Vulnerabilities / Threats
7/24/2013
10:56 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Bit9 Introduces The Bit9 Platform For Mac

Bit9 for Mac defends enterprises against advanced threats

WALTHAM, Mass.--July 23, 2013--Bit9, the leader in a new generation of endpoint and server security based on real-time visibility and protection, today announced the introduction of the Bit9 Security Platform for Mac OS X. Built from the ground up for seamless integration with Mac desktops, laptops and servers, Bit9 for Mac offers the same industry-leading security innovations of the Bit9 Platform for Windows and delivers three industry firsts:

· It is the FIRST enterprise security solution that continuously monitors and records all activity on Mac desktops, laptops and servers.

· It is the FIRST enterprise security solution for Macs that detects and stops Mac-targeted advanced threats and zero-day attacks without using signatures.

· It is the FIRST security solution for Macs that integrates with network security devices such as FireEye and Palo Alto Networks to accelerate incident response and ensure all files arriving on endpoints and servers are safe.

Click to Tweet: @Bit9 debuts 1st enterprise security product that continuously monitors & records all activity on Macshttp://bit.ly/1bHDaof #Bit9forMac

Business users are driving demand for Macs across the enterprise. Until now, the few enterprise security products available for the Mac were dependent on malware signatures and behavioral patterns, which makes them ineffective against today's advanced threats and targeted attacks. Organizations and analysts are concerned that Macs now represent a growing vulnerability in the enterprise. With Bit9 for Mac, IT and security teams can support their employees' desire to use Macs while ensuring the highest level of security against today's threat landscape. And enterprises that deploy Bit9 for Windows and Bit9 for Mac are able to manage all of their endpoints and servers from a single console.

Bit9 for Mac defends enterprises against advanced threats and delivers key benefits for advanced threat protection and compliance purposes, including:

· Visibility: Know what's running on every Mac OS X endpoint and server--right now

· Detection: Real-time, signature-less detection of advanced threats and zero-day attacks

· Protection: Stop all untrusted software from executing on any Mac.

· Forensics: A complete recorded history and full audit trail of all threat-related activity on every Mac for immediate incident analysis and response

· Network security integration: A first-of-its-kind integration with next-generation network security solutions from industry leaders such as FireEye and Palo Alto Networks for accelerated incident response and remediation

The Bit9 Security Platform for Mac is available worldwide immediately.

Bit9 Executive Quote: Brian Hazzard, vice president of product management

"The proliferation of Macs in the enterprise has exposed organizations to a fast-growing security challenge. For the past 20 years, Windows endpoints and servers have been the target of most malware. Now, with Macs being deployed in record numbers, enterprises urgently need new solutions to stop threats targeted specifically at Macs. We built Bit9 for Mac from the ground up to provide the same unmatched security for Macs in the enterprise that we do for Windows endpoints and servers. There's no other Mac security solution on the market that delivers continuous monitoring and recording and stops advanced attacks without relying on signatures. Now, enterprises can manage Mac and Windows security from a single Bit9 console. The bar for Mac security has been raised sky high."

Industry Analyst Quote: Fran Howarth, security practice leader, Bloor Research

"Macs are a reality in the enterprise IT ecosystem, and as they proliferate, they are increasingly vulnerable to advanced threats and targeted attacks. It's a big mistake for enterprise security teams to underestimate the potential risks their Mac deployments represent. Bit9 has delivered a version of its platform for Mac that addresses this growing problem with a true enterprise-class security solution that offers real-time monitoring and recording and the same level of protection against untrusted software it offers for Windows."

Industry Analyst Quote: Jane Wright, Senior Research Analyst, Enterprise Strategy Group, Inc.

"According to ESG's research, 59% of enterprise organizations surveyed know or believe that they have been targeted by an advanced persistent threat. As more enterprises deploy Macs to meet employees' needs, those Macs represent an increasingly desirable target for cyber attackers who want to steal intellectual property, financial records, and other valuable data. Antivirus and intrusion protection systems are a first step in keeping most Macs safe, but advanced threats against Macs require more robust security. Solutions designed to detect and prevent cyber threats in real time, such as Bit9 for Mac, can help to fill the security gap arising from the use of Macs in the enterprise."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7298
Published: 2014-10-24
adsetgroups in Centrify Server Suite 2008 through 2014.1 and Centrify DirectControl 3.x through 4.2.0 on Linux and UNIX allows local users to read arbitrary files with root privileges by leveraging improperly protected setuid functionality.

CVE-2014-8346
Published: 2014-10-24
The Remote Controls feature on Samsung mobile devices does not validate the source of lock-code data received over a network, which makes it easier for remote attackers to cause a denial of service (screen locking with an arbitrary code) by triggering unexpected Find My Mobile network traffic.

CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.