By: Fran Howarth, Practice Leader, Bloor Research
Published: 2nd April 2014
Copyright Bloor Research © 2014
Bit9 and Carbon Black announced recently that the two companies were to merge and, for the time being at least, will be known as Bit9 + Carbon Black in order to signal the importance of the two brands. On the back of this news, the newly combined company received a further US$38.25 million in funding.
This merger underscores the importance of the dynamic market for advanced threat protection technologies. The threat landscape organisations face today is so complex and sophisticated that, no matter how hard organisations try, some attacks will always be successful. With this merger, organisations will benefit from one integrated technology platform to both prevent the majority of threats from breaching their defences and to remediate those that do.
Bit9 is a specialist in endpoint protection, acting as a 'security camera' for all endpoints and servers that connect to networks—the doors and windows into an organisation—tackling threats as they attempt to enter the network. Carbon Black brings to the table the ability to respond to incidents in a matter of seconds when an incident is detected. As well as real time protection, the platform enables forensic analysis to find the root cause of incidents and how they wormed their way through the networks to find the full extent of the damage done. With these capabilities, organisations can dramatically reduce the attack surface and rapidly detect and respond to threats.
Taken together, the platform addresses five major needs for advanced threat protection:
Such a platform allows organisations to adopt an adaptive security posture that actively tackles the constantly evolving threat landscape and that is capable of adapting to meet new challenges and future needs. The market for advanced threat protection as a whole is seeing considerable investment poured into it and this merger, along with the additional funding received, validates the need for organisations to take a holistic approach to security.
All fields must be completed to submit a comment. Email addresses are passed through to the author so they can contact you directly if needed.
Published by: electronicdawn Ltd.