Vulnerabilities / Threats
7/24/2013
10:56 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Bit9 Introduces The Bit9 Platform For Mac

Bit9 for Mac defends enterprises against advanced threats

WALTHAM, Mass.--July 23, 2013--Bit9, the leader in a new generation of endpoint and server security based on real-time visibility and protection, today announced the introduction of the Bit9 Security Platform for Mac OS X. Built from the ground up for seamless integration with Mac desktops, laptops and servers, Bit9 for Mac offers the same industry-leading security innovations of the Bit9 Platform for Windows and delivers three industry firsts:

· It is the FIRST enterprise security solution that continuously monitors and records all activity on Mac desktops, laptops and servers.

· It is the FIRST enterprise security solution for Macs that detects and stops Mac-targeted advanced threats and zero-day attacks without using signatures.

· It is the FIRST security solution for Macs that integrates with network security devices such as FireEye and Palo Alto Networks to accelerate incident response and ensure all files arriving on endpoints and servers are safe.

Click to Tweet: @Bit9 debuts 1st enterprise security product that continuously monitors & records all activity on Macshttp://bit.ly/1bHDaof #Bit9forMac

Business users are driving demand for Macs across the enterprise. Until now, the few enterprise security products available for the Mac were dependent on malware signatures and behavioral patterns, which makes them ineffective against today's advanced threats and targeted attacks. Organizations and analysts are concerned that Macs now represent a growing vulnerability in the enterprise. With Bit9 for Mac, IT and security teams can support their employees' desire to use Macs while ensuring the highest level of security against today's threat landscape. And enterprises that deploy Bit9 for Windows and Bit9 for Mac are able to manage all of their endpoints and servers from a single console.

Bit9 for Mac defends enterprises against advanced threats and delivers key benefits for advanced threat protection and compliance purposes, including:

· Visibility: Know what's running on every Mac OS X endpoint and server--right now

· Detection: Real-time, signature-less detection of advanced threats and zero-day attacks

· Protection: Stop all untrusted software from executing on any Mac.

· Forensics: A complete recorded history and full audit trail of all threat-related activity on every Mac for immediate incident analysis and response

· Network security integration: A first-of-its-kind integration with next-generation network security solutions from industry leaders such as FireEye and Palo Alto Networks for accelerated incident response and remediation

The Bit9 Security Platform for Mac is available worldwide immediately.

Bit9 Executive Quote: Brian Hazzard, vice president of product management

"The proliferation of Macs in the enterprise has exposed organizations to a fast-growing security challenge. For the past 20 years, Windows endpoints and servers have been the target of most malware. Now, with Macs being deployed in record numbers, enterprises urgently need new solutions to stop threats targeted specifically at Macs. We built Bit9 for Mac from the ground up to provide the same unmatched security for Macs in the enterprise that we do for Windows endpoints and servers. There's no other Mac security solution on the market that delivers continuous monitoring and recording and stops advanced attacks without relying on signatures. Now, enterprises can manage Mac and Windows security from a single Bit9 console. The bar for Mac security has been raised sky high."

Industry Analyst Quote: Fran Howarth, security practice leader, Bloor Research

"Macs are a reality in the enterprise IT ecosystem, and as they proliferate, they are increasingly vulnerable to advanced threats and targeted attacks. It's a big mistake for enterprise security teams to underestimate the potential risks their Mac deployments represent. Bit9 has delivered a version of its platform for Mac that addresses this growing problem with a true enterprise-class security solution that offers real-time monitoring and recording and the same level of protection against untrusted software it offers for Windows."

Industry Analyst Quote: Jane Wright, Senior Research Analyst, Enterprise Strategy Group, Inc.

"According to ESG's research, 59% of enterprise organizations surveyed know or believe that they have been targeted by an advanced persistent threat. As more enterprises deploy Macs to meet employees' needs, those Macs represent an increasingly desirable target for cyber attackers who want to steal intellectual property, financial records, and other valuable data. Antivirus and intrusion protection systems are a first step in keeping most Macs safe, but advanced threats against Macs require more robust security. Solutions designed to detect and prevent cyber threats in real time, such as Bit9 for Mac, can help to fill the security gap arising from the use of Macs in the enterprise."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5208
Published: 2014-12-22
BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM VP through R4.03.00 and R5.x through R5.04.00, and Exaopc through R3.72.10, does not require authentication, which allows remote attackers to read arbitrary files via a RETR operation, write to arbit...

CVE-2014-7286
Published: 2014-12-22
Buffer overflow in AClient in Symantec Deployment Solution 6.9 and earlier on Windows XP and Server 2003 allows local users to gain privileges via unspecified vectors.

CVE-2014-8015
Published: 2014-12-22
The Sponsor Portal in Cisco Identity Services Engine (ISE) allows remote authenticated users to obtain access to an arbitrary sponsor's guest account via a modified HTTP request, aka Bug ID CSCur64400.

CVE-2014-8017
Published: 2014-12-22
The periodic-backup feature in Cisco Identity Services Engine (ISE) allows remote attackers to discover backup-encryption passwords via a crafted request that triggers inclusion of a password in a reply, aka Bug ID CSCur41673.

CVE-2014-8018
Published: 2014-12-22
Multiple cross-site scripting (XSS) vulnerabilities in Business Voice Services Manager (BVSM) pages in the Application Software in Cisco Unified Communications Domain Manager 8 allow remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug IDs CSCur19651, CSCur18555, CSCur1...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.