Bit9 + Cb TV

Learn more about our how to protect against advanced threats with these Bit9 + Carbon Black videos

Announcements

Carbon Black 5.1

The Industry’s Most Complete Detection & Response Solution.

Join the Bit9 + CB Black Security Reliance Partner Program

Learn more about what that means. Visit our Security Reliance Partners page.

Bit9 + Carbon Black Announces Bit9 Security Platform Version 7.2

Bit9 + Carbon Black is taking the industry’s leading application control and prevention solution even further with the release of Bit9 7.2.

Bit9 + Carbon Black Announces Carbon Black Version 4.2

Carbon Black’s latest release has expanded its sensor operating system coverage to include Mac and Linux—in addition to Windows.

Bit9 and Carbon Black Merge, Delivering Unmatched Prevention, Detection and Response

Now One Company Delivering Advanced Threat Protection for Endpoints and Servers + Incident Response in Seconds.

Core Capabilities

Endpoint Security with Bit9 + CB

Traditional endpoint security doesn’t cut it against today’s advanced attacks. You need rapid threat detection and incident response.

Bit9 7.2.1: The Most Comprehensive Endpoint Threat Protection Solution

The Bit9 Security Platform is the industry’s most comprehensive endpoint threat protection solution and the world’s most widely deployed application whitelisting product. With a single agent, Bit9 continuously monitors and records all endpoint and server activity to prevent, detect and respond to cyber threats that evade traditional security defenses.

Bit9 + Carbon Black Explained in Two Minutes

Endpoint threat prevention. Detection and response in seconds. No other security solution has the power to let you Arm Your Endpoints against advanced threats.

Bit9 + Carbon Black Continuous Endpoint Visibility

Know what’s happening on every computer right now. The standard endpoint “best practice” revolves around endpoint antivirus, but AV was designed to operate at scale, designed to counter the opportunistic attacker—as opposed to the advanced threat.

Bit9 + Carbon Black Signature-less Endpoint Threat Detection

Detect attacks in real time without signatures. Signatures are effective for detecting opportunistic threats that find value in scale of access and deploy their malware widely.

Bit9 + Carbon Black Continuous Incident Response

Use a recorded history to see an attack’s full kill chain. Traditional incident response is tedious, time consuming and imperfect. Traditional IR uses log file analysis and filesystem forensics as the primary data to analyze.

Bit9 + Carbon Black Customizable Endpoint Threat Prevention

Stop Advanced Attacks with Proactive, Customizable Malware Protection. Signature-based security solutions are no longer sufficient to protect your organization against advanced and targeted threats.

Bit9 Advanced Threat Detection

The Bit9 Platform combines real-time sensors, Advanced Threat Indicators (ATI) and the cloud-based Bit9 Software Reputation Service to immediately detect advanced persistent threat and malware. You won’t wait for signature file updates. No testing or updating .dat files.

Demo

Carbon Black 5.1

Carbon Black is the first and only endpoint threat detection and response platform that enables SOC and incident response (IR) teams to prepare for a data breach through continuous endpoint recording, customized detection, live response, remediation, and threat banning.

Carbon Black with Lastline

Carbon Black partners with Lastline to provide end-to-end protection against advanced and evasive threats. Watch this demo to see how the integration can accelerate incident response time and improve your organization’s overall security posture.

Bit9 + Carbon Black Integrated Solution

The Bit9 + Carbon Black Security Solution is the industry’s first and only integrated Endpoint Threat Prevention, Detection and Response solution. The Bit9 + Carbon Black Security Solution consists of two industry-leading products (Bit9 and Carbon Black) and the Threat Intelligence Cloud.

Bit9 Security Platform v7.2.1

The Bit9 Security Platform is the most comprehensive endpoint threat protection solution.

Security Platform App for Splunk

Leverage Bit9’s data in Splunk for operational tuning, file investigations, and audit your administrators.

Next Gen Networking Security Tools

Bit9 Security Platform partners with today’s leading next-generation network security vendors to prioritize alerts and analyze threats.

