04:50 PM
Dark Reading
Dark Reading
Products and Releases

Allure Security Unveils Data Loss Detection and Response Platform

BOSTON, November 28, 2017 -- Allure Security today announces the release of Novo 2.1, the industry’s first Data Loss Detection and Response (DDR) platform. Novo 2.1 demonstrates a radically new approach to solving the enterprise’s greatest security challenge: data loss. Breaches have gone undetected for months or longer because businesses have had no way to track documents outside the enterprise network, and no way of knowing where those documents actually end up. Novo now gives security teams the visibility and control of their document flows, both inside and outside the enterprise. This capability empowers enterprises to stop data loss in real time. With the new version of Novo’s DDR capabilities, customers can:

● Detect and respond to advanced persistent threats (APT), malware, and insider threats before data is stolen, using decoy documents that generate high efficacy alerts when opened outside of the enterprise.

● Provide support for General Data Protection Regulation (GDPR) compliance and other regulations by protecting documents from opening outside of policy – even if the breach originates internally, from hackers, or third-party partners.

● Reduce the time and cost of security investigations by connecting the dots of security events with rich and actionable forensic details.

Additionally, the Allure Security Board of Directors has appointed Mark Jaffe to lead the company’s next phase of growth as Chairman and Chief Executive Officer (CEO). Jaffe has a track record of driving successful cybersecurity startups through exceptional market adoption and growth. He co-founded behavior analytics firm Prelert and saw it through two rounds of funding and tremendous market success before its acquisition by Elastic in 2016. Prior to Prelert, Jaffe was the worldwide vice president of Firewall and Behavior Analysis Sales at McAfee; before that, he led sales teams at successful startups Securify and OnLink.

As part of Allure’s aggressive new growth strategy, the company has also appointed John Sullivan as Vice President of Sales. Sullivan comes to Allure from Uplevel Security, a New York City-based incident response startup. Prior to that, Sullivan was part of the Prelert team led by Jaffe. At Allure, Sullivan will focus on continued expansion in the enterprise market, particularly in the financial services, healthcare, government, and pharmaceutical industry sectors.

Allure Security was founded in a Columbia University research labs by Dr. Salvatore Stolfo and Dr. Angelos Keromytis, two renowned security scientists. The company was awarded more than $10 million from the Defense Advanced Research Projects Agency (DARPA) and other government agencies to develop innovative technology to address insider threats and widespread data loss. Today, Allure’s team holds more than eight U.S. patents on its beaconing, deception, and behavior analytics technology. Stolfo, who was previously the CEO of Allure, will become the chief technology officer (CTO). Keromytis will serve as an advisor to the company.

Mark Jaffe, CEO of Allure Security, said: “The current rate of cyber breaches is evidence that a new approach is needed to address the data loss problem. The extensive, DARPA-funded research into data loss by Allure’s scientists, and the ensuing new approach they developed to address the problem, will fundamentally transform the way enterprises secure their business-critical information. I’m honored to join an outstanding team of problem solvers to help address our society’s data loss problem and to lead the company into its next phase of growth.”

“With the addition of these key members to our executive team and the new capabilities built into Novo, Allure Security is better positioned than ever to establish the next big category in enterprise security: Data Loss Detection and Response,” said Dr. Salvatore Stolfo, co-founder and chief technology officer (CTO) for Allure Security. “We’re pleased to welcome Mark and John to the company and look forward to our next phase of exponential growth.”

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
IoT Product Safety: If It Appears Too Good to Be True, It Probably Is
Pat Osborne, Principal - Executive Consultant at Outhaul Consulting, LLC, & Cybersecurity Advisor for the Security Innovation Center,  3/12/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.