Bromium's MicroVisor promises to end PC desktop security woes

Bromium's MicroVisor promises to end PC desktop security woes

Summary: Bromium came out of stealth mode today and introduced a second generation virtualization technology dubbed a MicroVisor that is promised to finally resolve desktop security problems in the PC industry. Enterprises are now being asked to kick the tires on the beta technology.


Bromium is moving out of stealth mode (sort of) with a virtualization technology it hopes will deliver the holy grail of modern computing -- desktop security.

The startup, co-founded by XenSource founder and former Citrix exec Simon Crosby and an exec from BIOS pioneer Phoenix Technologies, has been developing a lightweight hypervisor it calls a MicroVisor that exploits Intel's secure chip technology and isolates operating system services including the file system, network, clipboard, even keystrokes-- from one another and from key system resources.

The technology, now in beta test mode, was debuted at GigaOM's Structure Conferrence today. Crosby won't say how or when it will be productized but noted that it will encompass a mix of open source software (include some Xen stuff) and closed source software and will be sold as a proprietary product. Well, it is security software after all.

The beauty of the client app is that it doesn't impair the user experience or require special management tools, Bromium claims. This solution is said to resolve the biggest obstacle inhibiting BYOD in the enterprise because its satisfies both the needs of the end user and the IT pro.

"In traditional virtualization, you virtualize the hardware. But here we're virtualizing the operating system services and resources," said Crosby, a pioneer in the Xen open source virtualization market. "

"The Microvisor automatically identifies each vulnerable task and instantly hardware-isolates it within a micro-VM, which is a lightweight, hardware-backed isolation container that polices access to all OS services and resources," according to a statement released by the company today. "Micro-VMs run natively, with full performance, but continually protect the desktop – even from unknown threats. "

Bromium also announced that it has received $26.5M Series B funding from Highland Capital Partners and Intel Capital as well as from existing investors Andreessen Horowitz and Ignition Ventures.

It reminds me of what Microsoft was trying to accomplish with Intel in the early 00s with its "Palladium" and "NGSCB" software efforts and Intel's "LaGrande" or "Trusted Execution Technology" technology in the early days of the PC security crisis. Intel technology plays a big role in the Bromium solution, too. Wonder if Microsoft is helping out too -- the software giant has always been close to XenSource.

It will be interesting to see how many enterprises take the second generation virtualization technology for a spin, considering the huge implications for the PC industry, Microsoft, Windows and national-international cyber-security threats, for that matter.

Execs originally expected to be shipping a product by now but note that they need to engage enterprises in solving what they describe as the biggest problem in the computer industry -- desktop security -- before rushing to market. "We are engaged on a quest for the desktop holy grail – a system that is trustworthy by design," according to a blog posted on the company web site today.

Topics: Virtualization, Hardware, Intel, Operating Systems, Security, Software

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.


Log in or register to join the discussion
  • RE: Bromium's MicroVisor promises to end PC desktop security woes

    From the article:
    [i]it [Bromium's MicroVisor] will encompass a mix of open source software (include some Xen stuff) and closed source software and will be sold as a proprietary product. [u]Well, it is security software after all[/u].[/i] [Emphasis added.]

    Security by obscurity? It's a good thing you posted this on the ZDNet Virtualization blog (instead of the Linux and Open-source blog). As examples, iptables, Linux Security Modules (such as SELinux, AppArmor and Tomoyo), grsecurity, Nmap and Advanced Intrusion Detection Environment (AIDE) are all open-source security software. And are all quite good. Why wouldn't open-source security software be equally good on Windows (or OS X)?

    P.S. I'm not saying that proprietary security software is necessarily bad. But, consider anti-virus software (mostly proprietary). The malware miscreants have become quite adept at packaging their payloads to avoid detection. And some malware disables the anti-virus software once the target system has been penetrated .
    Rabid Howler Monkey
  • Sounds, it is already a winner!

    It would be interesting to test this. Looking forward to it.

    - Sara
  • client app

    not in this life time apps don't work right
  • It will be tested

    Once this actually hits the streets it will be tested. Making such a bold claim will get every hacker this side of Jupiter going after it. The hackers want to be the first to say "look at what I did".
  • MicroVisor

    it don't in the beta form it SUCKS SO Bad AND YES Hackers will get in to this one you can not make that and get away with it hear comes the hackers again god help us