Bit9 TV

10 Ways to Protect Your Company From Data Breach

As the result of data security breaches at brand name retailers recently, the numerous consequences of suffering a data breach are at the forefront of the public’s attention. Here are ten ways to protect your company from a data breach while maintaining required PCI compliance.

Bit9′s Full Real-time Malware Visibility for Endpoints and Servers

Bit9′s real-time sensor and recorder is the key to Bit9′s signature-less malware detection and incident response capabilities. It delivers unparalleled visibility into all activity on your endpoints and servers—including the most advanced and targeted threats.

Bit9′s Real-time Signature-less Malware Detection for Endpoints and Servers

Your endpoints and servers are constantly under attack by advanced threats, many with the ability to spread laterally and cover their tracks. If you’re depending on scans or signatures for detection, your organization is vulnerable.

Bit9′s Incident Response Capabilities for Endpoints and Servers

Bit9′s real-time sensor and recorder delivers an up-to-the-second recorded history of your endpoints and servers—without scanning or polling. This enables you to go “back in time” to understand what software is on every machine, when it arrived, how it arrived, what created it, if it executed, where it spread, if it deleted itself, and more—all from a central database on your premises.

Bit9′s Advanced Threat Prevention for Endpoints and Servers

Advanced malware and zero-day threats are persistently targeting your organization. Traditional endpoint security solutions that rely on signature-based approaches and scans cannot stop unique malware infiltrating your enterprise.

 Meet the New PCI DSS 3.0 Standards with Bit9

As of January 1, 2014, the new version of the PCI DSS standard (version 3.0) takes effect. Businesses that are affected by PCI will have 12 months to incorporate the new standard (or new requirements) into their compliance validation programs before the old version of the standard is no longer valid. It will be crucial for companies to adapt quickly to the new standard in order to meet the deadline and avoid having to go through the appeal and or extension processes that can burden administration and raise the cost of compliance significantly.

Bit9 Whiteboard: ‘Detonate-and-Deny’ Malware Prevention

Bit9 is the only security solution with a “Detonate-and-Deny” approach, which enables you to retrieve and send files from your endpoints and servers to a network security device for detonation and analysis.

Windows XP End of Life: Use Bit9 to Close the Threat Window

When an operating system vendor stops providing security updates and patches to an OS that has reached its end of life, it leaves businesses that fail to migrate with a widened threat window. Find out how Bit9 can help you close the threat window with Windows XP end of life as of April 8, 2014.

Bit9 for Palo Alto Networks: Industry-First Network and Endpoint Security Integration

Bit9 for Palo Alto Networks delivers a first-of-its-kind integration between network security and endpoint/server security. When Palo Alto Networks Wildfire detects a suspicious file on the network, Bit9 automatically confirms the location, scope and severity of the threat on your endpoints and servers.

Bit9 for FireEye: Industry-First Network and Endpoint Security Integration

Bit9 for FireEye delivers a first-of-its-kind integration between network security and endpoint/server security. When FireEye detects a suspicious file on the network, Bit9 automatically confirms the location, scope and severity of the threat on your endpoints and servers.

Bit9 for Mac: Closing the Mac Security Gap in your Enterprise

Business users are driving demand for Macs across the enterprise. Until now, the few enterprise security products available for the Mac were dependent on malware signatures and behavioral patterns, which makes them ineffective against today’s advanced threats and targeted attacks.

Bit9 Java Vulnerabilities Report: Write Once, Pwn Anywhere

Java Security is becoming an issue as enterprises are not updating their installed versions of Java, ignoring the threat posed by out of date versions.

Bit9 Connector First Real-time Endpoint and Network Security Integration Solution

The Bit9 Connector for Network Security Devices delivers game-changing integration of next-gen network and endpoint security platforms that protects organizations from today’s advanced cyber-attacks.

Bit9 for Mac Demo: Closing the Mac Security Gap in your Enterprise

As Mac products grow in popularity in the enterprise, they are becoming increasingly attractive targets for cybercriminals. Advanced attackers are always looking for enterprise infrastructure vulnerabilities, and their knowledge of how to exploit Mac endpoints has grown.

Windows XP POS End-of-life: Managing Retail Compliance and Security

When an operating system vendor stops providing updates and patches to an OS that has reached end-of-life, it leaves businesses that are still using that OS in a tough spot. Windows XP POS is reaching its end-of-life on April 8, 2014.

Bit9 Demo: Bit9 Connector for FireEye

The Bit9 Connector for FireEye delivers a first-of-its-kind integration between network security and endpoint and server security. When FireEye detects a suspicious file on the network, Bit9 consumes the alert and automatically confirms the location, scope and severity of the threat on your endpoints and servers.

Bit9 Demo: Bit9 Connector for Palo Alto Networks

The Bit9 Connector for Palo Alto Networks delivers a first-of-its-kind integration between network security and endpoint and server security. When Palo Alto Networks’ WildFire detects a suspicious file on the network, Bit9 consumes the alert and automatically confirms the location, scope and severity of the threat on your endpoints and servers.

