Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Cyber Crucible’s endpoint software is reliably more resilient than other software, and that includes other endpoint security tools. Additionally, the other security software typically does not even have full visibility into Cyber Crucible’s software.

Another security tool attempts to shut off Cyber Crucible

Summary:

The other tool tries to shut off part of Cyber Crucible. They cannot. The other vendors' tool has not tested what happens when another tool (aka, Cyber Crucible), says, “no, I’m not shutting off”. The other tools crashes or enters an error state.

Cyber Crucible’s response:

The response can be two fold. The first is to whitelist Cyber Crucible software with the other vendor. This will cause the other tool to ignore Cyber Crucible software, which will (hopefully) prevent the other tool from entering an error state.

...

Historically, in the few times this has happened, we’ve essentially created an environment where the other tool thinks it succeeded. A non-tech analogy may be letting your young family member or child beat you at checkers.

Another security tool attempts to run code as Cyber Crucible

Summary:

This happens very rarely, but there have been instances where a security tool attempts to inject its code into Cyber Crucible’s running program, and execute code posing as us.

This is no different than a hacker posing as a security tool, and there is no way to differentiate if a hacker has taken over t he “trusted” security (or any other) security program.

Cyber Crucible’s response:

There is not a scenario where Cyber Crucible will allow another company (or hacker) to run code posing as our product. The only solution at this point would be to whitelist Cyber Crucible software with the other vendor’s tool. There is no mitigation Cyber Crucible can provide for this, to prevent the other tool from attempting this behavior.

Fortunately, this is a very rare event.

Cyber Crucible is disabled by another tool

There were various instances where security tools with highly privileged accesses would repeatedly attempt to disable Cyber Crucible software. This included repeatedly attempting to remove our driver, or kill our service over and over.

...