A CDE Definition
An endpoint security architecture from Bromium (www.bromium.com), introduced in 2012. Residing in the user's machine, and based on the Xen virtual machine software, vSentry creates a micro virtual machine (micro-VM) for each user task such as opening an email attachment or Web page.
Throughout the day, hundreds of micro-VMs may be created in real time, and like traditional VMs, each micro-VM is an isolated entity. Suspicious activity is blocked within the micro-VM, and when the task is completed, it is dissolved. If a virus does manage to activate, it cannot cross over and infect other applications or processes in the computer. In addition, Bromium's Live Attack Visualization & Analysis (LAVA) reports malicious activity so that the organization's security can be tightened. See endpoint security and virtual machine.
Before/After Your Search Term
|brokered private peering||browser application|
Terms By Topic
Click any of the following categories for a list of fundamental terms.