Converging Compliance and Security with Bit9

Complex IT Regulations and standards for companies are growing at an ever-increasing rate. Virtually every industry around the globe is finding that they have or will have some form of compliance regulation to which they must adhere.

Bit9 Advanced Threat Detection

The Bit9 Platform combines real-time sensors, Advanced Threat Indicators (ATI) and the cloud-based Bit9 Software Reputation Service to immediately detect advanced persistent threat and malware. You won’t wait for signature file updates. No testing or updating .dat files.

Bit9 CTO Harry Sverdlove on the Vulnerability of the Energy Sector to Cyberattacks

With the world relying on the energy infrastructure, deploying advanced security measures and solutions would seem obvious and essential to protect it. However, what typically happens is the energy sector makes initial investments in security, but over time neglect sets in.

Bit9 CEO Patrick Morley on the Past, Present and Future of Trust-based Security

Bit9 saw tremendous growth in 2012, while also publicly announcing that we were the only security solution to stop two important pieces of malware in both Flame and Gauss. The reason for this being that traditional security solutions can’t protect you against today’s advanced threats and malware.

The Future of Cybersecurity with Bit9 CTO Harry Sverdlove

In 2012 cyber security was on the forefront of news. We saw cyber destruction, espionage and intellectual property theft happening at the highest level. In 2013, we could see a continuation of these threats across new platforms that will demand action at the federal level.

Bit9 is the Only Security Solution to Stop Gauss Malware

Bit9′s malware protection security solution is the only solution to stop the malware behind the RSA breach, Flame, and Gauss. By preventing anything unauthorized from running, Bit9 was able to stop Gauss merely because it was untrusted. Learn more about malware protection

Bit9 Whiteboard: Early Detection and Continuous Auditing

If you were breached would you even know it? Having early detection capabilities present within your security posture is important to continuously defend against advanced attacks. Bit9 is the only company to truly offer DVR-like monitoring of your endpoints and servers while giving users a full scope of their environment

Bit9 Whiteboard: Protecting Virtual Desktops and Critical Servers

One misperception surrounding non-persistent images is that when your desktop goes away, so does the malware. Learn more about protecting endpoints, domain controller servers, networks and all virtualized environments

Advanced Threat Landscape: What Organizations Need to Know

Ben Ramirez, Industry Analyst of Frost & Sullivan uncovers the unique challenges in securing a server environment, discusses why traditional blacklisting endpoint solutions cannot keep up with today’s malware and recommends the adoption of trust-based security solutions.

Bit9′s Trust-Based Solution Protects Retailers Where Antivirus Fails

Whether it’s Black Friday, Cyber Monday or any other high-traffic period. Retailers often have to undergo holiday freeze periods to free up processing power on point-of-sale (POS) machines to accommodate for the added transactions. This leaves the customer and retailer at risk.

Pausing Google Play: More Than 100,000 Android Apps May Pose

It’s no surprise that employee-owned mobile devices are entering the workplace in big numbers, via the BYOD (bring your own device) phenomenon, but what about the apps that reside on those devices?

Bit9 Whiteboard – 9 Ways to Secure Your Store Systems and Ensure PCI Compliance

Bit9 uses cloud-based reputation to stop advanced persistent threats across your store systems, servers and workstations by only allowing trusted software to run – and nothing else.

Bit9 Version 7.0 Demo: Our New Trust-Based Security Solution

Bit9 v7.0 is the biggest product release from Bit9 ever. This new release builds on the fundamental principles of application control and whitelisting – only allowing trusted software to run in your enterprise – but goes beyond the limitations of early technologies to create a next-gen approach to cyber security.

Bit9 Version 7.0 (Part 1) “Trust-Based Security” – Bit9 Whiteboard

Now you can define trust policies by leveraging the world’s largest database of software reputation ratings — Bit9′s cloud-based Global Software Registry — to automate the creation of your trust policies.

Bit9 Version 7.0 (Part 2) “Server Security” – Bit9 Whiteboard

Servers hold your intellectual property and are ultimately the target of advanced threats. This new release from Bit9 provides enhanced support for servers — memory protection, device control, file integrity monitoring — to provides the industry’s best defense against advanced attacks on servers.

Bit9 Version 7.0 (Part 3) “Virtualization” – Bit9 Whiteboard

You’re probably using virtualization somewhere in your enterprise — VDI, virtualized servers, terminal services or session virtualization. Bit9 is now optimized for the specific needs of virtual environments so you enjoy top performance and security. No other comparable offering has this deep support for virtualization.

Bit9 Version 7.0 (Part 4) “Enterprise Readiness” – Bit9 Whiteboard

f you have hundreds of thousands of servers, desktops, and laptops, Bit9 can protect them all. Are you using software delivery, log management, ticketing systems, or a SIEM? Bit9 integrates with them and also provides a set of open APIs so you can leverage Bit9 data in a customized way.

Bit9 Whiteboard – Enterprise Readiness

Joel Rising, senior solutions architect for Bit9, discusses the value of enterprise readiness, and how it relates to application control. Enterprises need to ensure that their software security vendor has been there and done that, and Bit9 is a solution that can scale across any industry or any size.

