Data Sheets

Corporate Brochure

Corporate Brochure: Endpoint Threat Prevention, Detection and Response

A new generation of threats is attacking your endpoints and servers—you need a modern defense. Today’s attackers are after the data and intellectual property on your endpoints and servers. If you’re relying on traditional endpoint security, such as antivirus, you’re putting your organization at risk. AV doesn’t see or stop targeted attacks, nor does it help you respond to an incident. You need to arm your endpoints so that you can easily see and immediately stop advanced threats.

Carbon Black Data Sheet

Carbon Black: One Solution for Continuous Endpoint Recording, Live Response & Threat Remediation

Carbon Black’s latest release has expanded its sensor operating system coverage to include Mac and Linux—in addition to Windows. There are no changes to the server or console, so you have a single, consistent interface for signature-less threat detection and continuous response—regardless of the diversity of endpoints in your enterprise.

Bit9 + Carbon Black Threat Intelligence Cloud

Bit9 + Carbon Black Threat Intelligence Cloud

The Bit9 + Carbon Black Threat Intelligence Cloud offers a comprehensive, aggregated advanced threat intelligence solution that combines Bit9 + Carbon Black’s leading software reputation and threat indicator services with third-party intelligence sources to provide some of the industry’s most powerful, correlated and accurate threat insight.

Bit9 + Carbon Black Security Solution

Bit9 + Carbon Black Security Solution

Bit9 + Carbon Black is the future of endpoint threat detection, response and prevention. Only Bit9 + Carbon Black delivers the unique combination of real-time visibility into what’s happening on every endpoint, can immediately detect attacks in motion, enables rapid response at the moment of compromise, and can contain threats before a data breach occurs and data exfiltration begins.

The Bit9 Security Platform

The Bit9 Security Platform

Today’s security teams face the near-impossible task of protecting a rapidly growing number of corporate devices against an ever more sophisticated and diverse set of attacks. Organizations seeking to safeguard intellectual property, maintain consumer trust, and avoid costly data breaches will look to adopt proactive endpoint security strategies that go beyond signature based antivirus protection.

Network Security Integration

Network Security Integration

Prioritize Malware Alerts and Accelerate File Analysis. The Bit9 Connector delivers certified integrations with next-generation network security solutions with Bit9’s advanced threat protection solution for endpoints and servers.

Utilities and Energy Security & Compliance Solution

Utilities and Energy Security & Compliance Solution

Bit9 + Carbon Black helps utilities and energy companies protect Industrial Control Systems against cyber attacks. Learn how to strengthen your security profile while maintaining compliance with key requirements of NERC CIP.

Manufacturing Security Solution

Manufacturing Security Solution

Bit9 + Carbon Black helps manufacturers secure their operational technology environments, including unique endpoints like sensors, robots and pumps. Learn how to strengthen your security profile and protect your intellectual property.

Retail and Hospitality Security & Compliance Solution

Retail and Hospitality Security & Compliance Solution

Bit9 + Carbon Black helps some of the largest retail and hospitality businesses protect their POS devices, as well as other endpoints and servers housing customer data. Learn how to strengthen your security profile while ensuring compliance with key requirements of PCI DSS.

Healthcare Security & Compliance Solution

Healthcare Security & Compliance Solution

Bit9 + Carbon Black arms healthcare organizations’ endpoints against today’s sophisticated attacks, protecting patient information and keeping malware from potentially impacting patient care. Learn how to strengthen your security profile while maintaining compliance with the HIPAA Security Rule.

Financial Services Security & Compliance Solution

Financial Services Security & Compliance Solution

Bit9 + Carbon Black helps financial services organizations protect their unique environments, despite the highly-targeted nature of the industry. Learn how to strengthen your security profile while maintaining compliance with key sections of Sarbanes-Oxley.

Aligning with the Critical Security Controls to Achieve Quick Security Wins

Aligning with the Critical Security Controls to Achieve Quick Security Wins

The Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense provide guidance on easy wins for prioritizing security processes that are most effective against today’s threats. This document shows how Bit9 and Carbon Black map to 18 of the top 20 critical controls that will allow your organization to continuously maintain a strong security posture.

The Bit9 Security Platform for Toshiba

The Bit9 Security Platform for Toshiba

Protecting hundreds of thousands of point-of-sale devices, Bit9 combines a trust-based and policy-driven approach to application control with real-time threat intelligence to continuously monitor and record point of sale activity.

NIST Special Publication 800-53

NIST Special Publication 800-53

The security controls in NIST Special Publication 800-53 are designed to facilitate compliance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. This document maps the family class grouping of NIST specifications with Bit9 + Carbon Black’s endpoint security solutions to show how the compliance and security objectives are met for a Federal Security framework.

Bit9 Security Platform App for Splunk

Bit9 Security Platform App for Splunk

Leverage the power of Bit9 and Splunk to conduct advanced endpoint analytics and view dashboards of endpoint and server data in real-time. The Bit9 Security Platform App for Splunk provides administrators with greater insight into enterprise file activity and security-related events. Additionally, combining Bit9 data with other data sources in Splunk can provide security teams with a quick, holistic view of their security environment for improved analysis and operation.

Critical Infrastructure Control Systems

Solution Brief: Critical Systems (ICS/SCADA)

Critical industrial and infrastructure control systems face increasingly sophisticated cyber attacks. Designed to leverage cyber assets to inflict physical damage upon infrastructure systems or the products/goods they support, advanced cyber attacks are a real and growing threat to public utilities, transportation systems, water treatment plants, communication networks, and large manufacturing facilities.

