February 13, 2014
A handful of cloud-to-cloud backup companies are expanding the platforms they support to keep up with growth of cloud-hosted applications.
February 07, 2014
Having to provide for 500 virtual machine backups, Bit9 re-architected its backup process to incorporate the cloud, which could lead to a new DR plan.
September 17, 2013
Symantec has linked a China-based hacking group, dubbed 'Hidden Lynx,' with several recent, large-scale cyberattacks, including one against Bit9.
Bit9 Get Started
Bring yourself up to speed with our introductory content
Josh Sokol reviews the security technologies needed to support a successful security analytics program focused on advanced malware detection. Continue Reading
Evaluate Bit9 Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
It's a new year of advanced threats, malicious code and holes to plug, but security teams are fighting back with help from global services. Continue Reading
HIPS is used for everything from traditional signature-based antivirus/antispyware and host firewalls to behavior analysis. Continue Reading
Learn to apply best practices and optimize your operations.
The complexity of emerging technologies and trends such as BYOD has security teams operating at full speed, and there's no sign of slowing down. In our inaugural issue of 2014, we look at the top cyberthreats that security professionals are likely to face this year. Defending enterprise networks has never been harder, according to Johannes Ullrich, head of the SANS Technology Institute's Internet Storm Center, who examines upcoming attack techniques and discovers new versions of tried-and-true hacking methods.
Advanced malware detection is also evolving, and we report on new strategies as security teams fight back with help from global services. We also address security issues after the gadget-filled holidays in a new column on mobile security. Finally, take a tour of the deep Web, and find out how security professionals can intercept Tor and Bitcoin activities on corporate assets. Continue Reading
Often undervalued, a well-thought-out incident response program for security breaches gets its due in this tip by Forrester Research. Continue Reading
Problem Solve Bit9 Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Nick Lewis explains how Bit9 was recently compromised and the viability of application whitelisting as a result of the compromise. Continue Reading