Endpoint

11/27/2017
04:50 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Allure Security Unveils Data Loss Detection and Response Platform

BOSTON, November 28, 2017 -- Allure Security today announces the release of Novo 2.1, the industry’s first Data Loss Detection and Response (DDR) platform. Novo 2.1 demonstrates a radically new approach to solving the enterprise’s greatest security challenge: data loss. Breaches have gone undetected for months or longer because businesses have had no way to track documents outside the enterprise network, and no way of knowing where those documents actually end up. Novo now gives security teams the visibility and control of their document flows, both inside and outside the enterprise. This capability empowers enterprises to stop data loss in real time. With the new version of Novo’s DDR capabilities, customers can:

● Detect and respond to advanced persistent threats (APT), malware, and insider threats before data is stolen, using decoy documents that generate high efficacy alerts when opened outside of the enterprise.

● Provide support for General Data Protection Regulation (GDPR) compliance and other regulations by protecting documents from opening outside of policy – even if the breach originates internally, from hackers, or third-party partners.

● Reduce the time and cost of security investigations by connecting the dots of security events with rich and actionable forensic details.

Additionally, the Allure Security Board of Directors has appointed Mark Jaffe to lead the company’s next phase of growth as Chairman and Chief Executive Officer (CEO). Jaffe has a track record of driving successful cybersecurity startups through exceptional market adoption and growth. He co-founded behavior analytics firm Prelert and saw it through two rounds of funding and tremendous market success before its acquisition by Elastic in 2016. Prior to Prelert, Jaffe was the worldwide vice president of Firewall and Behavior Analysis Sales at McAfee; before that, he led sales teams at successful startups Securify and OnLink.

As part of Allure’s aggressive new growth strategy, the company has also appointed John Sullivan as Vice President of Sales. Sullivan comes to Allure from Uplevel Security, a New York City-based incident response startup. Prior to that, Sullivan was part of the Prelert team led by Jaffe. At Allure, Sullivan will focus on continued expansion in the enterprise market, particularly in the financial services, healthcare, government, and pharmaceutical industry sectors.

Allure Security was founded in a Columbia University research labs by Dr. Salvatore Stolfo and Dr. Angelos Keromytis, two renowned security scientists. The company was awarded more than $10 million from the Defense Advanced Research Projects Agency (DARPA) and other government agencies to develop innovative technology to address insider threats and widespread data loss. Today, Allure’s team holds more than eight U.S. patents on its beaconing, deception, and behavior analytics technology. Stolfo, who was previously the CEO of Allure, will become the chief technology officer (CTO). Keromytis will serve as an advisor to the company.

Mark Jaffe, CEO of Allure Security, said: “The current rate of cyber breaches is evidence that a new approach is needed to address the data loss problem. The extensive, DARPA-funded research into data loss by Allure’s scientists, and the ensuing new approach they developed to address the problem, will fundamentally transform the way enterprises secure their business-critical information. I’m honored to join an outstanding team of problem solvers to help address our society’s data loss problem and to lead the company into its next phase of growth.”

“With the addition of these key members to our executive team and the new capabilities built into Novo, Allure Security is better positioned than ever to establish the next big category in enterprise security: Data Loss Detection and Response,” said Dr. Salvatore Stolfo, co-founder and chief technology officer (CTO) for Allure Security. “We’re pleased to welcome Mark and John to the company and look forward to our next phase of exponential growth.”

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Lessons from My Strange Journey into InfoSec
Lysa Myers, Security Researcher, ESET,  7/12/2018
What's Cooking With Caleb Sima
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14339
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the MMSE dissector could go into an infinite loop. This was addressed in epan/proto.c by adding offset and length validation.
CVE-2018-14340
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.
CVE-2018-14341
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.
CVE-2018-14342
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the BGP protocol dissector could go into a large loop. This was addressed in epan/dissectors/packet-bgp.c by validating Path Attribute lengths.
CVE-2018-14343
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ASN.1 BER dissector could crash. This was addressed in epan/dissectors/packet-ber.c by ensuring that length values do not exceed the maximum signed integer.