Whitepapers

image

The Convergence of Security and Compliance

This new white paper explains how a single, positive security solution, such as Bit9, facilitates the convergence of compliance and security—one agent that provides visibility, detection, response and protection and can automate and manage compliance for PCI-DSS, SOX, HIPAA, FISMA, GLBA, GPG 13, NERC CIP and other regulations.

image

9 Ways To Secure Your Store Systems and Ensure PCI Compliance

As a retail security professional, you are challenged with maintaining a constant state of PCI compliance and keeping your infrastructure safe using best-of-breed security solutions that help, rather than hinder, your quest to validate your systems.

image

Endpoint Security Demands Defense-in-depth and Advanced Analytics

When it comes to endpoint security, large organizations find themselves in a difficult situation. Most enterprises have host-based security software (i.e., antivirus software) installed on almost every PC and server, yet their IT assets are constantly attacked—and often compromised—by sophisticated malware and targeted attacks.

image

APT Confidential - Top Lessons Learned from Real Attacks

In this unprecedented time of cyber attacks, information about attacker methods is difficult to obtain unless you are the victim, and that is too late. This whitepaper details lessons learned from extensive interviews with security analysts at Bit9, Bit9 customers, and others.

image

Using Whitelisting to Combat Malware Attacks

Numerous studies have proven antivirus (AV) software’s inability to effectively catch all malware. In 2011, Carnegie Mellon University researchers found that “AV immediately detected up to 62.15 percent of malware and required days or even weeks to find the rest.”1 That study also concluded that “despite behavior-based detection, AV software can’t effectively detect all current forms of malware.”

image

Network and Endpoint Security "Get Hitched" for Better Visibility and Response

Many organizations are struggling with security issues. Typically, organizations do not find out about security problems for weeks, months and sometimes even years—and when they do, it is usually by third parties alerting them.

image

Overcoming Blind Spots in Network and Endpoint Security

Despite the fact that today’s IT security threats have advanced across a spectrum of sophistication and scale, defenses continue to fail with alarming consistency. The evolution of defense has produced fragmentation among security tools. The gap between network security technologies and defenses on endpoints and servers is a particularly pointed example.

image

Advanced Threat Landscape What Your Organizations Need to Know

In the wake of the numerous server data breaches reported this year, it is clear that traditional signature-based blacklisting security strategies are inadequate in addressing today’s sophisticated cyber threats. Advanced threats are targeting servers to steal valuable corporate intellectual property. These attacks happen fast – in less than 15-20 minutes – and are bypassing traditional security tools.

image

Advanced Protection Against Advanced Threats

Finding the optimal approach to managing business complexity is a challenge, since this year’s solution is next year’s fixed cost. Anti-virus (AV) technology, for instance, may now cost more than the value it provides. Replacing or retiring it to reduce enterprise costs, however, may have legal ramifications. When navigating their options, organizations are faced with the following questions: What do we want to accomplish? Where do we begin? How will our outcomes improve?

image

Removing the Endpoint Blind Spot

In addition to being the most effective technology for preventing advanced and targeted attacks, Bit9 Parity fills an important gap in the overall visibility of activity within a network. The Bit9 Parity Agent is an endpoint sensor tracking all file and process activity in real time, while the Bit9 Parity Server provides a live inventory view into all executable content across all systems. When coupled with network sensors, such as intrusion detection/prevention systems (IDS/IPS) and firewalls, Bit9 provides audit data that enables earlier detection of threats, better filtering of noise, and faster investigation and remediation times.

image

Moving Beyond a Porous Perimeter

Deploying Bit9 Parity Suite extends threat detection to endpoints and provides the information the Security Information and Event Management system requires to live up to its full potential.

image

Application Whitelisting Puts HIPS in the Recycle Bin

While significant enterprise security resources are devoted to prevention of malicious code infections, malware continues to frustrate security teams. Traditional anti-virus approaches have proven to be ineffective against modern attacks, and organizations that have tried host intrusion prevention find that technology is not an effective part of the endpoint security solution. Application whitelisting monitors endpoints in real time to ensure that only authorized programs can run, and that those programs have not been modified by malware. Application whitelisting applied as the foundation of an endpoint security program gives security teams complete visibility and control of executing applications.

image

The Desktop Dilemma: Liberty vs. Lockdown

Ask any Windows administrator or security professional and you’ll find widespread support for locking down PCs by removing users’ administrative privileges. Why then have so many IT organizations been unable to implement better controls in their desktop environments?

image

Continuous Monitoring & Enforcement Under FISMA

It is a time of great change for Federal IT organizations. A massive movement to reform the Federal Information Security Management Act of 2002 is underway, and Federal Agencies are adapting their security management practices to provide continuous monitoring and enforcement of many critical security controls using security automation and other emerging techniques.This whitepaper describes how these changes are affecting Federal Agencies and what you can do to create a security practice that will support you well into the future of FISMA.

image

A Proactive Approach to Server Security

We don’t need to look very far to see the increasing risk to servers as well as the inadequacy of existing solutions to stem the flow of successful attacks. Servers are easily accessible around the world; they allow direct interaction from thousands or even millions of users, and typically contain information assets of high value to attackers.

image

Realistic Security, Realistically Deployed: Today’s Application Control and Whitelisting

Historically, IT defense has focused largely on the threat. So-called “blacklist” technologies maintain an inventory of specific attack types, and provide defense against each. Today, the volume, variety and sophistication of attacks highlights the limitations of such approaches, as signature databases approach their upper limits and leave exploitable gaps in defense.

image

Application Control in Windows 8

One of the biggest challenges in desktop administration is application control. If administrators are to keep desktops secure, then they must be able to ensure only safe applications are installed on user desktops. Although administrators will employ operating-system-level features geared toward application control, many of the application control tools in Microsoft® Windows® have gaps. As a result, countless users – and even administrators themselves – jeopardize security, either blindly or knowingly.

image

Sharper Forensic Visibility to Address Modern Malware

The sophistication of modern malware (malicious software) and customized threats poses a much higher challenge to security than ever before. Often tested against common countermeasures, today’s threats often combine multiple functionalities that target specific exposures, while maintaining their stealth. They can have a devastating impact. According to the 2010 Verizon Data Breach Investigations Report, 97% of the more than 140 million breached records in the study caseload were compromised through custom malware.1 The question for IT professionals is how can today’s challenging threats be found when they go out of their way to evade detection?