SHARE
Facebook X Pinterest WhatsApp

Bracket Computing Bolsters Server Security

Given the fact that more cyberattacks than ever seem to be circumventing existing security defenses, interest in alternative approaches to IT security is naturally on the rise. Bracket Computing today unveiled one of the approaches in the form of a lightweight hypervisor that further isolates guest operating systems from the underlying virtual machine platform. Bracket […]

Written By
MV
Mike Vizard
Nov 9, 2017

Given the fact that more cyberattacks than ever seem to be circumventing existing security defenses, interest in alternative approaches to IT security is naturally on the rise. Bracket Computing today unveiled one of the approaches in the form of a lightweight hypervisor that further isolates guest operating systems from the underlying virtual machine platform.

Bracket Computing CEO Tom Gillis says Server Guard extends Metavisor technology that the company developed to segment a virtual machine environment in a way that prevents hackers from accessing a guest operating system even if they manage to gain privileged or root access to the underlying server. Once they have that access, they typically start using patches to the environment to disseminate malware that can go undetected for months before being activated.

Gillis says Server Guard makes use of segmentation to prevent a compromise of one operating system environment from being able to move laterally across the rest of the enterprise. Bracket Security Software already provides the controls required to micro-segment the network, gather forensics information, and visualize network flows, in addition to encrypt all forms of data at rest and in motion.

“This prevents an attack involving a sudden privilege escalation from infecting the entire enterprise,” says Gillis.

Gillis says this is as close to an immutable approach to maintaining IT security that can be deployed within a server environment.

Bracket Computing is not the first IT vendor to try to exploit micro-segmentation to enhance IT security. But Gillis notes its approach can uniquely be applied across multiple operating environments in an unobtrusive way by IT security teams without disrupting any existing IT management processes.

 

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.