pssshhh that’s not even neat the pokemons aren’t even adjacent and there’s no alphabetical order and UGH
Bitch puh-lease. This is the best I can do!
Bromium: Trapping Malware And Analyzing Attacks But Facing Limits, Too
Bromium has released its first software product — a micro virtual machine (micro-vm) that traps malware and analyzes it for IT administrators to examine once an attack takes place. Bromium is a startup that is banking on disrupting the enterprise security market. Though it has the technical capabilities to isolate attacks, its weakness is in the breadth of the market it can cover. Bromium is hypervisor independent. It can run on Windows and Intel x86 chips. It does not run on Macs. It only runs on Internet Explorer 8 and 9. It does not run on ARM architectures. http://dlvr.it/2B5LwW @suryaray
Startup Bromium takes aim at cloud security
Startup takes aim @ cloud security:Simon former CTO of Citrix Systems’ data center & cloud busines #: http://bit.ly/kY9vBY
“Crucially, “granular protection” is different from “granular isolation”: Imagine we isolated execution down to the granularity of each individual application thread. If one thread were compromised and elevated its privileges, would the fine-grained isolation help to protect the application, or the system as a whole? It would not: The thread would have access to all resources available to the application. Moreover, it would have access to any files in the file-system and the full set of services offered by the kernel, including privileged enterprise networks and storage. It could modify the SAM, and all sorts of program and system configuration data. The overall security of the system therefore depends on both the granularity of execution isolation (in micro-virtualization – a task) and the granularity of (the task’s) access to security-critical system resources and data. The architectural construct that we use to reason about security of the latter is the Principle of Least Privilege. It is a fundamental principle of our design that the granular, hardware-enforced execution isolation afforded by the Microvisor is independent from, and orthogonal to granular application of the Principle of Least Privilege. Without a rigorous, independent design and implementation of each, the security properties of the resulting system would be impossible to understand.”—Micro-virtualization for the Security Architect | A Collection of Bromides on Infrastructure
“Watch live streaming video from gigaomstructure at livestream.com”—Secure Everythingon GigaOM Structure - live streaming video powered by Livestream
Zscaler finally accepts VC dollars — and gets $38M
#SuryaRay #Surya Zscaler a four-year-old startup that has bootstrapped its business by providing a new form of security designed for a mobile and cloud-dependent workforce, has raised $38 million in first-time financing. The round was led by Lightspeed Venture Partners and an unnamed strategic investor.
Zscaler has been fairly successful in its four years building a significant base of clients including Crutchfield Corporation, La-Z-Boy and Telefonica. The company’s software as a service is hosted in more than 100 data centers around the world and essentially protects a company’s web traffic. It does this by routing requests through Zscaler’s software. But there’s no software for users to download on their clients and there’s also no appliance for corporate IT to worry about.
As the cloud and mobility do away with the perimeter model of security where a firewall may prevent harmful traffic from getting in and corporate secrets from getting out, Zscaler is one of several new companies trying to adapt security to a world where there is no perimeter. And even if the corporate IT thought it had a perimeter, the corporation may not own it or have a say in what runs on it. A perfect example of this might be the CEO’s iPad (a aapl).
Zscaler doesn’t solve all problems, but it’s certainly ahead of the pack in thinking about security in a forward-looking way. Other companies trying to address the changes in security required by BYOD and corporate access to the cloud applications are Bromium and CloudPassage. And by waiting to take on venture capital Zscaler’s CEO Jay Chaudhry has joined a select group of established companies who are finally succumbing to the lure of VC cash. For example Qualtrics, a ten-year-old company this year raised $70 million in its first round of outside investment. Another company, Code 42, avoided VC dollars for 11 years before this year raising $52.5 million.