What is Confer?
Confer secures laptops, servers and mobile devices against advanced persistent threats (APTs)
End users are often the weakest link in most companies’ security. Employees move seamlessly in and out of the corporate perimeter, download untrusted software, click suspicious links and share their devices with family members. It’s no surprise that Verizon reports that over 50% of corporate breaches start with a compromised host.
Traditional endpoint security is ineffective and a burden on both the end user and the operator.
CONFER IS REDEFINING ENDPOINT SECURITY
Confer is a leading endpoint detection and response solution (EDR). Confer’s advanced threat prevention and incident response capabilities proactively identify attacks and provide real-time visibility across all endpoints to enable incident response and forensics.
Confer protects servers, laptops and mobile devices by watching for the tactics, techniques and procedures (TTPs) that attackers use ― collecting and analyzing large volumes of TTPs in a “big-data” engine.
Confer is built on an open, threat-sharing platform. Unlike "black box" security products, Confer leverages STIX and TAXII ― two open standards for threat-based collaboration, developed by the U.S. Department of Homeland Security and supported by The MITRE Corporation. Confer integrates with threat intelligence repositories like FS-ISAC’s Soltra Edge and CRITS, to automate the process of applying intelligence across the organization.
Of the solutions we looked at, Confer is both the most comprehensive and the easiest to manage. Confer doesn’t slow down our developer machines and that is essential in an engineering shop like ours.
Security Engineering Lead
Confer’s sensor takes seconds to install, consumes less than 1% of the CPU and interoperates seamlessly with other endpoint software.
Confer doesn’t just report on what it sees, it prevents the attack. When Confer detects a compromise, the sensor can choose to block that process or block access to the network, so your data stays put.
Instead of relying on signatures, Confer collects and analyzes the actual techniques that malware uses to compromise the device. Because it detects TTPs that are much harder for attackers to change, Confer detects attacks that evade signature-based defenses.
Confer protects the full range of endpoint and server operating systems in today's enterprise, including Windows, OSX, Android, Linux and iOS.
- OPEN AND COLLABORATIVE
Confer leverages STIX and TAXII — two open standards for threat-based collaboration and a U.S. Department of Homeland Security-led effort supported by The MITRE Corporation.
TRY CONFER >
Confer protects your servers, laptops and mobile devices against advanced persistent threats.
- Confer Webinar: Defending the 3-D Endpoint
- Confer Webinar: Improving Cost Efficiencies for Endpoint Security
- Case Study: Pinterest - Confer Protects a Diverse and Technically-Demanding Environment
- Data Sheet: CONFER - Endpoint Security Redefined
- White Paper: Achieving World-Class Security in Today’s Cost-Conscious Business Climate