Endpoint

1/22/2018
06:05 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Secdo Announces Automated Endpoint Security, Incident Response Capabilities for Mac OS

NEW YORK, NY — (January 17, 2018) - Secdo, a pioneer in automated endpoint security and incident response technology, today announced support for the Apple Mac operating system, including Mac OS 10.13 High Sierra. Secdo’s innovative approach brings a number of long-awaited firsts among endpoint detection and response providers who lack feature parity for organizations faced with growing numbers of Mac users. Combining the only thread-level visibility on the market today with a unique behavior based assisted learning engine, Secdo is the only solution to automatically detect new threats and investigate every security alert from any source in seconds, creating a force multiplier for security teams while dramatically improving the operational backlog for discovery and recovery of internal and external threats.

With the addition of the Mac agent, Secdo brings the following innovations to the endpoint detection and response market, including:

  • The first platform with complete feature parity across Windows, Linux and now Mac for threat hunting, detection, forensic investigations and response;
  • The first agent that monitors all activity at the thread-level allowing process threads to be tracked independently providing greater clarity
  • The only platform that retains all endpoint activity for over one hundred days, more than the average dwell time of a breach , while ensuring no usability limitations at scale;
  • The only platform that incorporates Behavioral Indicators of Compromise (BIOCs) for signature-less custom detection of advanced threats based on attack methodology;
  • The only endpoint platform that correlates Mac data with third-party and SIEM security events mapping the attack timeline and reducing alert triage time to seconds; 
  • The only platform that automatically investigates any third party and SIEM security events creating a complete picture of the attack with detailed forensic data and reducing incident investigation time to minutes;
  • The only platform with a scalable response center allowing both live actions (reverse shell, screen capture, task and file manager, etc.) and home-grown utilities to be run remotely, and
  • The only agent/sensor with consistent near zero impact on performance with continuous monitoring and collection.

"Macs had 299 CVE Vulnerabilities in 2017  and opened 2018 with the Intel Spectre vulnerability and MacOS IOHID kernel vulnerability,” said Jason Dettbarn, CEO of Mac management vendor, Addigy. “Top tier security tools like Secdo are integral to protecting against such Zero Day vulnerabilities while we wait for Apple to release a stable patch to protect machines.”

Secdo’s innovative Behavioral Based Indicators of Compromise (BIOC) technology combined with the unique thread-level visibility and the in-built assisted learning engine allows security teams to detect and protect against Mac specific attack methods rather than signatures. 

Applying this capability to the day-to-day activities of security teams is key to creating a proactive defense, Secdo users will create tailor made BIOCs that will uniquely detect and then automatically investigate anomalies and abnormal behaviors found on any endpoint. The result allows security teams to force multiply their efforts in validation, forensic investigation, and scaled response to any threat in seconds rather than weeks, while ensuring the platform will adapt to protect against future attacks.

“Apple’s inroads in the enterprise has resulted in a corresponding security threat that is the cause of great concern for many organizations,” said Gil Barak, CTO and Co-Founder, Secdo. “With a single interface to investigate every security threat for Windows, Linux and Macs, Secdo makes the process of securing these environments fast, simple and highly effective.”

Availability
Secdo Automated Endpoint Security and Incident Response for Mac is available immediately through authorized partners.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11505
PUBLISHED: 2018-05-26
The Werewolf Online application 0.8.8 for Android allows attackers to discover the Firebase token by reading logcat output.
CVE-2018-6409
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. The module in charge of serving stored files gets the path from the database. Modifying the name of the file to serve on the corresponding ap_form table leads to a path traversal vulnerability via the download.php q parameter.
CVE-2018-6410
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. There is a download.php SQL injection via the q parameter.
CVE-2018-6411
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. When the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. If the filter is set to a whitelist, the dangerous extensions can be bypassed through ap_form_elements SQL Injection.
CVE-2018-11500
PUBLISHED: 2018-05-26
An issue was discovered in PublicCMS V4.0.20180210. There is a CSRF vulnerability in "admin/sysUser/save.do?callbackType=closeCurrent&navTabId=sysUser/list" that can add an admin account.