Bit9 Threat Indicator Service

Bit9 Continuously Monitors your Systems for Suspicious Behavior and Malware

The Bit9 Threat Indicator Service provides updates and additions to the Advanced Threat Indicators (ATI) used by the Bit9 Security Platform to detect advanced threats and zero-day attacks.

How do ATIs work?

Bit9 ATIs monitor and examine many system facets, including files, registry, process and memory execution, to identify potential compromise or infection. Because Bit9 maintains a recorded history of every endpoint and server, it is uniquely able to apply time-based indicators that can ‘reach back in time’ to effectively identify more forms of advanced threats and malware than any other detection tools. In addition, you can also create your own custom ATIs specifically for your environment.

threat-detection

Some examples of the events that ATIs can detect are:

  • A process attempting to harvest cached passwords
  • A PDF file spawning an executable
  • Processes injecting into other processes
  • Processes executing out of suspicious locations, e.g., the recycle bin
video
Bit9 Explained in 2 Minutes

Unlock the Power of Bit9’s Advanced Threat Protection for Endpoints and Servers

Request 5-Day Free Trial

Whitepaper: Realistic Security, Realistically Deployed: Today’s Application Control and Whitelisting

View Now

Datasheet: Bit9 Security Platform

View Now