Bit9 Data Sheets
Corporate Brochure: Endpoint Threat Prevention, Detection and Response
A new generation of threats is attacking your endpoints and servers—you need a modern defense. Today’s attackers are after the data and intellectual property on your endpoints and servers. If you’re relying on traditional endpoint security, such as antivirus, you’re putting your organization at risk. AV doesn’t see or stop targeted attacks, nor does it help you respond to an incident. You need to arm your endpoints so that you can easily see and immediately stop advanced threats.
Carbon Black: One Solution for Continuous Endpoint Recording, Live Response & Threat Remediation
Carbon Black’s latest release has expanded its sensor operating system coverage to include Mac and Linux—in addition to Windows. There are no changes to the server or console, so you have a single, consistent interface for signature-less threat detection and continuous response—regardless of the diversity of endpoints in your enterprise.
Bit9 + Carbon Black Threat Intelligence Cloud
The Bit9 + Carbon Black Threat Intelligence Cloud offers a comprehensive, aggregated advanced threat intelligence solution that combines Bit9 + Carbon Black’s leading software reputation and threat indicator services with third-party intelligence sources to provide some of the industry’s most powerful, correlated and accurate threat insight.
Bit9 + Carbon Black Security Solution
Bit9 + Carbon Black is the future of endpoint threat detection, response and prevention. Only Bit9 + Carbon Black delivers the unique combination of real-time visibility into what’s happening on every endpoint, can immediately detect attacks in motion, enables rapid response at the moment of compromise, and can contain threats before a data breach occurs and data exfiltration begins.
The Bit9 Security Platform
Today’s security teams face the near-impossible task of protecting a rapidly growing number of corporate devices against an ever more sophisticated and diverse set of attacks. Organizations seeking to safeguard intellectual property, maintain consumer trust, and avoid costly data breaches will look to adopt proactive endpoint security strategies that go beyond signature based antivirus protection.
Network Security Integration
Prioritize Malware Alerts and Accelerate File Analysis. The Bit9 Connector delivers certified integrations with next-generation network security solutions with Bit9’s advanced threat protection solution for endpoints and servers.
Bit9 Security Platform App for Splunk
Leverage the power of Bit9 and Splunk to conduct advanced endpoint analytics and view dashboards of endpoint and server data in real-time. The Bit9 Security Platform App for Splunk provides administrators with greater insight into enterprise file activity and security-related events. Additionally, combining Bit9 data with other data sources in Splunk can provide security teams with a quick, holistic view of their security environment for improved analysis and operation.
Solution Brief: Critical Systems (ICS/SCADA)
Critical industrial and infrastructure control systems face increasingly sophisticated cyber attacks. Designed to leverage cyber assets to inflict physical damage upon infrastructure systems or the products/goods they support, advanced cyber attacks are a real and growing threat to public utilities, transportation systems, water treatment plants, communication networks, and large manufacturing facilities.
Security Approach PCI DSS Compliance
The PCI SSC’s “The Prioritized Approach to Pursue PCI DSS Compliance” provides 6 milestones to guide covered entities aiming to comply with the data security standard. This datasheet identifies how Bit9 + Carbon Black’s positive security approach specifically maps to those milestones.
Solution Brief: PCI 3.0: Validates the Convergence of Security and Compliance
PCI DSS version 3.0 took effect on January 1, 2014, and it will affect a greater number of merchants and customers than prior versions. If your organization is affected, you will have 12 months to incorporate the new standard into your compliance validation programs before version 2.0 becomes inactive on December 31, 2014.
Solution Brief: Continuous Endpoint Visibility
Many enterprises are blind on their endpoints and lack the situational awareness to accurately detect, respond and prevent data breaches before they occur. This happens because many organizations do not proactively prepare for the inevitability of compromise, the shortfalls of detection and the limitations of traditional prevention techniques.