Bit9 Security Platform File Integrity Monitoring & Control

Control and monitor change in your environment with the Bit9 Security Platform.

Bit9 for Mac Demo: Closing the Mac Security Gap in your Enterprise

As Mac products grow in popularity in the enterprise, they are becoming increasingly attractive targets for cybercriminals. Advanced attackers are always looking for enterprise infrastructure vulnerabilities, and their knowledge of how to exploit Mac endpoints has grown.

Bit9 Demo: Bit9 Connector for FireEye

The Bit9 Connector for FireEye delivers a first-of-its-kind integration between network security and endpoint and server security. When FireEye detects a suspicious file on the network, Bit9 consumes the alert and automatically confirms the location, scope and severity of the threat on your endpoints and servers.

Bit9 Demo: Bit9 Connector for Palo Alto Networks

The Bit9 Connector for Palo Alto Networks delivers a first-of-its-kind integration between network security and endpoint and server security. When Palo Alto Networks’ WildFire detects a suspicious file on the network, Bit9 consumes the alert and automatically confirms the location, scope and severity of the threat on your endpoints and servers.

How To

Creating an Event Alert in the Bit9 Security Platform

In this video, learn to craft an email alert—using the Bit9 Security Platform—to fire when USB activity is detected on an endpoint. The Bit9 Security Platform is the most comprehensive endpoint threat protection solution.

Building a Watchlist in Carbon Black

Learn how to customize and build a watchlist in Carbon Black. Carbon Black is the first and only endpoint threat detection and response platform that enables SOC and IR teams to prepare for a breach through continuous endpoint recording, customized detection, live response, remediation, and rapid attack recovery with threat banning.

Auto Ban Files Off of Carbon Black Watchlists Using Event Rules in Bit9

Learn how to automatically ban files off of Carbon Black watchlists using event rules within the Bit9 Security Platform. The Bit9 Security Platform is the industry’s most comprehensive endpoint threat protection solution and the world’s most widely deployed application whitelisting product.

Using the Bit9 Security Platform for FIM/FIC

Learn how to build custom FIM/FIC rules within the Bit9 Security Platform. From a single agent, Bit9 provides organizations with the real time visibility, detection, response and industry leading prevention necessary to stop today’s malware and advanced attacks.

Auto Approve Files with Event Rules in the Bit9 Security Platform

Learn how to auto approve files with event rules using smart and secure criteria in the Bit9 Security Platform. The Bit9 Security Platform is the industry’s most comprehensive endpoint threat protection solution and the world’s most widely deployed application whitelisting product.

CB Integration with iSIGHT Partners for Enhanced Detection & Response

Carbon Black is the industry’s leading endpoint threat detection and response solution. To enhance Carbon Black’s detection and response capabilities, Carbon Black pulls in threat intelligence from the Bit9 + Carbon Black Threat Intelligence Cloud, which offers comprehensive advanced threat intelligence for powerful and accurate threat insight.

Customized Help Link in the Bit9 Notifier

The Bit9 Security Platform is the most comprehensive endpoint threat protection solution. From a single agent, Bit9 provides organizations with the real time visibility, detection, response and industry leading prevention necessary to stop today’s malware and advanced attacks.

Integrating the Bit9 + Carbon Black Servers

The Bit9 + Carbon Black Security Solution is the industry’s first and only integrated Endpoint Threat Prevention, Detection and Response solution. The Bit9 + Carbon Black Security Solution consists of two industry-leading products and the Threat Intelligence Cloud. Independently, each product is a leader in its category. Together, they provide security and risk professionals with the ultimate advanced threat protection solution for Windows, Mac and Linux endpoints and servers.

Bit9 Self-Service Whitelisting Mechanism Using Custom Rules

The Bit9 Security Platform is the most comprehensive endpoint threat protection solution. From a single agent, Bit9 provides organizations with the real time visibility, detection, response and industry leading prevention necessary to stop today’s malware and advanced attacks.

