Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:01 AM
Dark Reading
Dark Reading
Products and Releases

HBGary Announces Advanced Endpoint Security, Incident Detection And Enhanced User Efficiency With Active Defense 1.4

Active Defense 1.4 includes enhanced filtering, customized Web-based dashboards

SACRAMENTO, Calif., March 10, 2014 /PRNewswire/ -- HBGary®, a part of ManTech International Corporation® (NASDAQ: MANT), today announced a major update to its award-winning endpoint protection platform Active Defense&trade. Active Defense 1.4, powered by HBGary's patented Digital DNA&trade technology, is the industry-leading threat detection system with powerful new information filtering and data visualization options that provide security teams with instant, deep visibility into all of their Windows®-based endpoints.

Active Defense enables incident responders to detect and validate a security incident and then quickly determine the scope of the breach across the enterprise. It identifies the custom-coded malware and other variants used by today's attackers that signature-based solutions and Indicators of Compromise (IOC) cannot detect – no prior knowledge of the threat is needed for Active Defense to be effective. New enhancements to Active Defense 1.4 enable users with the following:

Industry-First Safe Filtering of Running Software

Active Defense 1.4 includes enhanced filtering to significantly reduce noise and bring into focus suspicious modules to help incident responders rapidly zero in on new or unknown malware. This safe-filtering capability greatly enhances customers' responsiveness for discovery and remediation, and an important development in the fight against advanced threats.

Faster Action with Deeper, at-a-Glance Insight into Protected Systems

Web-based dashboards that help visualize Digital DNA scores can now be easily customized to fit the needs of a specific user. The dashboards help scan results and analyze statistical anomalies across all managed systems. Equipped with the right tools, users can now proactively hunt down advanced attackers with pinpoint accuracy.

Improved Productivity with a Smarter Interface, Tailored to Each User

Active Defense 1.4 remembers a user's most visited menus and systems, eliminating the need for continuous searching and filtering, so that data can be easily found and drilled into. Through the interface, users can quickly look into a system to detect malware and then quickly focus on eradicating it.

"Active Defense 1.4 is the industry's first automated safe filtering of running software. Solutions based on indicators of compromise lag behind attackers and create more work for security teams," said Ken Silva, president of ManTech Cyber Solutions International. "Active Defense acts like a force multiplier and is equipped with behavior-based analysis that transcends any particular threat. Never again will our customers have to wait to discover an attack or the release of an indicator."

HBGary Active Defense powered by Digital DNA does forensically sound host-level scans across the enterprise to gather critical intelligence, including discovery of additional infections. Digital DNA encompasses thousands of the traits commonly seen in advanced malware, such as code and browser injection, packing, obfuscation, surveillance, remote access, network communication, and many others. The analysis reveals the capabilities of all software running on any system, and is highly effective because it requires no prior knowledge of a specific piece of malware. The simple fact that code running in memory may carry out certain potentially malicious functions is sufficient to identify it as suspicious.

Active Defense 1.4 Availability

Active Defense 1.4 is available as of today to new and existing customers. For more information about Active Defense, please contact [email protected]

About HBGary

HBGary provides Enterprise Incident Response solutions and services to enable organizations to conduct key phases of incident response including detecting zero-days and other unknown malware, validating whether an actual incident has occurred, and responding to the incident. Customers include Fortune 50 corporations and U.S. government agencies. HBGary is located in Sacramento, CA and is part of ManTech International Corporation. For information, please visit www.hbgary.com or follow us on Facebook & Twitter.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.