Threat Intelligence

8/3/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Digital Guardian Launches Cloud-Based Data Loss Prevention Service

Digital Guardian Analytics & Reporting Cloud is released, with aim to deliver data protection as a subscription-based cloud service

Waltham, MA – Digital Guardian today announced the general availability of the Digital Guardian Analytics & Reporting Cloud (DG ARC), a data protection solution leveraging the same endpoint agent and management console to deliver Data Loss Prevention (DLP) and Threat Detection & Response (TDR). With DG ARC, customers of Digital Guardian can instantly access a subscription-based, big-data security analytics cloud service that puts their most sensitive information assets at the center of all data protection, user monitoring, and threat detection and response activities.

"We are declaring this a new dawn for data loss prevention because we’re the first security platform to combine the traditional capabilities of DLP with the contemporary features required for endpoint threat detection and response, all delivered in the cloud," said Ken Levine, president and chief executive officer of Digital Guardian. "A lot has changed in the security world, but one thing remains the same: data is the target. We need security solutions that always put sensitive data at the forefront of organizations’ security efforts and DG ARC achieves that."

Today’s leading security industry analysts understand data is constantly at risk due to insecure insider behavior and a variety of external attacks; however, the market offers solutions for only one security challenge or the other. This arbitrary separation of insider versus outsider data protection requirements confuses the buyer and unnecessarily compels them to invest in more solutions than they really need.

"The market demand for consolidation of security products is very pronounced at the endpoint," explains Eric Ogren, senior security analyst at 451 Research. "Our research and market studies show that 61% of enterprises deploy 2-5 security products on their endpoints with close to 10% of respondents reporting between 6 and 20. This large number of tools becomes a significant barrier to managing risk effectively. Security services such as DG ARC that combine data protection with threat detection and response will appeal to security teams looking to reduce operational costs."

DG ARC represents a class of security solutions that address threat aware data protection delivered as a subscription-based cloud service. It provides the feature consolidation security buyers now demand. Leveraging a single endpoint agent to collect system, user, data and forensic events, DG ARC provides the core features, functions and capabilities of:

  1.  Data Loss Prevention – DG ARC will identify and classify information contained within an object while at rest, in use or in transit and dynamically apply a wide range of policies and controls (i.e. log, report, classify, relocate, tag, block, encrypt, etc.).
  2. Threat Detection and Response – DG ARC will provide capabilities to detect, investigate, and mitigate malware, ransomware and other attacks on hosts/endpoints from external actors.
  3. Big Data Security Analytics and Reporting – DG ARC’s cloud-based, big data architecture removes storage limitations on the endpoint and can aggregate, analyze and query system, user and data related events across the network and endpoints.

The eventual goal of almost every security product on the market is to protect data. Database security prevents unapproved users from accessing data stores. Network and application scanning aims to correct network and app vulnerabilities to prevent hacker exploitation and unauthorized access to data. Next generation firewalls attempt to block the use of malicious applications that steal data. The emerging next gen anti-virus solutions claim to protect data by blocking malware that could result in data loss. But none of these solutions truly understand what they are intended to protect - the data. They have no ability to see inside a file, e-mail or packet and know exactly what’s in it – only the Digital Guardian Data Protection Platform does.

"Protecting organizations requires a deep understanding of their data. DG ARC delivers the deepest data visibility available on the market today," said David Karp, chief product officer at Digital Guardian. "It’s the only solution that empowers the InfoSec Analyst, Incident Responder and Threat Hunter to rapidly visualize how data is being used. Seeing this will highlight the risk posed to sensitive information by valid users and compromised systems. That intelligence is a requirement to understand real risk and drive the most effective approach to protecting sensitive data from all threats."   

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Lessons from My Strange Journey into InfoSec
Lysa Myers, Security Researcher, ESET,  7/12/2018
What's Cooking With Caleb Sima
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14339
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the MMSE dissector could go into an infinite loop. This was addressed in epan/proto.c by adding offset and length validation.
CVE-2018-14340
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.
CVE-2018-14341
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.
CVE-2018-14342
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the BGP protocol dissector could go into a large loop. This was addressed in epan/dissectors/packet-bgp.c by validating Path Attribute lengths.
CVE-2018-14343
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ASN.1 BER dissector could crash. This was addressed in epan/dissectors/packet-ber.c by ensuring that length values do not exceed the maximum signed integer.