Data Sheets

Bit9 + Carbon Black Security Solution

Bit9 + Carbon Black Security Solution

Bit9 + Carbon Black is the future of endpoint threat detection, response and prevention. Only Bit9 + Carbon Black delivers the unique combination of real-time visibility into what’s happening on every endpoint, can immediately detect attacks in motion, enables rapid response at the moment of compromise, and can contain threats before a data breach occurs and data exfiltration begins.

The Bit9 Security Platform

The Bit9 Security Platform

Today’s security teams face the near-impossible task of protecting a rapidly growing number of corporate devices against an ever more sophisticated and diverse set of attacks. Organizations seeking to safeguard intellectual property, maintain consumer trust, and avoid costly data breaches will look to adopt proactive endpoint security strategies that go beyond signature based antivirus protection.

Network Security Integration

Network Security Integration

Prioritize Malware Alerts and Accelerate File Analysis. The Bit9 Connector delivers certified integrations with next-generation network security solutions with Bit9’s advanced threat protection solution for endpoints and servers.

Bit9 Security Platform App for Splunk

Bit9 Security Platform App for Splunk

Leverage the power of Bit9 and Splunk to conduct advanced endpoint analytics and view dashboards of endpoint and server data in real-time. The Bit9 Security Platform App for Splunk provides administrators with greater insight into enterprise file activity and security-related events. Additionally, combining Bit9 data with other data sources in Splunk can provide security teams with a quick, holistic view of their security environment for improved analysis and operation.

Critical Infrastructure Control Systems

Solution Brief: Critical Systems (ICS/SCADA)

Critical industrial and infrastructure control systems face increasingly sophisticated cyber attacks. Designed to leverage cyber assets to inflict physical damage upon infrastructure systems or the products/goods they support, advanced cyber attacks are a real and growing threat to public utilities, transportation systems, water treatment plants, communication networks, and large manufacturing facilities.

A Positive Security Approach to PCI DSS 3.0 Compliance

Security Approach PCI DSS Compliance

The PCI SSC’s “The Prioritized Approach to Pursue PCI DSS Compliance” provides 6 milestones to guide covered entities aiming to comply with the data security standard. This datasheet identifies how Bit9 + Carbon Black’s positive security approach specifically maps to those milestones.

Quick Reference: PCI Compliance & Security Checklist

PCI Compliance Checklist

This checklist is a quick reference tool listing 9 measures that will help guide your efforts to achieve and maintain PCI compliance.

PCI 3.0

Solution Brief: PCI 3.0: Validates the Convergence of Security and Compliance

PCI DSS version 3.0 took effect on January 1, 2014, and it will affect a greater number of merchants and customers than prior versions. If your organization is affected, you will have 12 months to incorporate the new standard into your compliance validation programs before version 2.0 becomes inactive on December 31, 2014.

Continuous Endpoint Visibility

Solution Brief: Continuous Endpoint Visibility

Many enterprises are blind on their endpoints and lack the situational awareness to accurately detect, respond and prevent data breaches before they occur. This happens because many organizations do not proactively prepare for the inevitability of compromise, the shortfalls of detection and the limitations of traditional prevention techniques.

Endpoint Threat Detection

Solution Brief: Endpoint Threat Detection

For enterprises, it’s no longer a matter of if they will be breached, but a matter of when. Many organizations, in preparation for this, have focused on hardening their perimeter or deploying prevention solutions on their endpoints to minimize their overall attack surface. Although these are an essential part of a defense-in-depth security posture and strategy, being able to expand your ability to detect attacks beyond the moment of compromise has become another critical component to a healthy security posture.

Customizable Advanced Threat Prevention

Solution Brief: Customizable Advanced Threat Prevention

Everything in the threat landscape is escalating: new threat surfaces, various ingress points and attack sophistication make protecting valuable assets increasingly difficult.

Continuous Response

Solution Brief: Continuous Response

In a recent cross-industry study, nearly 40 percent of respondents reported having conducted between 26 to more than 500 forensic investigations over the past two years. Fifty-seven percent said they needed to “find and investigate incidents as they are occurring.” However, traditional incident response is tedious, time-consuming and imperfect.

Joining Forces: Network and Endpoint Security

Solution Brief: Network and Endpoint Security

According to Frost & Sullivan, today’s malware evolves almost every 20 seconds into new and more dangerous variants…and some can bring an enterprise network to a complete halt in less than a minute.  Aware of the importance of protecting themselves against increasingly destructive advanced threats, security and IT teams are adopting nextgeneration network security solutions.

Data Center Security

Solution Brief: Data Center Security

The Bit9 Security Platform enables IT managers to quickly and easily arm physical, virtual or cloud based servers with real-time visibility and proactive, customizable signature-less protection against advanced threats.

The Bit9 Connector for Palo Alto Networks

Bit9 + Carbon Black Connector for Palo Alto Networks

The Bit9 Connector for Palo Alto Networks delivers a first-of-its kind integration of network security with Bit9’s trust-based real-time endpoint and server security solution. When Palo Alto Networks detects malware on the network, Bit9 automatically confirms the location, scope and severity of the threat on your endpoints and servers, which accelerates incident response and remediation.

The Bit9 Connector for Checkpoint

Bit9 + Carbon Black Connector for Checkpoint

Prioritize Malware Alerts and Accelerate Incident Response. The Bit9 Connector for Check Point Software Technologies delivers a certified integration of next-generation network security with Bit9’s advanced threat protection solution for endpoints and servers.

The Bit9 Connector for FireEye

Bit9 + Carbon Black Connector with FireEye

The Bit9 Connector for FireEye delivers a first-of-its kind integration of network security with Bit9’s trust-based real-time endpoint and server security solution. When FireEye detects malware on the network, Bit9 automatically confirms the location, scope and severity of the threat on your endpoints and servers, which accelerates incident response and remediation.

Advanced Threat Protection for POS Systems

Advanced Threat Protection for POS Systems

The Bit9 Security Platform helps retail and hospitality organizations eliminate security vulnerabilities and achieve ongoing Payment Card Industry (PCI) Data Security Standard (DSS) compliance at a lower administrative effort than antivirus solutions.

Advanced Threat Protection: Bit9 Server Security

Server Security Data Sheet

Your servers, whether physical or virtual, hold your company’s IP are the target of Advanced Threats. Bit9 provides a new generation of server security using a trust-based security model that will protect your servers, in real time, from internal and external threats.

Security and Compliance for Windows XP

Security and Compliance for Windows XP

Many modern enterprise systems can be highly distributed, highly utilized and, in many cases, approaching their end-of-life or system expiry dates (i.e., Windows XP is end of life as of April 8, 2014). Once systems have expired, there is no support provided and system updates and patches are no longer available. This situation is compounded by the fact that highly sophisticated targeted attacks are rapidly evolving, multiplying and becoming more malicious.

Carbon Black Virtual Training

Carbon Black Administration Training

Carbon Black training is offered virtually as a one day, instructor-led course. This course will present you with a comprehensive view of the application’s capabilities, including the Carbon Black Alliance. You will see a demonstration of how an actual incident response investigation is conducted using Carbon Black.

Bit9 Administration Training

Bit9 Administration Training

Bit9 Administration Training readies you to start installing, configuring, deploying, and maintaining your Bit9 Security Solution. Participants will learn detailed best practices on how to leverage Bit9 to ensure maximum protection and control over your desktops, laptops, servers, and other endpoints including how to configure Bit9 to best fit your environment through policies, rules, and other system configuration settings.

Bit9 + Carbon Black