Microvisor

The term microvisor refers to a Xen-based security-focused hypervisor developed by security firm Bromium that provides micro-virtualization technology to ensure secure computing environments.

Short for micro-hypervisor, a microvisor works with the VT (Virtualization Technology) features built into Intel, AMD and other CPUs to create hardware-isolated micro virtual machines (micro-VMs) for each task performed by a user that utilizes data originating from an unknown source.

The micro-VMs created by the microvisor provide a secure environment, isolating user tasks from other tasks, applications and other systems on the network. Tasks in this case entail the computation that takes place within an application as well as within the system kernel, so the microvisor ensures security at both the application and operating system kernel levels.

How Microvisors and Micro-VMs Ensure Security

With each micro-VM created by the microvisor isolated from other micro-VMs as well as from the operating system as a whole, if the micro-VM is compromised by a user opening, for example, an infected web page, document or spreadsheet, the malware will be destroyed when the micro-VM is shut down, even if the malware installs a rootkit on the micro-VM.

Bromium first launched its microvisor and micro-virtualization technology in 2012 as part of the company’s vSentry product. In July 2015 Bromium announced it had partnered with Microsoft to ensure its microvisor and micro-virtualization technology would be integrated in Windows 10 to help make the operating system “the most secure endpoint solution on the market.”

 

 

 

 

Forrest Stroud
Forrest Stroud
Forrest is a writer for Webopedia. Experienced, entrepreneurial, and well-rounded, he has 15+ years covering technology, business software, website design, programming, and more.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Complete List of Cybersecurity Acronyms

Cybersecurity news and best practices are full of acronyms and abbreviations. Without understanding what each one means, it's difficult to comprehend the significance of...

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...

Infographic

An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...