Coalfire Attestation Report:
Bit9 Security Platform

Download White Paper Now

Analyst Reports

View All Analyst Reports >>

Case Studies

Bit9 Case Study Portfolio: Advanced Threat Protection in Action

Bit9 Case Study Portfolio: Advanced Threat Protection in Action

Download our case study portfolio now to learn how 12 of your fellow retailers and hospitality organizations are addressing today’s advanced threats targeting their point-of-sale (POS) systems.

Top 10 Oil and Gas Enterprise Uses Bit9, Carbon Black and ThreatConnect for Threat Prevention, Continuous Endpoint Visibility and Threat Hunting

Top 10 Oil and Gas Enterprise Provider

As a top-10 provider of products and services used by leading petroleum exploration and production companies worldwide, this U.S. enterprise was missing a solution that could provide continuous data collection at the endpoint and integration with tailored, relevant threat intelligence. To manage and even create their own intelligence, the company needed a way to receive and rank data from three primary sources—information on targeted attacks gathered by trusted industry groups; intelligence reports and indicator feeds from leading security vendors; and open source intelligence—before deploying it for detection and monitoring.

View All Case Studies >>

Data Sheets

Corporate Brochure

Corporate Brochure: Endpoint Threat Prevention, Detection and Response

A new generation of threats is attacking your endpoints and servers—you need a modern defense. Today’s attackers are after the data and intellectual property on your endpoints and servers. If you’re relying on traditional endpoint security, such as antivirus, you’re putting your organization at risk. AV doesn’t see or stop targeted attacks, nor does it help you respond to an incident. You need to arm your endpoints so that you can easily see and immediately stop advanced threats.

View All Data Sheets >>


View All eBooks >>

Info Graphics

POS Security: Spending Up But Data Still Vulnerable

POS Security: Spending Up But Data Still Vulnerable

As point-of-sale devices at major retailers, restaurants and hospitality providers come under increased attack, organizations are more aware of the problem but may be blind to what’s really happening.

View All Info Graphics >>

Research Reports

View All Research Reports >>

Threat Advisors

Threat Advisor: Blocking CryptoLocker with Advanced Threat Protection

Blocking CryptoLocker with Advanced Threat Protection

This Threat Advisor will examine how CryptoLocker adds a couple of new twists to familiar advanced-attack techniques used in ransomware to devastating effect for those who are unprepared. We’ll show you the keys to detecting and preventing Cryptolocker (and other advanced attacks) from executing. First and foremost is the use of policies that prevent CryptoLocker from executing on any endpoint, anywhere.

Threat Advisor: Don't Get Burned By Flame

Don’t Get Burned by Flame

What is Flame? Flame is the latest high profile cyber attack making the news. It has so far been detected in Middle East countries. Flame is more than simply a virus or worm – it is basically a cyber espionage toolkit, containing the most comprehensive set of sleuthing technologies in a single piece of malware. It can monitor and steal data from a computer’s microphone, screen, keyboard, Bluetooth, WiFi and network, among its known capabilities. It can propagate via USB or directly over a network. It can use several different types of data encryption and compression to store and then exfiltrate data to a controllable set of command-and-control servers.

View All Threat Advisors >>

White Papers

View All White Papers >>
Bit9 + Carbon Black