Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Bit9 Announces Platform Designed to Defend Against APTs

RSA Conference News

SAN FRANCISCO – RSA CONFERENCE 2012 – Bit9, the company best known for its application whitelisting technology, today announced a platform that the company says will help protect all enterprise endpoints, servers and private clouds from cyber-attacks that often make their way past other anti-virus and behavioral security solutions.

RSA Conference News

SAN FRANCISCO – RSA CONFERENCE 2012 – Bit9, the company best known for its application whitelisting technology, today announced a platform that the company says will help protect all enterprise endpoints, servers and private clouds from cyber-attacks that often make their way past other anti-virus and behavioral security solutions.

Called the “Bit9 Advanced Threat Protection Platform”, the company says the solution is based on understanding what is trustworthy inside an enterprise. By understanding what is trusted and having visibility into all software that is running at all times, organizations are more likely to be able to defend against advanced persistent threats.

Bit9 LogoThere are four components to Bit9’s Advanced Threat Protection Platform that work together: Trust, Detect, Protect and Measure – Bit9 Explains each in detail:

Trust: For a proactive security posture – organizations must understand the trustworthiness of all software within their environment. Establishing the trust of software running in an enterprise reduces risk and protects enterprises from advanced threats. By understanding and enforcing only trusted software, organizations also are able to improve operational efficiency and lower costs by reducing helpdesk costs and no longer having to reimage machines.

Detect: The second component of the platform is the quick detection of high-risk files and users. Enterprises must understand, in real-time, everything that is arriving inside of their systems, and gain visibility into all critical system resources. Bit9’s real-time sensor provides enterprises with the visibility needed for compliance and to provide a complete audit trail of everything that has happened across the system.

Protect: The third component of Bit9’s platform is to protect core intellectual property by ensuring the security of an enterprises’ assets. A policy enforcement engine provides trust-based application control and whitelisting to enforce user and context-based policies dynamically. Rather than having a single policy for everybody, Bit9 allows enterprises to configure policies for different user communities and server environments. The power of this protection is that with Bit9, enterprises are able to protect all of their intellectual property and assets from advanced threats, including servers, virtual machines, desktops, laptops and fixed function devices.

Measure: Lastly, enterprises must consistently and continuously create real-time, actionable intelligence on their endpoints so they can measure what is happening in their systems. Bit9’s platform provides automated reporting that can be used for monitoring compliance and audits, allowing administrators to be alerted of any unexpected activity or event. Bit9 also analyzes the data so enterprises can improve their security posture as needed.

“The largest unsanctioned transfer of intellectual property in history is occurring right now,” said Patrick Morley, President and CEO of Bit9. “As companies increasingly rely on their IP to give themselves a competitive advantage in the global marketplace, nation states, hacktivists and cybercriminal groups are making trade secrets and other proprietary information a prime target. Bit9 is committed to helping enterprises create a trusted environment to protect their valuable IP.”

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...