Less than 55% of all URL's are trustworthy
Capabilities Once installed, BitRater Corporate automatically scans and creates an inventory of every application running on your network, this is your corporate application whitelist. BitRater Corporate uses your whitelist to determine file trust ratings and policies for your organization.
Simple Policy-Driven Approach Control policies are simple to establish and manage. Control policies can block all known bad software, flag unknown applications for approval and provide unrestricted access to new trusted software with real time reporting. File Trust Ratings You can immediately see the BitRater Corporate trust scores for every file that attempts to run on your network. 80-99% (known/trusted) – Known and trusted applications from your organization’s whitelist are allowed to run without enforcement. These successful installations are all logged and available in real time reporting. 60-80% (unknown/trusted) – BitRater Corporate will inform you about any known good software attempting to execute that is not currently added to your organization’s whitelist. This allows you to eliminate applications which, while not malware, are not appropriate or authorized for use in your network. BitRater Corporate can prompt you for approval to execute or inform you and allow theseapplications to run without interruption. These installation attempts, approved or denied, are logged and available in real time reporting. 40-60% (unknown) – BitRater Corporate will inform the you about unknown software attempting to execute and will prompt you for approval to run. These installation attempts, approved or denied, are logged and available in real time reporting. 0-40% (block untrusted) – BitRater Corporate will by default block the execution of any untrusted software. These installation attempts are logged and available in real time reporting.
Malware Protection BitRater protects your servers and endpoints from known and zero-day malware, while enabling the use of only authorized software. BitRater uses application whitelisting technology, to prevent the execution of any known bad or unknown files across your entire network, completely eliminating malware before it can steal or destroy your organization’s most important information. Rapid Response BitRater uses a Default-Deny signature-less form of malware protection, which is the best known way to prevent malware from executing, allowing for threat detection and response within milliseconds. No More Virus Scans The days of long virus scans are over, BitRater is always on, blocking viruses, malware and ransomware in real time allowing you to stop malware in it’s tracks, eliminating the need for virus scanning. Connected & Remote Endpoint Protection BitRater uses a cloud-based database of hashes that allows for real time malware protection, but that is not all. BitRaterCorporate also deploys locally to each server and endpoint, for protection across remote endpoints whether there is internet connectivity or not. Control List & Policies Protect your endpoints and ensure your servers are secure at all times with a balance of flexibility and security using BitRater Corporate. Automatically create and maintain software whitelists and policies Corporate policies & whitelists can be imported, exported, viewed, edited, searched, merged, and sorted Real time reporting of all unauthorized installation attempts Scanning of remote workstations to augment control list and policies Leverage your existing Active Directory settings to create policies Data Center Security Advanced threats are aimed at stealing corporate or personal data, it’s critical to prevent these threats from attacking your data center servers. You need the ability to stop attacks before they occur and cannot rely on antivirus, which only stops malware threats after they has been detected.Ultimately, 100% of data breaches occur at the server level. It’s increasingly important to protect your data centers with the best kind of malware protection available, Default-Deny. You can’t afford to take chances with your corporate data, doing so can lead to data breaches, lost and stolen data and destruction of servers and endpoints alike. BitRater Corporate stops malware before it can deploy, keeping your data centers safe. Endpoint Security BitRater Corporate delivers a brand new way, to protect machines against today’s evolving threat landscape. It’s a “180” compared to antivirus. With the most effective form of anti-malware for virtual and physical desktops, BitRater Corporate uses application whitelisting techniques, that stop malware before it has the slightest chance to execute. BitRater Corporate protects your users and your corporate information across every server and endpoint, from attackers looking to infiltrate critical systems and steal sensitive data. BitRaterCorporate quickly and effectively closes the endpoint security gap on Windows desktops and laptops, without slowing down users. BitRater Corporate offers protection for file servers, desktops and laptops either remote or premise, connected or not, with innovative technology that frees endpoint resources. Protecting Older Systems BitRater Corporate protects older systems, no longer supported by Operating systems and security vendors, such as Windows XP and Server 2003, while alleviating the need to patch these systems. BitRater Corporate ensures your business maintains security compliance, regardless of the patch status or OS version of each endpoint or server. By eliminating any possibility of unknown or untrusted code to run across your entire network, BitRater Corporate removes the risk of malware executing on your network and ultimately improves stability. End