SHARE
Facebook X Pinterest WhatsApp

Bit9 Closes Security Loop by Acquiring Carbon Black

Five Important Lessons from Recent Data Breaches When it comes to IT security, there has been a palpable shift in philosophy in the last year. Instead of focusing on defending the network perimeter, IT organizations are assuming that to one degree or another, their systems have already been compromised. The real issue is not only […]

Written By
MV
Mike Vizard
Feb 13, 2014
Slide Show

Five Important Lessons from Recent Data Breaches

When it comes to IT security, there has been a palpable shift in philosophy in the last year. Instead of focusing on defending the network perimeter, IT organizations are assuming that to one degree or another, their systems have already been compromised. The real issue is not only how quickly those attacks can be discovered, but also how fast they can be remediated.

Looking to close that IT security loop, Bit9 announced that it has acquired Carbon Black, a provider of an automated IT security incidence response system. Bit9 CEO Patrick Morley says rather than focusing on the network, the primary Bit9 mission is to secure endpoints and servers where the data that is being compromised resides.

Carbon Black, says Morley, extends that capability by giving customers the tools they need to respond to the inevitable compromise. That’s critical, says Morley, because most sophisticated security attacks take a while to perpetrate, which means IT organizations should be able to discover many of the tell-tale signs of a cyberattack while it’s in progress.

Bit9 is hardly the only security vendor trying to create a closed-loop system that not only protects assets, but also provides the tools for discovering threats and ultimately remediating vulnerabilities. But rather than throwing a bunch of expensive IT services at that effort, Morley says Bit9 wants to pursue a more automated approach that ultimately reins in IT security costs. To that end, Bit9 also announced that it has secured an additional $38.25 million in funding to execute that vision.

The IT security standard that organizations are being to held to is quickly evolving. It’s no longer enough to have firewalls and antivirus software installed; organizations will soon also be held accountable for how quickly they respond to the inevitable compromise.

The good news is that the quickening the pace at which organizations respond to attacks not only helps limit damages, it also makes it less profitable for purveyors of malware to launch an attack in the first place. Security threats, of course, will always be with us. Right now, though, very few economic deterrents prevent someone from launching an attack. But the right combination of analytics and incidence response systems can go a long way toward making it less economically attractive to even attempt an attack.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.