Bit9 Whiteboard – Server Security

Michael Bilancieri, director of product management for servers, discusses the limitations of current security solutions for servers and how Bit9′s trust-based application control can fill in the gap left behind by legacy solutions.

Protect Your Store Systems and Achieve PCI Compliance with Bit9

Sam is a store systems manager for a global grocery store chain. Sam has to maintain over 7,000 retail workstations across 450 locations. Maintaining PCI compliance on aging point-of-sale devices is anything but easy, so find out how Bit9 can help

Protect your Servers with Bit9

Sam is a store systems manager for a global grocery store chain. Sam has to maintain over 7,000 retail workstations across 450 locations. Maintaining PCI compliance on aging point-of-sale devices is anything but easy, so find out how Bit9 can help.

Protect your Assets with Trust Based Application Control from Bit9

Learn the power of application control in our latest animated video and how Trust, Detection, Protection, and Measuring can help you build reputation in your network from within a proactive posture. Learn more about application control from Bit9.

Bit9 Whiteboard – Bit9 Stops Advanced Malware ‘Flame’

Bit9, the global leader in advanced threat protection, reports of stopping persistent attacks over an eight-month period from the most sophisticated cyber weapon ever unleashed titled ‘Flame’. Harry Sverdlove, Chief Technology Officer for Bit9 explains.

Bit9 Whiteboard – Retail (Session 2, PCI)

Christopher Strand, Senior Solutions Consultant & Compliance Specialist for Bit9, discusses PCI Compliance.

University-Affiliated Research Center Combats Malware with Bit9

Jody Patilla, analyst for University-affiliated research center, talks about the benefits of using Bit9 to build trust in her organizations environment. By using Bit9′s advanced application control, she could gain insight and visibility across her network through Bit9′s security information and event management (SIEM) system.

Bit9 Cyber Security Research Report 2012

Bit9 Cyber Security Research Report overview by Harry Sverdlove. Includes discussion of Anonymous and nation-state attacks using advanced malware.

Bit9 and the Security Landscape

At RSA, we premiered this video to highlight the future of security and the threats companies will need to protect against. One thing is for certain, these threats are real, and they are not going away.

Bit9 Whiteboard – Advanced Threat Protection Platform

Brian Hazzard, VP of Product Management for Bit9, discusses the benefits of Bit9′s advanced threat protection platform, and how staying in a proactive security posture with trust-based security solutions can increase protection on your system.

Bit9 Whiteboard – Domain Controllers

0% of Advanced Threats are targeting the data on your servers so it’s understandable that Gartner recommends application control as the “cornerstone of your server protection strategy”

Harry Sverdlove on RSA 2012

Bit9, announced the Bit9 Advanced Threat Protection Platform that addresses the changing threat landscape by protecting all enterprise endpoints, servers, and private clouds from cyber-attacks that bypass older antivirus and behavioral security solutions.

Bit9 Whiteboard – Tolly Review

Dan Brown, senior security researcher for Bit9, discusses the recent Tolly Review and how traditional blacklisting approaches from legacy antivirus solutions can be easily bypassed.

Bit9 CEO Patrick Morley On the Advanced Threat

Varying businesses like RSA, Sony PlayStation, Nortel, and Symantec have all either seen intellectual Property (IP) stolen or have had sensitive user data exploited. IP theft has prompted leading brands to protect against the advanced threat.

Bit9 Whiteboard – Retail

Christopher Strand, Senior Solutions Consultant & Compliance Specialist for Bit9, discusses PCI Compliance, increasing performance, and eliminating antivirus solutions on retail endpoints.

Bit9 Whiteboard – SIEM

Harry Sverdlove, chief technology officer for Bit9, discusses Security Information Event Management (SIEM) and how it may pertain to your business.

Bit9 Whiteboard – Server Security

Brian Heffernan, senior systems engineer for Bit9, discusses server security and how it may pertain to your business.

Orphan Android: Bit9′s Top “Dirty Dozen” Most Vulnerable Not-So-Smartphones of 2011

Harry Sverdlove discusses the top “Dirty Dozen” smartphones of 2011. Many Android devices operating system is out-of-date because the software itself is not centrally managed by Google.

Bit9 Board Member Richard Clarke Discusses Industrial Espionage

Bit9 Board Member, Richard Clarke discusses Criminals, Hacktivists, Espionage, and War (CHEW) in the digital age.

Richard Clarke Joins Bit9 Board of Directors; Discusses Application Whitelisting

Richard Clark, US Cyberterrorism and Cyber Security Czar talks about why he joined the Bit9 board of directors and why application why application whitelisting stops advanced persistent threats.

Advanced Persistent Threat Protection

Bit9 Chief Technology Officer Harry Sverdlove talks about high profile, highly targeted advanced persistent threat/phishing attacks, and the need to remain diligent in protecting your network. By stating the need for a strong security posture, Harry provides steps for IT professionals to lockdown endpoints and servers.