Comprehensive Breach Protection from Network to Endpoint

The number of threats that can impact an organization is far greater than the number to which most analysts can manually respond. This problem is amplified by the sheer volume of alerts generated by existing tools, and the difficult task of prioritizing each one. By the time a threat is detected, investigated and manually remediated, dwell time has already been significant, increasing the risk of damage.

BluVector and Carbon Black work together to provide an integrated solution for end-to-end and immediate protection from advanced malware, while also driving efficiency improvements across an organization.

BluVector Cortex’s AI-driven detection engines identify malicious files entering or traversing the network in real time, then alerts Carbon Black to ensure that high-priority threats are blocked at the endpoint before damage is done. When BluVector detects file-based threats, the details of these files are communicated to CB Protection to distribute out to all protected endpoints. This allows for the endpoints to block or contain the identified malicious files.

Join us for this webinar to discover:

  • CB Protection’s market-leading application control and whitelisting capabilities combined with integrated real-time file and process analysis from BluVector Cortex.
  • How Carbon Black provides visibility laterally across your organization to mitigate any processes that may have become malicious after entering your environment.
  • How integrated network and endpoint security solutions work together to ensure that everything in your environment is known and trusted.

Weaponizing AI: The Future of Cybersecurity

Everyday AI and machine learning add powerful tools and capabilities to the current cybersecurity defensive stack; yet, these same techniques can also empower adversaries to weaponize AI to create even more powerful and elusive attacks through a new generation of tools, tactics and procedures. This is drastically increasing the chance that your cyber defensive technique will be used against you in a cyber attack.

In this on-demand webinar, Dr. Scott Miserendino, VP of Research and Development at BluVector, will discuss three key areas where attackers are already using machine learning to bypass traditional cybersecurity detection and prevention defenses.

Join our webinar to learn about:

AI-based phishing and attack creation
A unique approach to malware building
AI-driven objective execution and post-breach actions with AI

Creating a World Class Automated Threat Detection Solution

Learn how Gigamon and BluVector work together. Read the Gigamon SOC Automation of Threat Investigation white paper.

Reducing cyber dwell time is a major goal for the Gigamon SOC team. To meet this objective, they integrated their Gigamon GigaSECURE® Security Delivery Platform with BluVector Cortex, an AI-driven sense and response network security platform. These solutions, together with Splunk Enterprise and Phantom, allow the Gigamon SOC to get full visibility into their network traffic and automate the capture of suspicious traffic to enable investigation. During this webinar, Josh Rosenthol, Integrations Manager at BluVector, will discuss the different technologies that defined the solution and Jack Hamm, Senior Manager of SOC Operations at Gigamon, will demonstrate how the system works and discuss ways to expand this solution going forward.


Jack Hamm, Sr. Manager of Security Operations, Gigamon

Jack is Sr. Manager of Security Operations at Gigamon, responsible for managing the company’s internal security team – conducting security operations, security architecture and incident response. A hands-on, seasoned operations manager with a focus on quality and process improvement, Jack loves "automating himself out of a job."  In his spare time, you can find Jack hanging off cliffs, on the ham radio bands or building stuff.

Josh Rosenthol, Product Marketing Manager, BluVector

Josh Rosenthol has been building security solutions for the past 15 years. He was involved in major initiatives like the growth of hardware-based cryptography in the early 2000s, the invention of tokenization while at RSA, network and email defense at Websense, establishing the value of threat intelligence at iSIGHT and most recently as the Alliances and Integrations manager at BluVector.

Olympic Chaos: Responding to a Destructive Malware Attack

Olympic Chaos: Responding to a Destructive Malware Attack (On Demand Webinar) from BluVector.

Cyber adversaries continue to expand their efforts beyond credential theft and ransomware to other goals including cryptocurrency mining and destructive malware. An intrusion doesn’t have to lead to a major breach or cyber incident. The partnership between BluVector and Endace combines state-of-the-art threat detection with the accurate packet-level evidence needed to investigate, respond to and neutralize cyber intruders quickly and efficiently. 

Adding to the risks of theft, reputational impact, and cost to remediate, there is now the threat of direct damage to data and infrastructure. The Olympic Destroyer malware temporarily froze IT systems, disabled displays, disrupted the Wi-Fi and stopped operation of the Olympics ticket site. The impact was not contained to computer systems and data; it also shut down ski gates and lifts.

Learn more in this webinar about how the Olympic Destroyer malware operated, and how the BluVector and Endace joint solution allows an analyst to quickly and effectively detect, respond and remediate this type of sophisticated attack.

