Download PDF version Contact company
NTT Com Security provides consulting services, managed security services and technology solutions to the most security conscious organisations

Bromium will deliver zero-day protection and forensic threat analysis to businesses and governments worldwide

Bromium®, Inc., the pioneer of threat isolation to prevent data breaches, and NTT Com Security, a global information security and risk management organization, recently announced a strategic global partnership to deliver Bromium’s complete endpoint protection solution to businesses and governments worldwide, delivering zero-day protection and forensic threat analysis. NTT Com Security is a premier channel partner for Bromium, which provides information security consulting and technical professional services to critical mutual customers that benefit from the combined strength of the partnership.

Micro-Virtualization Technology

"Defense in Depth has always been the mantra for information security and risk management but, today’s weak link in this philosophy is the endpoint – there is ample evidence of attacks that bypass traditional security architectures to infiltrate the corporate network and gain access to sensitive data. We firmly believe a radically different approach is required to face both today’s threats and indeed the attacks of the future,” said Garry Sidaway, SVP Security Strategy & Alliances, NTT Com Security. “We constantly analyze and evaluate the market to select technologies that support our Solutions and Managed Services, Bromium with their ground-breaking micro-virtualization technology extends our comprehensive enterprise security architecture to the endpoint with a unique approach to cyber defense. This strategic relationship is fundamentally important and keeps NTT Com Security at the very cutting edge of cyber security.”

Bromium vSentry and LAVA combine to provide comprehensive endpoint protection, even against zero day attacks and on unpatched machines. Micro-virtualization prevents unknown and untrusted Internet content, including Web sites and emails from ever accessing critical system files. Bromium captures each threat in its own micro-VM, monitoring its activity and alerting security teams with real-time threat intelligence. Bromium threat isolation succeeds where signature-based solutions fail because it provides proactive protection instead of reactive detection.

Expanding Internationally To Meet Demand

"Bromium is expanding internationally to meet demand for 'no compromise' next generation endpoint protection that is resilient to targeted, nation-state based attacks that typically utilize zero-day exploits to compromise endpoint systems,” said Simon Crosby, co-founder and CTO, Bromium. “Our ability to scale depends on the expertise of our partners and the trust that our customers place in them. NTT Com Security is just such a partner, and we look forward to working with them globally to meet customer needs"

NTT Com Security provides consulting services, managed security services and technology solutions to the most security conscious organizations in the world. NTT Com Security consultants are some of the most experienced and innovative information security experts in the industry. Its integrated managed security service delivers advanced security and risk management across cloud, hybrid and on-premise environments. Its technology solutions apply a rigorous, structured approach to technology selection to ensure new solutions are configured in line with business goals, compliance requirements and industry best practices to optimize existing systems while reducing cost and complexity.

Download PDF version Download PDF version

In case you missed it

How Can The Security Industry Contribute To Protecting The Environment?
How Can The Security Industry Contribute To Protecting The Environment?

When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security sy...

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...