Bit9 Introduces The Bit9 Connector For Palo Alto Networks, Enabling Integrated Real-time Endpoint And Network Security Solution For APTsBit9 Introduces The Bit9 Connector For Palo Alto Networks, Enabling Integrated Real-time Endpoint And Network Security Solution For APTs
Solution combines network security with real-time, continuous endpoint and server monitoring and recording
May 22, 2013

PRESS RELEASE
WALTHAM, Mass.--May 21, 2013--Bit9, the leader in Next-generation Endpoint and Server Security, today announced the introduction of the Bit9 Connector for Palo Alto Networks, the first solution to combine network security with real-time, continuous endpoint and server monitoring and recording. The Bit9 Connector for Palo Alto Networks integrates with Palo Alto Networks' next-generation firewalls and WildFire, the company's cloud-based advanced persistent threat (APT) prevention service, and delivers four significant enterprise security firsts:
· It is the FIRST solution to automatically enforce endpoint and server protection based on results from the Palo Alto Networks WildFire service.
· It is the FIRST solution that can automatically retrieve any file on any system and submit it to Palo Alto Networks for execution and analysis.
· It is the FIRST solution to combine a real-time endpoint sensor and continuous recorder with Palo Alto Networks network security devices to automatically prioritize actionable alerts.
· It is the FIRST solution to provide real-time enterprise-wide visibility into all endpoints and servers infected by malware discovered by Palo Alto Networks.
Traditional security solutions are ineffective against today's advanced threats, especially zero-day and targeted attacks. Network security solutions and endpoint/server security solutions can no longer operate in silos; they must work together to deliver complete actionable intelligence from the network to endpoints and servers.
The Bit9 Connector for Palo Alto Networks delivers real-time security for two major use cases:
You May Also Like
Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025Shift Left: Integrating Security into the Software Development Lifecycle
Mar 5, 2025