Michael Morris –Director Global Technologies Alliances and Business Development

Michael Morris recently joined Endace from CA Technologies where he led product management for the Infrastructure Management Business Unit. Michael has over 20 years of experience in software and hardware solutions for infrastructure and network management. He has extensive global experience in diverse markets including network equipment manufacturers, services providers, government entities, and Fortune 1000 enterprises. Michael is an innovative technology thought leader, with a wealth of experience in network monitoring, security and cloud solutions and has a Bachelor of Computer Science from Colorado State University.

Josh Rosenthol, Product Marketing Manager, BluVector

Josh Rosenthol has been building security solutions for the past 15 years. He was involved in major initiatives like the growth of hardware-based cryptography in the early 2000s, the invention of tokenization while at RSA, network and email defense at Websense, establishing the value of threat intelligence at iSIGHT and most recently as the Alliances and Integrations manager at BluVector.

Detecting Fileless Malware on the Network

Detecting Fileless Malware on the Network (On Demand Webinar) from BluVector on Vimeo.

Recently the market has seen attackers switching focus from ransomware to cryptocurrency mining as it becomes the most lucrative form of malware. In the case of malware attacks, including crypto-mining, over 50% of all malware includes fileless attack techniques. In this session, get an overview and demo of how BluVector can detect fileless malware on the network, helping organizations address these "invisible" or "memory-based" cyber-attacks in real-time.

Presenter: Sean McMahon, Sales Engineer

Sean is a true cybersecurity expert with substantial field experience and real-world application knowledge. He has expertise engineering enterprise security solutions, creating security analytics, and performing incident response. Before coming to BluVector, he served as a Network Security Analyst and a Senior Information Security Engineer in federal and commercial environments, with his most recent experience coming from his time at a top 100 international law firm.

Still Intruding After All These Years

Intrusion detection is hardly a bleeding edge technology, but there's a reason we still use it -- detecting an intrusion is the first step to stopping a serious data breach. In an industry that touts bleeding-edge technologies and tends to relegate older technologies to the virtual trash heap after just a few years, it’s telling that intrusion detection is still considered an essential technology. A recent survey of security professionals by SC Media and BluVector looked at what technology companies are using today for intrusion detection and what their plans are for the future.

Among the topics we will address today are:

  • What are the essential components of a next generation intrusion detection system
  • How intrusion detection is used in a modern layered network security environment
  • Defending against the exfiltration of data once the attackers are in the network
  • Rise of ransomware and the rise of fileless /memory-based techniques
  • And the human capital issue with security

Threat Of The Unknown: Meltdown and Spectre

Threat Of The Unknown (On Demand Webcast) from BluVector on Vimeo.

This webcast takes a look at the impacts of Meltdown and Spectre vulnerabilities. It dives into how these vulnerabilities could be used by cybersecurity criminals, and best practices for protecting your organization from these possible attacks.

Watch the full webcast above.

Where is security headed in 2018 and beyond?

Where is security headed in 2018 and beyond from BluVector on Vimeo.

In the last two years, the number of breached data records has tripled over the previous decade. Why have recent attacks been so successful, and what will security teams need to do to get a handle on them in the months ahead?

Join 451 Information security research director Scott Crawford and Nate Carrol with BluVector to take a look at:

  • The technologies arising to solve these problems, such as next generation IDS.
  • How to help ease the burden on security teams that are already over-stretched.
  • How to counteract the next generation of threats – fileless malware.

Tools to Prevent Nation State and Cyber Criminals from Infiltrating Your Network

Tools to Prevent Nation State and Cyber Criminals from Infiltrating Your Network from BluVector on Vimeo.

Fact:  Defense-grade cybersecurity technologies exist that prevent adversaries from infecting your network with malware. 

Up to 80% of cybersecurity budgets are still spent responding to attacks, not proactively defending against them. During this on-demand webinar, hear from some of today’s top experts and practitioners on how to leverage strategies and technologies to move away from the ‘detect and respond’ death-spiral towards a “predict and prevent” methodology which will dramatically increase your ability to defend against today’s hyper-evolving threat landscape.

You will learn:

  • The role that prevention-based technologies play as part of a layered security strategy.
  • Real-life case studies from executives who have deployed successful prevention-based technologies in their organization.
  • How machine learning is being used to achieve automation, efficiency, and effectiveness.

Why Machine Intelligence is Taking Over Cybersecurity

Machine Learning for Cyber Security from BluVector on Vimeo.

This on-demand webinar covers the various ways in which artificial intelligence (AI) and machine learning (ML) are coming to dominate the cyber security landscape.

This webinar provides you with an understanding of how the various types of machine learning techniques are being applied to cyber security and how those techniques are being tailored to solve particular problems in cyber security. It also covers why using multiple artificial intelligence or machine learning-based solutions enhances a defense-in-depth approach to security and how the fundamentals of cyber defense and offense are changing due to the greater adoption of these solutions.