Promote Your Company or Product Here!
On July 12th, VMware is joining Bitdefender to show you how to leverage VMware's evolutionary integrated #hybrid cloud, digital work space, and security environment alongside Bitdefender's SDDC workload protection. A webinar you won't want to miss!
Bitdefender was named a leader in The Forrester Wave Endpoint Security Suites!
According to the Forrester report: “Buyers want an endpoint security suite that is effective at stopping modern threats without adding to their security team’s complexity. They also want to trust the vendor, both as a strategic partner and as a steward of their data.” The report also mentions “One of Bitdefender’s major differentiators is the reach of its sensor network.” It also states that “Customers report above-average prevention capabilities and a low detriment to endpoint user experience. “
Learn more about the report.
Download Forrester's entire report here.
The game is on and hopefully all the players in the field have learned the rules and are ready to play. Now what?
As for Cyber-security, the compliance game is a circle that never ends. Reviewing, learning from mistakes and adjusting are integrated components of GDPR readiness and compliance continuous process. Join our session for an outlook of what should come after the 25th of May 2018, from GDPR perspective:
• Keep a sharp eye on subtle cyber-security clues coming from IT environment
• Integrate the learnings learn into improving the organization’s security posture
• Leverage GDPR readiness efforts to gain customers trust
May 21, 2018 at 21:39 UTC
Since I don't do business in Europe, I've kinda ignored it honestly.
I mean, I exceed best practices for security already but as far as their guidelines, eh... Don't care. :P
Where can I find a list of the error codes, their meaning and solutions?
The reporting capabilities are less than stellar, expecially when there is a problem.
It would help if the error message actually identified a problem instead of the generic:
" Status message: Task failed! Please contact the technical support. "
with no apparent way to find out what 258 means.
Log files are not easy to locate
The support staff takes at least 24 hours between responses, meaning they ask for more information, I send it within the hour but I do not hear back for at least 24 hours.
Deployment is a huge pain, as it relying on WINS for discovery. In over 25 years I have not dealt with any other product that relays on WINS, and outdated horrible MS technology that should not still even be around IMHO.
May 17, 2018 at 13:20 UTC
Hi Rob – Thanks for reaching out! I discussed with my team, and we have some resources/explanations for you below:
We have several known exit codes that are encountered in most of the scenarios, and these are detailed in this KB article: https://www.bitdefender.com/support/troubleshooting-best-unsuccessful-deployments-1550.html
For cases where the exit code is not a known/common one, we will need support tool logs from both the target machine and the relay that was used to deploy the Bitdefender client by following the steps provided in this article: https://www.bitdefender.com/support/generating-endpoint-security-and-best-support-tool-log-1133.html
As the exit codes for the tasks do correspond with the MSDN error codes, you can consult the System Error Codes list from Microsoft and check the description of that code (for example 258 in MSDN is WAIT_TIMEOUT - The wait operation timed out, as seen here https://msdn.microsoft.com/en-us/library/windows/desktop/ms681382(v=vs.85).aspx) Still, please note that in order to find the cause of the issue and solve the situation logs will be necessary from the two involved computers (target machine and relay endpoint).
The network discovery process relies on the Computer Browser service, and not WINS. For more information about network discovery please consult these two articles:
Does that help clarify things? If you have additional questions, please feel free to let me know!
May 17, 2018 at 15:55 UTC
Rob, Your best move is to deploy the Bitdefender On-premises console to get Active Directory integration:
In case you missed it, we announced the integration of GravityZone with Nutanix prism, the first such integration of a cloud workload security platform with Prism. The integration at an API level with Prism allows us to get insights directly from Prism.
GravityZone is able to use this data to automatically deploy in-guest security tools and security servers, assign highly-granular security policies, provide infrastructure-aware reporting, and recover security licenses from decommissioned VMs.
Nutanix also had exciting news to share. They announced Bitdefender as the 2018 Elevate Partner of the Year for AHV Innovator!
Hi SpiceHeads! In case you missed it, Bitdefender partnered with Nutanix to deliver a security solution optimized for Enterprise Cloud's diverse workloads.
Mark your calendars for May 3rd! We have an upcoming joint webinar where you’ll:
- Learn how you can leverage Nutanix Enterprise Cloud to combine the simplicity, economics and flexibility of the public cloud with the security and control of the private cloud.
- Learn how GravityZone can safeguard your Enterprise Cloud workloads while bridging security and IT operations and promoting infrastructure performance and utilization
- See a demonstration of the Bitdefender-Nutanix integration covering GravityZone SVE, Nutanix Prism and Nutanix’s Calm automation and orchestration marketplace
See how you can get best-in-class security, and register today!
Are you ready to learn how you can increase the ROI of endpoint detection and response (EDR) implementations and effectively protect YOUR organization against the most sophisticated cyber threats?
Mark your calendars for May 8th, you won't want to miss this session. We'll be covering:
• EDR implementation challenges that reduce the return on investment
• Benefits of Prevention, Detection, Investigation and Response working together
• Leverage accurate detection and automatic response to reduce the EDR noise and enable Incident Response teams to focus on real threats
• Evolve the overall enterprise security posture by integrating the threat intelligence into policy updates and software vulnerability patching
Register today to save your spot!
Edited Apr 26, 2018 at 22:35 UTC
Customize Header Background
Customize Page CSS
This is the CSS that will be included for all tabs for this vendor page.