Vulnerabilities / Threats
7/24/2013
10:56 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Bit9 Introduces The Bit9 Platform For Mac

Bit9 for Mac defends enterprises against advanced threats

WALTHAM, Mass.--July 23, 2013--Bit9, the leader in a new generation of endpoint and server security based on real-time visibility and protection, today announced the introduction of the Bit9 Security Platform for Mac OS X. Built from the ground up for seamless integration with Mac desktops, laptops and servers, Bit9 for Mac offers the same industry-leading security innovations of the Bit9 Platform for Windows and delivers three industry firsts:

· It is the FIRST enterprise security solution that continuously monitors and records all activity on Mac desktops, laptops and servers.

· It is the FIRST enterprise security solution for Macs that detects and stops Mac-targeted advanced threats and zero-day attacks without using signatures.

· It is the FIRST security solution for Macs that integrates with network security devices such as FireEye and Palo Alto Networks to accelerate incident response and ensure all files arriving on endpoints and servers are safe.

Click to Tweet: @Bit9 debuts 1st enterprise security product that continuously monitors & records all activity on Macshttp://bit.ly/1bHDaof #Bit9forMac

Business users are driving demand for Macs across the enterprise. Until now, the few enterprise security products available for the Mac were dependent on malware signatures and behavioral patterns, which makes them ineffective against today's advanced threats and targeted attacks. Organizations and analysts are concerned that Macs now represent a growing vulnerability in the enterprise. With Bit9 for Mac, IT and security teams can support their employees' desire to use Macs while ensuring the highest level of security against today's threat landscape. And enterprises that deploy Bit9 for Windows and Bit9 for Mac are able to manage all of their endpoints and servers from a single console.

Bit9 for Mac defends enterprises against advanced threats and delivers key benefits for advanced threat protection and compliance purposes, including:

· Visibility: Know what's running on every Mac OS X endpoint and server--right now

· Detection: Real-time, signature-less detection of advanced threats and zero-day attacks

· Protection: Stop all untrusted software from executing on any Mac.

· Forensics: A complete recorded history and full audit trail of all threat-related activity on every Mac for immediate incident analysis and response

· Network security integration: A first-of-its-kind integration with next-generation network security solutions from industry leaders such as FireEye and Palo Alto Networks for accelerated incident response and remediation

The Bit9 Security Platform for Mac is available worldwide immediately.

Bit9 Executive Quote: Brian Hazzard, vice president of product management

"The proliferation of Macs in the enterprise has exposed organizations to a fast-growing security challenge. For the past 20 years, Windows endpoints and servers have been the target of most malware. Now, with Macs being deployed in record numbers, enterprises urgently need new solutions to stop threats targeted specifically at Macs. We built Bit9 for Mac from the ground up to provide the same unmatched security for Macs in the enterprise that we do for Windows endpoints and servers. There's no other Mac security solution on the market that delivers continuous monitoring and recording and stops advanced attacks without relying on signatures. Now, enterprises can manage Mac and Windows security from a single Bit9 console. The bar for Mac security has been raised sky high."

Industry Analyst Quote: Fran Howarth, security practice leader, Bloor Research

"Macs are a reality in the enterprise IT ecosystem, and as they proliferate, they are increasingly vulnerable to advanced threats and targeted attacks. It's a big mistake for enterprise security teams to underestimate the potential risks their Mac deployments represent. Bit9 has delivered a version of its platform for Mac that addresses this growing problem with a true enterprise-class security solution that offers real-time monitoring and recording and the same level of protection against untrusted software it offers for Windows."

Industry Analyst Quote: Jane Wright, Senior Research Analyst, Enterprise Strategy Group, Inc.

"According to ESG's research, 59% of enterprise organizations surveyed know or believe that they have been targeted by an advanced persistent threat. As more enterprises deploy Macs to meet employees' needs, those Macs represent an increasingly desirable target for cyber attackers who want to steal intellectual property, financial records, and other valuable data. Antivirus and intrusion protection systems are a first step in keeping most Macs safe, but advanced threats against Macs require more robust security. Solutions designed to detect and prevent cyber threats in real time, such as Bit9 for Mac, can help to fill the security gap arising from the use of Macs in the enterprise."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7407
Published: 2014-10-22
Cross-site request forgery (CSRF) vulnerability in the MRBS module for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

CVE-2014-3675
Published: 2014-10-22
Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.

CVE-2014-3676
Published: 2014-10-22
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."

CVE-2014-3677
Published: 2014-10-22
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.

CVE-2014-4448
Published: 2014-10-22
House Arrest in Apple iOS before 8.1 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information from a Documents directory by obtaining this UID.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.