A Positive Security Approach to PCI DSS 3.0 Compliance

Security Approach PCI DSS Compliance

The PCI SSC’s “The Prioritized Approach to Pursue PCI DSS Compliance” provides 6 milestones to guide covered entities aiming to comply with the data security standard. This datasheet identifies how Bit9 + Carbon Black’s positive security approach specifically maps to those milestones.

Quick Reference: PCI Compliance & Security Checklist

PCI Compliance Checklist

This checklist is a quick reference tool listing 9 measures that will help guide your efforts to achieve and maintain PCI compliance.

PCI 3.0

Solution Brief: PCI 3.0: Validates the Convergence of Security and Compliance

PCI DSS version 3.0 took effect on January 1, 2014, and it will affect a greater number of merchants and customers than prior versions. If your organization is affected, you will have 12 months to incorporate the new standard into your compliance validation programs before version 2.0 becomes inactive on December 31, 2014.

Continuous Endpoint Visibility

Solution Brief: Continuous Endpoint Visibility

Many enterprises are blind on their endpoints and lack the situational awareness to accurately detect, respond and prevent data breaches before they occur. This happens because many organizations do not proactively prepare for the inevitability of compromise, the shortfalls of detection and the limitations of traditional prevention techniques.

Endpoint Threat Detection

Solution Brief: Endpoint Threat Detection

For enterprises, it’s no longer a matter of if they will be breached, but a matter of when. Many organizations, in preparation for this, have focused on hardening their perimeter or deploying prevention solutions on their endpoints to minimize their overall attack surface. Although these are an essential part of a defense-in-depth security posture and strategy, being able to expand your ability to detect attacks beyond the moment of compromise has become another critical component to a healthy security posture.

Customizable Advanced Threat Prevention

Solution Brief: Customizable Advanced Threat Prevention

Everything in the threat landscape is escalating: new threat surfaces, various ingress points and attack sophistication make protecting valuable assets increasingly difficult.

Continuous Response

Solution Brief: Continuous Response

In a recent cross-industry study, nearly 40 percent of respondents reported having conducted between 26 to more than 500 forensic investigations over the past two years. Fifty-seven percent said they needed to “find and investigate incidents as they are occurring.” However, traditional incident response is tedious, time-consuming and imperfect.

Joining Forces: Network and Endpoint Security

Solution Brief: Network and Endpoint Security

According to Frost & Sullivan, today’s malware evolves almost every 20 seconds into new and more dangerous variants…and some can bring an enterprise network to a complete halt in less than a minute.  Aware of the importance of protecting themselves against increasingly destructive advanced threats, security and IT teams are adopting nextgeneration network security solutions.

Data Center Security

Solution Brief: Data Center Security

The Bit9 Security Platform enables IT managers to quickly and easily arm physical, virtual or cloud based servers with real-time visibility and proactive, customizable signature-less protection against advanced threats.

The Bit9 Connector for Palo Alto Networks

Bit9 + Carbon Black Connector for Palo Alto Networks

The Bit9 Connector for Palo Alto Networks delivers a first-of-its kind integration of network security with Bit9’s trust-based real-time endpoint and server security solution. When Palo Alto Networks detects malware on the network, Bit9 automatically confirms the location, scope and severity of the threat on your endpoints and servers, which accelerates incident response and remediation.

The Bit9 Connector for Checkpoint

Bit9 + Carbon Black Connector for Checkpoint

Prioritize Malware Alerts and Accelerate Incident Response. The Bit9 Connector for Check Point Software Technologies delivers a certified integration of next-generation network security with Bit9’s advanced threat protection solution for endpoints and servers.

The Bit9 Connector for FireEye

Bit9 + Carbon Black Connector with FireEye

The Bit9 Connector for FireEye delivers a first-of-its kind integration of network security with Bit9’s trust-based real-time endpoint and server security solution. When FireEye detects malware on the network, Bit9 automatically confirms the location, scope and severity of the threat on your endpoints and servers, which accelerates incident response and remediation.

Advanced Threat Protection for POS Systems

Advanced Threat Protection for POS Systems

The Bit9 Security Platform helps retail and hospitality organizations eliminate security vulnerabilities and achieve ongoing Payment Card Industry (PCI) Data Security Standard (DSS) compliance at a lower administrative effort than antivirus solutions.

Advanced Threat Protection: Bit9 Server Security

Server Security Data Sheet

Your servers, whether physical or virtual, hold your company’s IP are the target of Advanced Threats. Bit9 provides a new generation of server security using a trust-based security model that will protect your servers, in real time, from internal and external threats.

Security and Compliance for Windows XP

Security and Compliance for Windows XP

Many modern enterprise systems can be highly distributed, highly utilized and, in many cases, approaching their end-of-life or system expiry dates (i.e., Windows XP is end of life as of April 8, 2014). Once systems have expired, there is no support provided and system updates and patches are no longer available. This situation is compounded by the fact that highly sophisticated targeted attacks are rapidly evolving, multiplying and becoming more malicious.

Carbon Black Virtual Training

Carbon Black Administration Training

Carbon Black training is offered virtually as a one day, instructor-led course. This course will present you with a comprehensive view of the application’s capabilities, including the Carbon Black Alliance. You will see a demonstration of how an actual incident response investigation is conducted using Carbon Black.

Bit9 Virtual Training

Bit9 Administration Training

Bit9 Administration Training readies you to start installing, configuring, deploying, and maintaining your Bit9 Security Solution. Participants will learn detailed best practices on how to leverage Bit9 to ensure maximum protection and control over your desktops, laptops, servers, and other endpoints including how to configure Bit9 to best fit your environment through policies, rules, and other system configuration settings.

Bit9 + Carbon Black
Test