IDC Specialized Threat Analysis and Protection Report
The latest IDC Worldwide Specialized Threat Analysis and Protection (STAP) Market Report ranks Bit9 + Carbon Black as #1 in the endpoint segment of the specialized threat analysis and protection market. The company’s leadership in the fast-growing endpoint segment (48% CAGR through 2019) reflects our success in delivering Next-Generation Endpoint Security solutions to our worldwide customers.
Bit9 + Carbon Black buys VisiTrend to combine analytics and UI with endpoint security
The world of postantivirus endpoint security continues to undergo substantial change, and Bit9 + Carbon Black (Bit9 + Cb) remains one of the key players in that evolution. With the purchase of VisiTrend, Bit9 has enhanced an incredibly important but oftenneglected capability – effective user interface and experience (UI and UX). It’s easy to throw some charts onto a security product dashboard, or some data queries into a report, but all too often we’ve seen little thought into how useful that data is from the security analyst’s chair. As the combination of mass data collection in security increases, the combination of the right analytics and effective UI/visualizations becomes more and more critical.
Bit9 Case Study Portfolio: Advanced Threat Protection in Action
Download our case study portfolio now to learn how 12 of your fellow retailers and hospitality organizations are addressing today’s advanced threats targeting their point-of-sale (POS) systems.
Top 10 Oil and Gas Enterprise Provider
As a top-10 provider of products and services used by leading petroleum exploration and production companies worldwide, this U.S. enterprise was missing a solution that could provide continuous data collection at the endpoint and integration with tailored, relevant threat intelligence. To manage and even create their own intelligence, the company needed a way to receive and rank data from three primary sources—information on targeted attacks gathered by trusted industry groups; intelligence reports and indicator feeds from leading security vendors; and open source intelligence—before deploying it for detection and monitoring.
Corporate Brochure: Endpoint Threat Prevention, Detection and Response
A new generation of threats is attacking your endpoints and servers—you need a modern defense. Today’s attackers are after the data and intellectual property on your endpoints and servers. If you’re relying on traditional endpoint security, such as antivirus, you’re putting your organization at risk. AV doesn’t see or stop targeted attacks, nor does it help you respond to an incident. You need to arm your endpoints so that you can easily see and immediately stop advanced threats.
Next-Generation Endpoint Security: Top 10 Checklist
Compromise is inevitable, but a massive data breach does not have to be. When evaluating products, selecting a next-generation endpoint security solution can be a daunting task. Leverage these 10-essential items when evaluating a next-generation endpoint security solution.
Preparing for POS Security Threats This 2015 Holiday Season
The holiday season is critical to retailers’ success, and while businesses are gearing up for the crunch, so are cyber criminals. This eGuide details the threats and distractions facing retailers this holiday season, which could be the most challenging one yet.
Compliance 101: Basics for Security Professionals
Given the increasing scrutiny from regulators and auditors, Security professionals should have at least a basic understanding of the Compliance function. Download this eGuide to learn how compliance impacts the organization, who the stakeholders are, and the implications of non-compliance.
IR Professionals Choose Carbon Black
Carbon Black is the number-one endpoint detection and response (EDR) solution according to a SANS survey of IR professionals. The survey asked: “What vendor products are you currently using and evaluating for your incident response efforts, including forensics?” Carbon Black was the choice of 68 percent of respondents. This infographic summarizes the key findings of the larger report.
POS Security: Spending Up But Data Still Vulnerable
As point-of-sale devices at major retailers, restaurants and hospitality providers come under increased attack, organizations are more aware of the problem but may be blind to what’s really happening.
NIST’s Guide to Application Whitelisting
NIST, the National Institute of Standards and Technology, has published a Guide to Application Whitelisting offering guidance on how to prevent intrusions and malware by using application whitelisting.
Bit9 + Carbon Black Data Breach Disclosure Report 2015
The data that companies keep about their customers is a highly valuable commodity in today’s connected world; providing access to their bank accounts, shopping habits and identities. However, high-profile data breaches at the likes of Target, Sony, and now Talk Talk have raised public awareness of the very real risks they face from cyber criminals looking to steal their data. As consumers become increasingly aware of the risks to their data, and there is more public pressure for tighter EU and government regulations, organisations will need to ensure that they have complete confidence in the safety of that data.
Blocking CryptoLocker with Advanced Threat Protection
This Threat Advisor will examine how CryptoLocker adds a couple of new twists to familiar advanced-attack techniques used in ransomware to devastating effect for those who are unprepared. We’ll show you the keys to detecting and preventing Cryptolocker (and other advanced attacks) from executing. First and foremost is the use of policies that prevent CryptoLocker from executing on any endpoint, anywhere.
Don’t Get Burned by Flame
What is Flame? Flame is the latest high profile cyber attack making the news. It has so far been detected in Middle East countries. Flame is more than simply a virus or worm – it is basically a cyber espionage toolkit, containing the most comprehensive set of sleuthing technologies in a single piece of malware. It can monitor and steal data from a computer’s microphone, screen, keyboard, Bluetooth, WiFi and network, among its known capabilities. It can propagate via USB or directly over a network. It can use several different types of data encryption and compression to store and then exfiltrate data to a controllable set of command-and-control servers.
Application Control Observations and Strategies for Success
It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property. This whitepaper provides a blueprint organizations can adopt to help ensure their own successful application control deployment.
Coalfire Attestation Report: Bit9 Security Platform
Coalfire, a Qualified Security Assessor company, conducted an independent assessment of the Bit9 Security Platform as it pertains to several PCI DSS requirements. Read this attestation report to learn details about how Bit9 helps customers comply with PCI DSS.