Partner Integration

Bit9 for Palo Alto Networks: Industry-First Network and Endpoint Security Integration

Bit9 for Palo Alto Networks delivers a first-of-its-kind integration between network security and endpoint/server security. When Palo Alto Networks Wildfire detects a suspicious file on the network, Bit9 automatically confirms the location, scope and severity of the threat on your endpoints and servers.

Bit9 for FireEye: Industry-First Network and Endpoint Security Integration

Bit9 for FireEye delivers a first-of-its-kind integration between network security and endpoint/server security. When FireEye detects a suspicious file on the network, Bit9 automatically confirms the location, scope and severity of the threat on your endpoints and servers.

Bit9 for Check Point

Bit9 for Check Point will reduce the overall operational effort of managing network and system security, accelerate incident response time and improve your organization’s overall security posture.

Product Overview

Bit9 for Mac: Closing the Mac Security Gap in your Enterprise

Business users are driving demand for Macs across the enterprise. Until now, the few enterprise security products available for the Mac were dependent on malware signatures and behavioral patterns, which makes them ineffective against today’s advanced threats and targeted attacks.

Bit9 Connector First Real-time Endpoint and Network Security Integration Solution

The Bit9 Connector for Network Security Devices delivers game-changing integration of next-gen network and endpoint security platforms that protects organizations from today’s advanced cyber-attacks.

Bit9 Version 7.0 (Part 1) “Trust-Based Security” – Bit9 Whiteboard

Now you can define trust policies by leveraging the world’s largest database of software reputation ratings — Bit9’s cloud-based Global Software Registry — to automate the creation of your trust policies.

Bit9 Version 7.0 (Part 2) “Server Security” – Bit9 Whiteboard

Servers hold your intellectual property and are ultimately the target of advanced threats. This new release from Bit9 provides enhanced support for servers — memory protection, device control, file integrity monitoring — to provides the industry’s best defense against advanced attacks on servers.

Bit9 Version 7.0 (Part 3) “Virtualization” – Bit9 Whiteboard

You’re probably using virtualization somewhere in your enterprise — VDI, virtualized servers, terminal services or session virtualization. Bit9 is now optimized for the specific needs of virtual environments so you enjoy top performance and security. No other comparable offering has this deep support for virtualization.

Bit9 Version 7.0 (Part 4) “Enterprise Readiness” – Bit9 Whiteboard

If you have hundreds of thousands of servers, desktops, and laptops, Bit9 can protect them all. Are you using software delivery, log management, ticketing systems, or a SIEM? Bit9 integrates with them and also provides a set of open APIs so you can leverage Bit9 data in a customized way.

Thought Leadership

Is Antivirus Dead?

Ben Johnson, Chief Evangelist for Bit9 + Carbon Black, discusses recent comments on “death” of antivirus. He details the need for holistic protection against advanced threats that’s available when combining free antivirus and Enterprise endpoint protection.

LIVE FROM RSA – Inside Cyber Security with Richard Clarke

Bit9, the leader in advanced threat protection for endpoints and servers which recently merged with Carbon Black, hosted a live news conference at RSA Conference 2014 featuring internationally renowned cyber security expert Richard Clarke.

Bit9 Java Vulnerabilities Report: Write Once, Pwn Anywhere

Java Security is becoming an issue as enterprises are not updating their installed versions of Java, ignoring the threat posed by out of date versions.

Use Cases

The Endpoint is the New Perimeter

Ben Johnson, chief security strategist for Bit9 + Carbon Black, discusses what strategies and solutions can be leveraged to combat with the deterioration of the network and our inability to truly secure it. As the network becomes increasingly difficult to secure the endpoint has become the new perimeter.

Part 1: HIPAA Compliance series

The HIPAA Security Rule has been around for more than 10 years, and the 2013 HIPAA Omnibus Rule extended the reach of HIPAA compliance, including requirements covering encryption and breach analysis. This presents an opportunity for healthcare IT security professionals.

Part 2: Who Needs to Comply With the HIPAA Security Rule?

The HIPAA Omnibus Rule broadened the reach of traditional covered entities like payers and providers. With coverage being expanded to business associates and subcontractors, covered entities need to understand the security tools and techniques that can give them the visibility into their systems so they can ensure compliance and security.

