Dear Visitor,

Our system has found that you are using an ad-blocking browser add-on.

We just wanted to let you know that our site content is, of course, available to you absolutely free of charge.

Our ads are the only way we have to be able to bring you the latest high-quality content, which is written by professional journalists, with the help of editors, graphic designers, and our site production and I.T. staff, as well as many other talented people who work around the clock for this site.

So, we ask you to add this site to your Ad Blocker’s "white list" or to simply disable your Ad Blocker while visiting this site.

Continue on this site freely
  HOME     MENU     SEARCH     NEWSLETTER    
THE ENTERPRISE SECURITY SUPERSITE. UPDATED 13 MINUTES AGO.
You are here: Home / EST Contributed Content / Secdo Automates MacOS Security
Secdo Debuts MacOS Automated Security Solution
Secdo Debuts MacOS Automated Security Solution
News as reported by the company Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
Secdo Announces Automated Endpoint Security and Incident Response Capability for the Mac Operating System -- Industry's Most Powerful Endpoint Detection and Response Solution Supports the Growing Use of Macs in Business

NEW YORK, NY -- January 17, 2018 -- Secdo, a pioneer in automated Endpoint Security and Incident Response technology, today announced support for the Apple Mac operating system, including Mac OS 10.13 High Sierra. Secdo's innovative approach brings a number of long-awaited firsts among endpoint detection and response providers who lack feature parity for organizations faced with growing numbers of Mac users. Combining the only thread-level visibility on the market today with a unique behavior based assisted learning engine, Secdo is the only solution to automatically detect new threats and investigate every security alert from any source in seconds, creating a force multiplier for security teams while dramatically improving the operational backlog for discovery and recovery of internal and external threats.

With the addition of the Mac agent, Secdo brings the following innovations to the endpoint detection and response market, including:

• The first platform with complete feature parity across Windows, Linux and now Mac for threat hunting, detection, forensic investigations and response;
• The first agent that monitors all activity at the thread-level allowing process threads to be tracked independently providing greater clarity;
• The only platform that retains all endpoint activity for over one hundred days, more than the average dwell time of a breach , while ensuring no usability limitations at scale;
• The only platform that incorporates Behavioral Indicators of Compromise (BIOCs) for signature-less custom detection of advanced threats based on attack methodology;
• The only endpoint platform that correlates Mac data with third-party and SIEM security events mapping the attack timeline and reducing alert triage time to seconds;
• The only platform that automatically investigates any third party and SIEM security events creating a complete picture of the attack with detailed forensic data and reducing incident investigation time to minutes;
• The only platform with a scalable response center allowing both live actions (reverse shell, screen capture, task and file manager, etc.) and home-grown utilities to be run remotely, and
• The only agent/sensor with consistent near zero impact on performance with continuous monitoring and collection.

"Macs had 299 CVE Vulnerabilities in 2017 and opened 2018 with the Intel Spectre vulnerability and MacOS IOHID kernel vulnerability," said Jason Dettbarn, CEO of Mac management vendor, Addigy. "Top tier security tools like Secdo are integral to protecting against such Zero Day vulnerabilities while we wait for Apple to release a stable patch to protect machines.”

Secdo's innovative Behavioral Based Indicators of Compromise (BIOC) technology combined with the unique thread-level visibility and the in-built assisted learning engine allows security teams to detect and protect against Mac specific attack methods rather than signatures.

Applying this capability to the day-to-day activities of security teams is key to creating a proactive defense, Secdo users will create tailor-made BIOCs that will uniquely detect and then automatically investigate anomalies and abnormal behaviors found on any endpoint. The result allows security teams to force multiply their efforts in validation, forensic investigation, and scaled response to any threat in seconds rather than weeks, while ensuring the platform will adapt to protect against future attacks.

"Apple's inroads in the enterprise has resulted in a corresponding security threat that is the cause of great concern for many organizations," said Gil Barak, CTO and Co-Founder, Secdo. "With a single interface to investigate every security threat for Windows, Linux and Macs, Secdo makes the process of securing these environments fast, simple and highly effective."

Availability

Secdo Automated Endpoint Security and Incident Response for Mac is available immediately through authorized partners.

About Secdo

Secdo converges automation, endpoint security and incident response to deliver the first end-to-end platform for advanced threat management, hunting, investigation, response, remediation, and defense -- force multiplying security teams to build a proactive defense methodology, drastically reducing organizational risk, operational costs and response times. Customers who use Secdo range from mid-sized and Global 2000 enterprises, and government agencies, to managed security service providers (MSSPs) and technology partners. From entry-level all the way to seasoned experts, security teams of all skill levels can benefit from Secdo's platform to save on time, costs, and resources. Secdo is headquartered in New York, NY, with teams around the world. For more information, visit www.secdo.com or follow Secdo on Twitter at @Secdocyber.

Image credit: Apple.

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
MORE IN EST CONTRIBUTED CONTENT

NETWORK SECURITY SPOTLIGHT
Over the past decade, hospitals have been busy upgrading their systems from paper to electronic health records. Unfortunately, spending so much on EHR may have left insufficient funds for security.
The British government officially blamed Russia for waging the so-called NotPetya cyberattack that infected computers across Ukraine before spreading to systems in the U.S. and beyond.
ENTERPRISE SECURITY TODAY
NEWSFACTOR NETWORK SITES
NEWSFACTOR SERVICES
© Copyright 2018 NewsFactor Network. All rights reserved. Member of Accuserve Ad Network.