BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Just Released Blink 6.0: Advanced Endpoint Protection

Post by Morey Haber August 16, 2012

It has been a long time since any vendor has introduced game changing features to end point protection solutions. We have seen claims of better anti-virus protection, advanced persistent threat protection (APT), and even claims of massive resource savings using their latest versions. BeyondTrust believes in a defense in depth approach to end point protection using multiple layers of protection from anti-malware to intrusion prevention and application protection.


In addition, we believe that our solution is light weight and fully integrated such that it is easy to deploy, and simple to manage. With the new release of Blink 6.0, we have added a brand new layer to the solution that does change the game for endpoint protection vendors and sets a new bar for security tools.

Blink 6.0 now includes advanced File Integrity Monitoring (FIM) to audit files and directories and alert when unauthorized applications attempt to change them. This includes modifying existing files and even deleting or adding new ones. Considering traditional endpoint solutions use signatures and heuristics to identify malware, Blink now uses the hosts file system as a referential integrity data point to monitor changes that do not confirm to established change control procedures or best practices for updates and patching.

This is one of the many new features in Blink 6.0. Blink is the most advanced endpoint protection platform available for Microsoft Windows on the market today. Here are some of the additional new capabilities:

  • New File Integrity Monitoring engine allowing administrators to fine-tune access to sensitive files and detect modifications
  • Blink’s policy can now register a machine for WSUS updates to ensure timely updates
  • Added support for Microsoft Windows 8 Preview Edition

If you want to see Blink 6.0 in action, please watch the video below. For more information on Blink, please click here.

 

Tags:
, , , , ,

Additional articles

insider-threat-fed

Mitigating Inside Threats to U.S. Federal IT Environments

Recent high-profile cases have increased the perceived risks that go along with disclosure and usage of confidential information. One of the most difficult security threats to mitigate is an attack from the inside. When an over-privileged user, such as an unhappy current or former employee, contractor, or consultant, begins navigating your network, how will you…

Post by BeyondTrust Software April 17, 2014
Tags:
, , , , ,

Are you a Target? Investigating Security Breaches with Kevin Johnson

Last week, over 1,000 IT security professionals watched as Kevin Johnson, CEO of Secure Ideas, presented his expert opinion on lessons learned from recent, high-profile retail breaches. Here’s a summary of key takeaways from the webcast plus an on-demand recording of the full, 60-minute presentation. Understanding the “why” behind attacks According to Kevin, the primary…

Post by Chris Burd April 17, 2014
Tags:
, , , , ,

Vulnerability Expert Forum Highlights: April 2014

We had a great turnout for last week’s April 2014 Vulnerability Expert Forum (VEF) webcast. BeyondTrust Research experts, Carter and DJ, provided in-depth knowledge about the latest vulnerabilities and their potential impacts on network environments. Below are highlights from the Forum, plus an on-demand video of the presentation. Latest critical vulnerabilities, vendor patches, and zero-day…

Post by Chris Burd April 16, 2014
Tags:
, , , , ,