Transforming Network Infrastructure Industry News

TMCNet:  Bit9 Free Webcast-Enhancing Security Through a Trust-based Approach

[December 03, 2012]

Bit9 Free Webcast-Enhancing Security Through a Trust-based Approach

WALTHAM, Mass. --(Business Wire)--

Bit9, the global leader in Advanced Threat Protection, will present the free webcast "Enhancing Security Through a Trust-based Approach" on Tuesday, December 4, 2012, at 9:00 a.m. EST / 2:00 p.m. GMT. Fran Howarth, senior analyst, security for Bloor Research, will explain how at a time when cyberthreats are becoming more insidious and affecting organizations of all types and sizes, advanced weapons are required to stop these advanced threats, which evade detection by traditional security solutions.

"Application control and whitelisting technologies provide the advanced weapons needed to counter advanced threat," said Howarth. "They can be used to ensure that only trusted applications can be run on the network, blocking all other applications from executing. Thus, they are highly effective at preventing malware infections and data exfiltration, especially when all systems are continuously monitored in real time. By allowing only what is known to be good to run, trust is returned to the security equation and an organization will be in a much stronger position to protect its sensitive information from the risks posed by sophisticated cyberthreats."

What: Free live webcast: "Enhancing Security Through a Trust-based Approach"
Who Should Attend: IT security leaders concerned about how to protect their organizations' assets against sophisticated advanced threats that aren't stopped by traditional antivirus software.
Presenter: Fran Howarth, senior analyst, security for Bloor Research
When: Tuesday, December 4, 2012 at 9:00 a.m. EST / 2:00 p.m. GMT
Where: Click here to register

Attendees will learn:

  • How a trust-based security platform prevents untrustworthy software from executing on your endpoints and servers
  • Why policy-driven application control and whitelisting are critical to a successful defense-in-depth strategy
  • How application control technologies are highly effective at preventing malware infections and data exfiltration, especially when all systems are continuously monitored in real time

About Bit9
Bit9, the global leader in Advanced Threat Protection, protects the intellectual property (IP) of the world's leading brands with innovative, trust-based security solutions that detect and prevent sophisticated malware and cyberthreats. Bit9 stops advanced persistent threats (APTs) by combining real-time sensors, cloud-based software reputation services, continuous monitoring and trust-based application control and whitelisting. Bit9 is the only company to stop both Flame and the malware that caused the RSA (News - Alert) breach. For more information, visit http://www.bit9.com, follow us on Twitter @Bit9, LinkedIn, Facebook (News - Alert) and Google+, or call +1 617-393-7400.


[ Back To Transforming Network Infrastructure's Homepage ]




Featured Blog Entries

Reflections from an Interop Veteran and Alum

When I returned to the Fiber Mountain™ offices in Connecticut after exhibiting at Interop Las Vegas 2015, I couldn’t help but think about how much the event has evolved through the years. I have been attending this seminal IT and networking conference since its inception in 1986 when it was called the TCP/IP Vendor Workshop, focused on interoperability of various TCP/IP program stacks.

What Fiber Mountain's Interop Recognition Means for Our Industry

When Fiber Mountain™ began its journey with a launch at Interop New York last fall, we certainly believed that we had a solution that would make a significant impact in the data center space.

What On-Board Optics Means for Density and Flexibility

This past week I read an article in Lightwave Magazine and another in Network World about the formation of the Consortium for On-board Optics (COBO), a group that seeks to create specifications and increase the faceplate density of data center switches and adapters.

Scaling Hyperscale in an Age of Exponential Growth and Virtualization

Over the past several years server, network, storage and application virtualization has revolutionized the way hyperscale data centers are built by consolidating workloads. The trend has simplified network architecture significantly and resulted in huge cost savings as well.

Video Showcase