Solution Brief: Endpoint Threat Detection
For enterprises, it’s no longer a matter of if they will be breached, but a matter of when. Many organizations, in preparation for this, have focused on hardening their perimeter or deploying prevention solutions on their endpoints to minimize their overall attack surface. Although these are an essential part of a defense-in-depth security posture and strategy, being able to expand your ability to detect attacks beyond the moment of compromise has become another critical component to a healthy security posture.
Solution Brief: Customizable Advanced Threat Prevention
Everything in the threat landscape is escalating: new threat surfaces, various ingress points and attack sophistication make protecting valuable assets increasingly difficult.
Solution Brief: Continuous Response
In a recent cross-industry study, nearly 40 percent of respondents reported having conducted between 26 to more than 500 forensic investigations over the past two years. Fifty-seven percent said they needed to “find and investigate incidents as they are occurring.” However, traditional incident response is tedious, time-consuming and imperfect.
Solution Brief: Network and Endpoint Security
According to Frost & Sullivan, today’s malware evolves almost every 20 seconds into new and more dangerous variants…and some can bring an enterprise network to a complete halt in less than a minute. Aware of the importance of protecting themselves against increasingly destructive advanced threats, security and IT teams are adopting nextgeneration network security solutions.
Solution Brief: Data Center Security
The Bit9 Security Platform enables IT managers to quickly and easily arm physical, virtual or cloud based servers with real-time visibility and proactive, customizable signature-less protection against advanced threats.
Bit9 + Carbon Black Connector for Palo Alto Networks
The Bit9 Connector for Palo Alto Networks delivers a first-of-its kind integration of network security with Bit9’s trust-based real-time endpoint and server security solution. When Palo Alto Networks detects malware on the network, Bit9 automatically confirms the location, scope and severity of the threat on your endpoints and servers, which accelerates incident response and remediation.
Bit9 + Carbon Black Connector for Checkpoint
Prioritize Malware Alerts and Accelerate Incident Response. The Bit9 Connector for Check Point Software Technologies delivers a certified integration of next-generation network security with Bit9’s advanced threat protection solution for endpoints and servers.
Bit9 + Carbon Black Connector with FireEye
The Bit9 Connector for FireEye delivers a first-of-its kind integration of network security with Bit9’s trust-based real-time endpoint and server security solution. When FireEye detects malware on the network, Bit9 automatically confirms the location, scope and severity of the threat on your endpoints and servers, which accelerates incident response and remediation.
Advanced Threat Protection for POS Systems
The Bit9 Security Platform helps retail and hospitality organizations eliminate security vulnerabilities and achieve ongoing Payment Card Industry (PCI) Data Security Standard (DSS) compliance at a lower administrative effort than antivirus solutions.
Server Security Data Sheet
Your servers, whether physical or virtual, hold your company’s IP are the target of Advanced Threats. Bit9 provides a new generation of server security using a trust-based security model that will protect your servers, in real time, from internal and external threats.
Security and Compliance for Windows XP
Many modern enterprise systems can be highly distributed, highly utilized and, in many cases, approaching their end-of-life or system expiry dates (i.e., Windows XP is end of life as of April 8, 2014). Once systems have expired, there is no support provided and system updates and patches are no longer available. This situation is compounded by the fact that highly sophisticated targeted attacks are rapidly evolving, multiplying and becoming more malicious.
Carbon Black Administration Training
Carbon Black training is offered virtually as a one day, instructor-led course. This course will present you with a comprehensive view of the application’s capabilities, including the Carbon Black Alliance. You will see a demonstration of how an actual incident response investigation is conducted using Carbon Black.
Bit9 Administration Training
Bit9 Administration Training readies you to start installing, configuring, deploying, and maintaining your Bit9 Security Solution. Participants will learn detailed best practices on how to leverage Bit9 to ensure maximum protection and control over your desktops, laptops, servers, and other endpoints including how to configure Bit9 to best fit your environment through policies, rules, and other system configuration settings.