Endpoint
11/27/2017
04:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Allure Security Unveils Data Loss Detection and Response Platform

BOSTON, November 28, 2017 -- Allure Security today announces the release of Novo 2.1, the industry’s first Data Loss Detection and Response (DDR) platform. Novo 2.1 demonstrates a radically new approach to solving the enterprise’s greatest security challenge: data loss. Breaches have gone undetected for months or longer because businesses have had no way to track documents outside the enterprise network, and no way of knowing where those documents actually end up. Novo now gives security teams the visibility and control of their document flows, both inside and outside the enterprise. This capability empowers enterprises to stop data loss in real time. With the new version of Novo’s DDR capabilities, customers can:

● Detect and respond to advanced persistent threats (APT), malware, and insider threats before data is stolen, using decoy documents that generate high efficacy alerts when opened outside of the enterprise.

● Provide support for General Data Protection Regulation (GDPR) compliance and other regulations by protecting documents from opening outside of policy – even if the breach originates internally, from hackers, or third-party partners.

● Reduce the time and cost of security investigations by connecting the dots of security events with rich and actionable forensic details.

Additionally, the Allure Security Board of Directors has appointed Mark Jaffe to lead the company’s next phase of growth as Chairman and Chief Executive Officer (CEO). Jaffe has a track record of driving successful cybersecurity startups through exceptional market adoption and growth. He co-founded behavior analytics firm Prelert and saw it through two rounds of funding and tremendous market success before its acquisition by Elastic in 2016. Prior to Prelert, Jaffe was the worldwide vice president of Firewall and Behavior Analysis Sales at McAfee; before that, he led sales teams at successful startups Securify and OnLink.

As part of Allure’s aggressive new growth strategy, the company has also appointed John Sullivan as Vice President of Sales. Sullivan comes to Allure from Uplevel Security, a New York City-based incident response startup. Prior to that, Sullivan was part of the Prelert team led by Jaffe. At Allure, Sullivan will focus on continued expansion in the enterprise market, particularly in the financial services, healthcare, government, and pharmaceutical industry sectors.

Allure Security was founded in a Columbia University research labs by Dr. Salvatore Stolfo and Dr. Angelos Keromytis, two renowned security scientists. The company was awarded more than $10 million from the Defense Advanced Research Projects Agency (DARPA) and other government agencies to develop innovative technology to address insider threats and widespread data loss. Today, Allure’s team holds more than eight U.S. patents on its beaconing, deception, and behavior analytics technology. Stolfo, who was previously the CEO of Allure, will become the chief technology officer (CTO). Keromytis will serve as an advisor to the company.

Mark Jaffe, CEO of Allure Security, said: “The current rate of cyber breaches is evidence that a new approach is needed to address the data loss problem. The extensive, DARPA-funded research into data loss by Allure’s scientists, and the ensuing new approach they developed to address the problem, will fundamentally transform the way enterprises secure their business-critical information. I’m honored to join an outstanding team of problem solvers to help address our society’s data loss problem and to lead the company into its next phase of growth.”

“With the addition of these key members to our executive team and the new capabilities built into Novo, Allure Security is better positioned than ever to establish the next big category in enterprise security: Data Loss Detection and Response,” said Dr. Salvatore Stolfo, co-founder and chief technology officer (CTO) for Allure Security. “We’re pleased to welcome Mark and John to the company and look forward to our next phase of exponential growth.”

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
BlueBorne Attack Highlights Flaws in Linux, IoT Security
Kelly Sheridan, Associate Editor, Dark Reading,  12/14/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.