Carbon Black set the bar by providing an open and extensible platform on which anyone can extend integrations, interfaces and workflows. Bit9 now follows in those footsteps with a RESTful API that enables our customers and partners to create all sorts of cool add-ons and integrations to further extend the value of the Bit9 Security Platform within their environment.
Customers, if you haven’t checked out the Bit9 User eXchange yet, what are you waiting for? Along with all the other great information out there, customers are sharing their ideas on using the new Bit9 API to create custom workflows within the Bit9 UI as well as external interfaces to enable additional use cases and efficiencies.
We do our best to address the requirements of our customers, however there are some things that we just can’t get to as quickly as some may need (or simply aren’t in line with our product strategy.) By providing open APIs, our customers can address these requirements on their own and tailor them to meet their specific needs.
This API creates exciting opportunities. One of these that will enable faster adoption and development is the ability to open source product extensions from us, and from you, our customers. Think of how fast we can iterate and deliver highly-valuable and innovative solutions, and continue extending them to make them even more robust, through this line of collaboration.
So, if you develop something cool, share it with the Bit9 + Carbon Black community so others can benefit from and even add to it.
Here are a few great ways customers and partners are currently using the Bit9 API:
- Computer-based access controls—Have a need to control access to the Bit9 console and data based on specific computers? One customer has developed a separate UI that links with their active directory to provide access to and management of only those computers within Bit9 that the administrator is associated with in AD.
- Tagging with AD—To drive more efficient and effective workflows for applying policies, one customer has integrated with AD to tag computers to quickly identify those to move into different policies. This reduces friction with users by easily identifying the right computers for the right policies.
- ‘Gladius’—You guys are even giving your projects code names. I love that! Check out Gladius on our UeX to see if it’s something you’d like to use to help manage Bit9 events and address malicious files.
- Hash/Binary lookup with VirusTotal – Wouldn’t it be great to get VT scores into Bit9 for driving policy? Using your VT subscription this is now quite simple. You can submit just the hash, or the binary if the hash isn’t known to VT. Upon receiving VT results, you can customize what is considered a ‘malicious’ file within Bit9 to trigger events, alerts, and drive automated policy via event rules. Check out the script template on GitHub. Very quickly you will drastically increase your ROI of these two security investments.
- File analysis via any third-party solution—Bit9 + Carbon Black pioneered the integration of network and endpoint security with integrations with Palo Alto Networks, Cyphort, Check Point, and others. The API now allows for integration with any network security solution, enabling these same use cases for all of our customers regardless of their network security vendor. There’s a script template on GitHub for this as well.
Thank you to all who have contributed and to all who will in the future. We hope you find the API helpful and the sharing of ideas motivating. And we hope to see you on the UeX!
If you are interested in joining the Bit9 User eXchange, contact Bit9 + Carbon Black technical support.