Bit9 Datasheets

image

Bit9 Store Systems Security

The Bit9 Security Platform helps retail and hospitality organizations eliminate security vulnerabilities and achieve ongoing Payment Card Industry (PCI) Data Security Standard (DSS) compliance at a lower administrative effort than antivirus solutions.

image

Server Security Data Sheet

Your servers, whether physical or virtual, hold your company’s IP are the target of Advanced Threats. Bit9 provides a new generation of server security using a trust-based security model that will protect your servers, in real time, from internal and external threats.

image

Solution Brief: PCI 3.0: Validates the Convergence of Security and Compliance

PCI DSS version 3.0 took effect on January 1, 2014, and it will affect a greater number of merchants and customers than prior versions. If your organization is affected, you will have 12 months to incorporate the new standard into your compliance validation programs before version 2.0 becomes inactive on December 31, 2014.

image

Security and Compliance for Windows XP

Many modern enterprise systems can be highly distributed, highly utilized and, in many cases, approaching their end-of-life or system expiry dates (i.e., Windows XP is end of life as of April 8, 2014). Once systems have expired, there is no support provided and system updates and patches are no longer available. This situation is compounded by the fact that highly sophisticated targeted attacks are rapidly evolving, multiplying and becoming more malicious. Attacks are often targeted against systems that are aging, becoming more costly to maintain and more vulnerable. Once an expired system has known vulnerabilities, exploits become much easier to perform, as traditional methods of defense will no longer protect and secure them.

image

Bit9 Security Platform

When your organization makes a major investment in securing your environment against advanced threats, you need to ensure optimal performance and availability. And you need a cross-platform solution that requires only minimal IT or security administration, as well as one that is nonintrusive to the end user.

image

Solution Brief: Defeating the Hydra: Detecting Advanced Attacks

According to legend, the Hydra had the body of a serpent and, in some versions of the story, up to one hundred heads. If any of the heads was severed, another one (or two) would grow in its place. Today’s advanced cyber attacks also proliferate and mutate on a daily basis – and they attack along many different vectors.

image

Solution Brief: Endpoint Security: Visibility for “All Software, All the Time”

In our previous solution brief, we looked at the essential capabilities that enable advanced threat detection of advanced attacks right now — but they all depend on having complete visibility into what’s going on at every endpoint and server in your infrastructure, whether it’s running Windows or Mac OS X.

image

Solution Brief: Joining Forces: Network and Endpoint Security

According to Frost & Sullivan, today’s malware evolves almost every 20 seconds into new and more dangerous variants…and some can bring an enterprise network to a complete halt in less than a minute.  Aware of the importance of protecting themselves against increasingly destructive advanced threats, security and IT teams are adopting nextgeneration network security solutions. These solutions feature advanced capabilities for monitoring network activity, analyzing suspicious files, and generating alerts for malware found.

image

Solution Brief: Proactive Prevention: Denying Advanced Attackers Through Policy

Everything in the threat landscape is escalating: new threat surfaces, various ingress points and attack sophistication make protecting valuable assets increasingly difficult.

image

Solution Brief: Real-time Cyber Forensics for Incident Response

In a recent cross-industry study, nearly 40 percent of respondents reported having conducted between 26 to more than 500 forensic investigations over the past two years. Why? Fifty-seven percent said they needed to “find and investigate incidents as they are occurring.” Businesses are increasingly experiencing advanced malware and zero-day attacks; in fact, fifty percent of respondents in this study were specifically trying to track and remediate Advanced Persistent Threats (APTs).

image

Bit9 for Mac

Bit9 for Mac is the only nextgeneration endpoint and server security solution that continuously monitors and records all endpoint and server activity while also stopping targeted cyber threats that specifically exploit Macs.

image

Bit9 Integrates with Palo Alto Networks

The Bit9 Connector for Palo Alto Networks delivers a first-of-its kind integration of network security with Bit9’s trust-based real-time endpoint and server security solution. When Palo Alto Networks detects malware on the network, Bit9 automatically confirms the location, scope and severity of the threat on your endpoints and servers, which accelerates incident response and remediation. With this integration, security analysts can filter out non-actionable events and prioritize high-impact alerts for rapid incident response, locate every instance of malware across their endpoints and servers, prevent future attacks through automated security policy updates, and use Palo Alto Networks to automatically analyze all files arriving on endpoints and servers to determine their risk. The Bit9 Connector for Palo Alto Networks will reduce the overall operational effort of managing network and system security, accelerate incident response time and improve your organization’s overall security posture.

image

Bit9 Integrates with FireEye

The Bit9 Connector for FireEye delivers a first-of-its kind integration of network security with Bit9’s trust-based real-time endpoint and server security solution. When FireEye detects malware on the network, Bit9 automatically confirms the location, scope and severity of the threat on your endpoints and servers, which accelerates incident response and remediation. With this integration, security analysts can filter out non-actionable events and prioritize high-impact alerts for rapid incident response, locate every instance of malware across their endpoints and servers, prevent future attacks through automated security policy updates, and use FireEye to automatically analyze all files arriving on endpoints and servers to determine their risk. The Bit9 Connector for FireEye will reduce the overall operational effort of managing network and system security, accelerate incident response time and improve your organization’s overall security posture.

image

Cyber Forensics Data Sheet

The Bit9 Software Reputation Service for Cyber Forensics leverages the world’s largest and most complete authority on software reputation, to help users identify, validate and assign reputation to unknown software.

image

Bit9 Software Reputation Service (formerly GSR) Data Sheet

The Bit9 Software Reputation Service provides the insight and intelligence you need to easily identify and authenticate software files through our fast, on-demand service, so you can better protect your customers.

image

Bit9 ISV Safe Software Program

Right now there are many endpoint security vendors updating their signatures every day across millions of endpoints, how do you know if your application has been designated as malicious? When your software is mistakenly blacklisted by any vendor, the impact on your customer is severe while your ability to identify the problem is minimal.

image

Bit9 Managed Admin Services

Leverage Bit9’s experience to rapidly heighten your security posture, while retaining control of your security policies and freeing your internal team to focus on other important security objectives.

image

Bit9 Administration Training

Bit9 Administration Training readies you to start installing, configuring, deploying, and maintaining your Bit9 Security Solution.Participants will learn detailed best practices on how to leverage Bit9 to ensure maximum protection and control over your desktops, laptops, servers, and other endpoints including how to configure Bit9 to best fit your environment through policies, rules, and other system configuration settings.