Workstations have a single purpose – to allow users to work uninterruptedly and without interference. Fatal viruses that may penetrate technologies that protect endpoints and servers are a serious threat that may also lead to malicious and sophisticated malware under the disguise of innocent files. The response to these threats lies in robust and controlled protection that does not allow anything to penetrate those endpoints.

Carbon Black – the A Team

Advanced viruses routinely penetrate traditional protection and antivirus technologies that protect endpoints and servers. This is the time to arm your endpoints with the best protection available – Bit9 & Carbon Black – a security solution comprising two leading products in a cloud intelligence which, together, provide the ultimate endpoint protection.

Bit9

Bit 9 monitors and records all activities at endpoints and servers to detect, prevent and respond to cyberattacks that evade standard security solutions. When a virus disguises as an unknown file type penetrates the system, it is immediately blocked. However, the file clones itself and changes its identity, forcing the organizational systems to spend more time to overcome the attack.

Bit9 operates using a white list. Only files that are included in the white list, whether sent by email or loaded to an endpoint via a disk on key or Flash drive can enter the system. In effect, this neutralizes the need to cope with each and every threat. Bit9 provides full granular control of endpoints and servers and of each application running in them. Bit9 uses the largest intelligence threat to map all file systems.

Carbon Black

Carbon Black neutralizes threats by checking each file entering a system. If it is infected by any threat, it reports to Bit9. At the same time, it sends it to a sandbox (safe area), where it is blocked and neutralized without risking the system. If Carbon Black finds that the file is safe, it allows the user to open it.

Carbon Black offers investigation and full kill-chain capabilities, as well as a heuristic detection system based on rules configured by both the system and the user.

BigFix – Protection End to End

IBM BigFix endpoint security enables to manage, control and limit the use of specific software while allowing to use others – in short, it makes order in all workstations and servers in the organization.

BigFix monitors physical and virtual endpoints, including servers, desktops and laptops using any operating system. Among others, BigFix manages versions, distributes software updates, manages the lifecycle of workstations/servers and monitors installed programs and how they are used. The system is also suitable for cash registers at points of sales, ATMs and self-service kiosks. Used in a decentralized environment, BigFix minimizes the load on the network when distributing updates, preventing disruptions to end users.

Benefits:

  • Distributes software updates to hundreds and thousands of endpoints and servers quickly and efficiently, regardless of the operating system used, in both decentralized and heterogeneous environments
  • Supports any version of Windows and Linux
  • Distributes and manages patches with full control over workstations and servers’ configurations
  • Prevents the download of malicious software or games that may cause damage to enterprise systems
  • Assets management – increases savings by receiving up-to-date data about the actual use of software installed in workstations
  • Clearly displays and intuitively manages the configuration of endpoints (hardware and software)
  • Prevents removal of antivirus software
  • Increases savings and reduces electrical consumption

The BigFix solution consists of several modules:

  • Lifecycle management – inventory management at the hardware and software levels
  • Patch management – distribution of application updates and fixes
  • Security and compliance – automatic verification of compliance with SOX, PCI and other requirements
  • Software use analysis – monitors the actual use of software installed in workstations
  • Server automation – automatic establishment and installation of virtual and physical workstations and servers
  • Core protection – prevents viruses, Trojan horses and spyware; antivirus (TrendMicro) and DLP software
  • Remote control and management of endpoints and servers
  • Endpoint manager for mobile devices

Fireeye – CSI on the Net

Fireeye offers an innovative cyber solution that enables organizations to protect themselves against Advanced Persistent Threats (APTs). The solution is based on a platform that exposes malicious actions, automatically reconstructing events. It then displays them in the form of a clear picture using sensors installed in all workstations, thus identifying local and network traffic.

Benefits:

  • Detects sophisticated attacks and threats at the early stages, before they can cause any damage
  • Analyzes real-time data that goes through the organization’s workstations and servers
  • Provides an overall image of events and their spread in real time
  • Artificial intelligence (Malop Hunter) does not require human intervention

kontakt.io – always on Time, at the Right Time

Satisfying your customers’ expectations and ensuring their loyalty has never been easier using content adapted to their preferences and sent to their smartphones based on geophysical location.

kontakt.io develops and creates beacons that behave as relay stations. This is a completely new way for businesses to attract new customers and improve exposure. If a customer comes near a beacon, it receives an attractive offer directly to its smartphone.  For example, when a potential customer is looking for parking and passes near your business, an offer of free parking is the most natural incentive.

kontakt.io partnered with several large companies to promote innovative marketing based on beacon technology.

Trusteer – Internet Fraud Protection

IBM Security Trusteer detects and stops fraud by malicious software that penetrates the organization under the disguise of Word or PDF files, or any other ‘innocent’ file with malicious code. These files spread through the internal network of the organization keeping a low profile and managing to evade antivirus software.

Today, dozens of financial and other institutions rely on Trusteer products to protect their Internet applications, workstations and mobile devices from critical threats that very often go undetected by last-generation security solutions.

Trusteer combines multilayered security software with real-time threat intelligence to protect against malicious software and phishing, helping customers comply with information security requirements and regulations. Trusteer products are implemented in seven out of the ten largest banks in the United States, and in nine out of the ten largest banks in Great Britain, ensuring the highest level of protection of their customers’ accounts against financial fraud and cyberattacks.