users experience no slowdown when using the BitRater Corporate agent. First of all the agent footprint is minimal, and takesas little as a device driver. Secondly, there are no regular antivirus scans needed for regular virus scan that slow down XP machines to a crawl. This means older system which may have limited resources and may not be fast, are not bogged down and remain secure, compliant and functional. BitRater is a complete endpoint security solution from the old Windows XP and 2003 and forward. Workstations Windows 10 32/64 bit Windows 8.1 32/6 4bit Windows 8 32/64 bit Windows 7 32/64 bit Windows XP 32 bit Servers Windows Server 2012 R2 32/64 bit Windows Server 2012 32/64 bit Windows Server 2008 R2 32/64 bit Windows Server 2008 32/64 bit Windows Server 2003 R2 32 bit Hosting of Management Server Decide where to place your BitRater Corporate Management Server. 1.Inside your own infrastructure with or without connection to BitRater Cloud (depending of your security policy). This is recommended if you would like to use the “DEFCON mode” 2.On a Cloud Services provider, BitRater is Microsoft AzureComplient. 3.At a local BitRater service provider. 4.At a International BitRater service provider. Real Time Reporting Inventory of anything that executes on any of your computers or servers, with a full audit trail of what created it, when it was created, what it did, if it deleted or changed itself, and more. BitRater Corporate provides you with reporting, that identifies all applications running within your corporate environment at server and endpoint level. This allows for: Easy, fast forensic investigations Log analysis and reporting Compliance report generation Automated notifications of compliance violations Integration With Existing Security Solutions BitRater Corporate easily integrates with major third-party security solutions, to give you a holistic defense against new emerging attacks. It’s increasingly important to layer your defenses and focus on endpoint data protection. BitRater Corporate is complete endpoint data protection, that relies on effective whitelistingapplications to prevent malware attacks and data loss. BitRater Corporate is an additional layer of protection for servers and endpoints, to supplement the increasing ineffectiveness of signature-based antivirus solutions, which can’t keep up with new emerging, zero day malware attacks and ransomware infections. BitRater Corporate completely eliminates the chances for image corruption, system damage or data loss by rogue applications or malware, by determining what software you trust to execute in your environment and stopping everything else from running. BitRater Corporate is completely compatible with all third-party anti-virus, anti-malware and firewall applications as well as Active Directory and group policies. Data Breach Protection A very large percentage of the worlds latest data breaches, could have been prevented with a deny by default application whitelisting solution in place. All organizations that collect customer data are at risk of a data breach. Traditionalblacklisting (antivirus) doesn’t work anymore. We need to do a 180, turn the tables on the hackers and use real-time software whitelisting instead. BitRater Corporate uses a Real-time WhiteList (RWL) concept for end-points. Five years from now all organizations will be relying on whitelisting solutions and wondering why they didn’t use it ten years ago. In the early 2000 era, it made sense to “keep the bad guys out”, because it was resource-efficient. Today, it’s “only let the good guys in”, which is what you wanted all along. It takes much less resources to only allow “known-good” to run with a deny by default whitelisting solution. Improved IT Control BitRater Corporate reduces your burden as an IT administrator, while delivering complete and effective malware protection. Using unique application whitelisting technology, BitRater Corporate allows you to control and monitor executable activity on all servers and endpoints, to stop malware attacks and data breaches that are easilymissed by traditional antivirus solutions. “DEFCON” Compliant A unique BitRater security function! If your organization is under attack – or if you suspect so, you don’t need to panic and close the entire network. One Single Click If you as a network/security manager need an immediate action to a global threat, you simply apply BitRater’s enhanced level of protection. BitRater’s DEFCON Escalation is a one-click action activation of a simple checklist, which will effectively stop any and all processes on all endpoints, except trusted applications. It only takes a minute and you still have all basis IT functions of the organization running. *) The DEFense readiness CONdition (DEFCON) is an used by the Application Whitelisting BitRater Corporate does a one-time scan of each machine (workstation and server) and creates a local application whitelist. Once your corporate application landscape is documented within the BitRater Corporate whitelist, moving forward only known-goodexecutables for applications are allowed to run within your environment. Using this method of application whitelisting, if there is existing malware on the workstation that tries to call home to its C&C server, it will automatically be blocked. Which prevents your corporate jewels from leaving the building and bullet-proofs your endpoints. BitRater Corporate also ensures that remote or disconnected users are constantly protected, by keeping a local copy of updated whitelists and permissions on each machine. This allows BitRater Corporate to extend security, beyond internet based threats, to include removable devices like USB sticks, CDs / DVDs, and printers.