Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


07:53 PM
Dark Reading
Dark Reading
Products and Releases

Bit9 Announces New Platform To Stop Advanced Persistent Threats

Bit9 Advanced Threat Protection Platform also stops dangerous malware and protects enterprises against intellectual property theft

Click here for more articles.

SAN FRANCISCO--(BUSINESS WIRE)--Bit9, today announced the Bit9 Advanced Threat Protection Platform that addresses the changing threat landscape by protecting all enterprise endpoints, servers and private clouds from cyber-attacks that bypass older antivirus and behavioral security solutions. The Bit9 Advanced Threat Protection Platform stops advanced persistent threats (APTs) as well as dangerous malware and protects enterprises against intellectual property (IP) theft.

“The largest unsanctioned transfer of intellectual property in history is occurring right now,” said Patrick Morley, President and CEO of Bit9. “As companies increasingly rely on their IP to give themselves a competitive advantage in the global marketplace, nation states, hacktivists and cybercriminal groups are making trade secrets and other proprietary information a prime target. Bit9 is committed to helping enterprises create a trusted environment to protect their valuable IP.”

In the last several years, an unprecedented rise in targeted and personalized attacks has led to the loss of core intellectual property from major international corporations and governments. While state sponsored attacks and cyber espionage have been occurring for decades, the industry is seeing more sophisticated, highly targeted multi-stage attacks, which are motivated by a desire to obtain industrial secrets for offshore use. The only way to stop these attacks is to employ a layered security approach that includes advanced threat protection using a trust-based platform.

One Platform, Multiple Components

Bit9’s new platform is based on understanding what is trustworthy inside an enterprise. If organizations can understand what is trusted and have the visibility into all software that is running all the time, they are more likely to be able to stop advanced persistent threats. There are four components to Bit9’s Advanced Threat Protection Platform that work in unison to help put organizations into a proactive security posture: Trust, Detect, Protect and Measure.

Trust: For a proactive security posture – organizations must understand the trustworthiness of all software within their environment. Establishing the trust of software running in an enterprise reduces risk and protects enterprises from advanced threats. By understanding and enforcing only trusted software, organizations also are able to improve operational efficiency and lower costs by reducing helpdesk costs and no longer having to reimage machines. Detect: The second component of the platform is the quick detection of high-risk files and users. Enterprises must understand, in real-time, everything that is arriving inside of their systems, and gain visibility into all critical system resources. Bit9’s real-time sensor provides enterprises with the visibility needed for compliance and to provide a complete audit trail of everything that has happened across the system. Protect: The third component of Bit9’s platform is to protect core intellectual property by ensuring the security of an enterprises’ assets. A policy enforcement engine provides trust-based application control and whitelisting to enforce user and context-based policies dynamically. Rather than having a single policy for everybody, Bit9 allows enterprises to configure policies for different user communities and server environments. The power of this protection is that with Bit9, enterprises are able to protect all of their intellectual property and assets from advanced threats, including servers, virtual machines, desktops, laptops and fixed function devices. Measure: Lastly, enterprises must consistently and continuously create real-time, actionable intelligence on their endpoints so they can measure what is happening in their systems. Bit9’s platform provides automated reporting that can be used for monitoring compliance and audits, allowing administrators to be alerted of any unexpected activity or event. Bit9 also analyzes the data so enterprises can improve their security posture as needed.

Visit Bit9/tv at www.bit9.com/bit9tv, to view a video of Bit9’s CEO Patrick Morley discussing the changing landscape of cybercrime and Bit9’s new Advanced Threat Protection Platform. Read more about the Bit9 Advanced Threat Protection Platform here.

About Bit9

Bit9, the Global Leader in Advanced Threat Protection, protects the world’s intellectual property (IP) by providing innovative, trust-based security solutions to detect and prevent sophisticated cyber threats. The world’s leading brands rely on Bit9’s award-winning Advanced Threat Protection Platform for endpoint protection and server security.

Bit9 stops advanced persistent threats by combining real-time sensors, cloud-based software reputation services, continuous monitoring and trust-based application control and whitelisting—eliminating the risk caused by malicious, illegal and unauthorized software.

The company’s global customers come from a wide variety of industries, including e-commerce, financial services, government, healthcare, retail, technology and utilities. Bit9 was founded on a prestigious United States federal research grant from the National Institute of Standards and Technology – Advanced Technology Program (NIST ATP) to conduct the research that is now at the core of the company’s solutions.

Bit9 is privately held and based in Waltham, Mass. For more information, visit http://www.bit9.com, follow us on Twitter @Bit9 , Facebook and Google+, or call +1 617-393-7400.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...
PUBLISHED: 2021-04-16
jose-node-cjs-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...
PUBLISHED: 2021-04-16
Portofino is an open source web development framework. Portofino before version 5.2.1 did not properly verify the signature of JSON Web Tokens. This allows forging a valid JWT. The issue will be patched in the upcoming 5.2.1 release.
PUBLISHED: 2021-04-16
a12n-server is an npm package which aims to provide a simple authentication system. A new HAL-Form was added to allow editing users in version 0.18.0. This feature should only have been accessible to admins. Unfortunately, privileges were incorrectly checked allowing any logged in user to make this ...
PUBLISHED: 2021-04-16
jose-browser-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDec...