."

What other advice do I have?

Start with proper hardware: 8GB of RAM and Core processors. Don't try to run it on 32-bit software, 32-bit operating systems, and don't try to run it with 4GB of RAM or you will have lots of issues. If you start with good hardware, the issues that we had will be negligible. I give it a rating of six out of ten because the main thing about Bromium - while it's the only game in town, it really does something unique that no one else is doing - the reasons I knocked it down are the support, the compatibility issues. Whatever team is in charge of maintaining the product, it will definitely increase…
Director with 51-200 employees
Vendor
Enables us to isolate and prevent malicious code from email attachments and downloaded internet files

What is our primary use case?

The primary use is for protecting endpoints from malware.

Pros and Cons

  • "We've been able to isolate and prevent malicious code from external email attachments and from downloaded internet files. Those are the two big areas that have really made an impact."
  • "Room for improvement would be keeping up with the rate of change, specifically on Windows platforms. There are a lot of updates that come out for Microsoft Windows operating systems and the Bromium product needs to be able to keep up quickly with those updates and all the browser updates that are coming out. It's hard to do, but that's really where they need to be more responsive because we end up with problems and then we have to call support to get patches, etc."
  • "After a major release, there's always a lot of "dust settling." You have to work through all those issues and then you're fine for a while. The problem is, it's stable, it's fine, until the next major release comes out. Then you go back into the cycle again of uncertainty, instability, working through issues until they have patched and remediated all the problems that you're having. It's not unlike any other vendor though"

What other advice do I have?

It's absolutely worth taking a look at this technology, especially if your environment is susceptible to ransomware or malware. This product is very effective in addressing that. I rate Bromium at eight out of ten because I believe there's room for improvement in the rate at which they should keep up with updates, and maybe in some additional functionality.
Senior Program Manager Office 365 at a pharma/biotech company with 1,001-5,000 employees
Real User
Prevents thousands of potential threats, but complex initial setup required vendor's help

Pros and Cons

  • "It has prevented thousands of potential threats by encapsulating them within its own vSentry container, thus providing overall protection and integrity of the operating system."
  • "I did not find this to be an out-of-the-box solution, it required planning and alignment across many groups."
  • "Initial setup was complex. There were many configurations that needed to be worked out with the vendor. The setup required hands-on assistance from Bromium."

What other advice do I have?

Understand your current setup and the limitations of your network and endpoints. Perform quality evaluations and metric analysis, then establish your use cases to review during a pilot, before moving into production. I did not find this to be an out-of-the-box solution, it required planning and alignment across many groups.