Part 3: Why a Risk Assessment Is Critical to HIPAA Compliance and Security

Ensuring HIPAA compliance and the security of ePHI requires organizations to understand what critical data is covered and how it’s potentially at risk, and to take the steps necessary to protect it. A risk assessment is critical to achieving these goals, and using positive security helps covered entities reduce their scope to focus only on the data that matters.

Part 4: HIPAA Compliance Doesn’t Equal Security

The right people, processes and technology tools can help healthcare organizations ensure HIPAA compliance and security, but only when a continuous, proactive approach is utilized.

3 Ways Retailers Can Address POS Security Challenges

The August 2014 US Secret Service bulletin about Backoff Malware shows that the retail industry is facing an unprecedented wave of malware attacks and some business have yet to discover they’ve been breached. While 2013 was labeled “the year of the breach,” 2014 has been even worse. PCI DSS 3.0 states that retailers must address such evolving malware threats in order to satisfy their assessment requirements.

Meet the New PCI DSS 3.0 Standards with Bit9

As of January 1, 2014, the new version of the PCI DSS standard (version 3.0) takes effect. Businesses that are affected by PCI will have 12 months to incorporate the new standard (or new requirements) into their compliance validation programs before the old version of the standard is no longer valid.

Windows XP End of Life: Use Bit9 to Close the Threat Window

When an operating system vendor stops providing security updates and patches to an OS that has reached its end of life, it leaves businesses that fail to migrate with a widened threat window. Find out how Bit9 can help you close the threat window with Windows XP end of life as of April 8, 2014.

Windows XP POS End-of-life: Managing Retail Compliance and Security

When an operating system vendor stops providing updates and patches to an OS that has reached end-of-life, it leaves businesses that are still using that OS in a tough spot. Windows XP POS is reaching its end-of-life on April 8, 2014.

Converging Compliance and Security with Bit9

Complex IT Regulations and standards for companies are growing at an ever-increasing rate. Virtually every industry around the globe is finding that they have or will have some form of compliance regulation to which they must adhere.

Bit9’s Trust-Based Solution Protects Retailers Where Antivirus Fails

Whether it’s Black Friday, Cyber Monday or any other high-traffic period. Retailers often have to undergo holiday freeze periods to free up processing power on point-of-sale (POS) machines to accommodate for the added transactions. This leaves the customer and retailer at risk.

Protect Your Store Systems and Achieve PCI Compliance with Bit9

Sam is a store systems manager for a global grocery store chain. Sam has to maintain over 7,000 retail workstations across 450 locations. Maintaining PCI compliance on aging point-of-sale devices is anything but easy, so find out how Bit9 can help.

Protect your Servers with Bit9

Sam is a store systems manager for a global grocery store chain. Sam has to maintain over 7,000 retail workstations across 450 locations. Maintaining PCI compliance on aging point-of-sale devices is anything but easy, so find out how Bit9 can help.

Whiteboard

Bit9 Whiteboard: ‘Detonate-and-Deny’ Malware Prevention

Bit9 is the only security solution with a “Detonate-and-Deny” approach, which enables you to retrieve and send files from your endpoints and servers to a network security device for detonation and analysis.

Bit9 Whiteboard: Protecting Virtual Desktops and Critical Servers

One misperception surrounding non-persistent images is that when your desktop goes away, so does the malware. Learn more about protecting endpoints, domain controller servers, networks and all virtualized environments.

Bit9 Whiteboard – 9 Ways to Secure Your Store Systems and Ensure PCI Compliance

Bit9 uses cloud-based reputation to stop advanced persistent threats across your store systems, servers and workstations by only allowing trusted software to run – and nothing else.

Bit9 Whiteboard – Enterprise Readiness

Joel Rising, senior solutions architect for Bit9, discusses the value of enterprise readiness, and how it relates to application control. Enterprises need to ensure that their software security vendor has been there and done that, and Bit9 is a solution that can scale across any industry or any size.

Bit9 + Carbon Black