Endpoint

11/27/2017
04:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Allure Security Unveils Data Loss Detection and Response Platform

BOSTON, November 28, 2017 -- Allure Security today announces the release of Novo 2.1, the industry’s first Data Loss Detection and Response (DDR) platform. Novo 2.1 demonstrates a radically new approach to solving the enterprise’s greatest security challenge: data loss. Breaches have gone undetected for months or longer because businesses have had no way to track documents outside the enterprise network, and no way of knowing where those documents actually end up. Novo now gives security teams the visibility and control of their document flows, both inside and outside the enterprise. This capability empowers enterprises to stop data loss in real time. With the new version of Novo’s DDR capabilities, customers can:

● Detect and respond to advanced persistent threats (APT), malware, and insider threats before data is stolen, using decoy documents that generate high efficacy alerts when opened outside of the enterprise.

● Provide support for General Data Protection Regulation (GDPR) compliance and other regulations by protecting documents from opening outside of policy – even if the breach originates internally, from hackers, or third-party partners.

● Reduce the time and cost of security investigations by connecting the dots of security events with rich and actionable forensic details.

Additionally, the Allure Security Board of Directors has appointed Mark Jaffe to lead the company’s next phase of growth as Chairman and Chief Executive Officer (CEO). Jaffe has a track record of driving successful cybersecurity startups through exceptional market adoption and growth. He co-founded behavior analytics firm Prelert and saw it through two rounds of funding and tremendous market success before its acquisition by Elastic in 2016. Prior to Prelert, Jaffe was the worldwide vice president of Firewall and Behavior Analysis Sales at McAfee; before that, he led sales teams at successful startups Securify and OnLink.

As part of Allure’s aggressive new growth strategy, the company has also appointed John Sullivan as Vice President of Sales. Sullivan comes to Allure from Uplevel Security, a New York City-based incident response startup. Prior to that, Sullivan was part of the Prelert team led by Jaffe. At Allure, Sullivan will focus on continued expansion in the enterprise market, particularly in the financial services, healthcare, government, and pharmaceutical industry sectors.

Allure Security was founded in a Columbia University research labs by Dr. Salvatore Stolfo and Dr. Angelos Keromytis, two renowned security scientists. The company was awarded more than $10 million from the Defense Advanced Research Projects Agency (DARPA) and other government agencies to develop innovative technology to address insider threats and widespread data loss. Today, Allure’s team holds more than eight U.S. patents on its beaconing, deception, and behavior analytics technology. Stolfo, who was previously the CEO of Allure, will become the chief technology officer (CTO). Keromytis will serve as an advisor to the company.

Mark Jaffe, CEO of Allure Security, said: “The current rate of cyber breaches is evidence that a new approach is needed to address the data loss problem. The extensive, DARPA-funded research into data loss by Allure’s scientists, and the ensuing new approach they developed to address the problem, will fundamentally transform the way enterprises secure their business-critical information. I’m honored to join an outstanding team of problem solvers to help address our society’s data loss problem and to lead the company into its next phase of growth.”

“With the addition of these key members to our executive team and the new capabilities built into Novo, Allure Security is better positioned than ever to establish the next big category in enterprise security: Data Loss Detection and Response,” said Dr. Salvatore Stolfo, co-founder and chief technology officer (CTO) for Allure Security. “We’re pleased to welcome Mark and John to the company and look forward to our next phase of exponential growth.”

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.