Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Black Hat Asia
March 26-29, 2019
Singapore
Black Hat USA
August 3-8, 2019
Las Vegas, NV, USA
Black Hat Europe
December 3-6, 2019
London UK
10/10/2016
02:00 PM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Black Hat Europe 2016:
BooleBox: A New Perspective On Enterprise Data Protection

The thought of sensitive data ending up in the wrong hands can keep both IT administrators and top-managers awake at night. As the latest trends show, many organizations are gaining more and more awareness about the various existing threats to their intellectual property and confidential information.

BB

Many companies, from small and medium businesses to structured multinationals, have already witnessed cybersecurity incidents of unprecedented audacity, such as the Vatileaks scandal dated 2012 or the JP Morgan Bank data breach of 2014, to the most recent attacks against leading global brands such as Yahoo! and Dropbox. Unfortunately, these aren’t scenarios from the latest cyber movie or video game, but the current state of cybersecurity.

These latest attacks exhibit a level of malice that demand a new approach to cybersecurity. For example, the primary sources of attack on data security should no longer be searched only outside the firm. Inside threats, via poor awareness of company policies, lack of attention and use of mobile personal devices represent the wide array of potential existing threats that may compromise company data security from within. And when we talk about data leaks, we’re also referring to many different types of documents that are part of every company’s daily routine: price-sensitive information, intellectual property, patents, confidential information on employees, and much more.

For all these reasons, many companies are now looking for collaboration solutions characterized by embedded strong encryption and deciding to opt for secure collaboration platforms which are able to ensure both flexibility of work and top-level security on data.

In the world of enterprise file sync-and-share options, IT can take many different approaches to secure access on all devices. Vendors small and large offer products for data collaboration, sharing and storage both through cloud and on-premises installations. However, when it comes to enterprise file sync-and-share and security, BooleBox is king.

BooleBox Cloud is actually a military certified file sync and share solution purposely designed for all those individuals and businesses that have sensitive data to protect. Complexity and tediosity have always been the biggest reasons enterprise IT tends to avoid encryption in file-level security systems. BooleBox uses a different approach, which is based on the ability to set and use personal keys to encrypt and unlock files. Unlike other typical public cloud services, the solution offers complete privacy and control over data, including data controls while sharing and securing documents and e-mails. BooleBox basically relies on security standards and devices that have always been adopted within the military frame, making it now possible also for the enterprise world to take advantage and protect itself through its ultimate encryption logics.

For all those companies that need or prefer to store their data “in house,” BooleBox On-Premises is the right solution to be integrated in their IT infrastructure. The solution allows users to safely collaborate on confidential documents and maintain full control on access rights and real time revocability. BooleBox On-Premises also provides advanced security features for organizations needed an added level of protection and security for classified sensitive data.

BooleBox extends enterprise security beyond the perimeter with flexible access controls, granular rights and powerful encryption to wherever and whenever data is being shared. This is why its enterprise products have already gained success all over the world.

https://www.boolebox.com/

BB

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Truths About BEC Scams
Ericka Chickowski, Contributing Writer,  6/13/2019
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2019
Can Your Patching Strategy Keep Up with the Demands of Open Source?
Tim Mackey, Principal Security Strategist, CyRC, at Synopsys,  6/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-1874
PUBLISHED: 2019-06-20
A vulnerability in the web-based management interface of Cisco Prime Service Catalog Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protection mechanisms on the web-ba...
CVE-2019-1875
PUBLISHED: 2019-06-20
A vulnerability in the web-based management interface of Cisco Prime Service Catalog could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by t...
CVE-2019-1876
PUBLISHED: 2019-06-20
A vulnerability in the HTTPS proxy feature of Cisco Wide Area Application Services (WAAS) Software could allow an unauthenticated, remote attacker to use the Central Manager as an HTTPS proxy. The vulnerability is due to insufficient authentication of proxy connection requests. An attacker could exp...
CVE-2019-1878
PUBLISHED: 2019-06-20
A vulnerability in the Cisco Discovery Protocol (CDP) implementation for the Cisco TelePresence Codec (TC) and Collaboration Endpoint (CE) Software could allow an unauthenticated, adjacent attacker to inject arbitrary shell commands that are executed by the device. The vulnerability is due to insuff...
CVE-2019-1879
PUBLISHED: 2019-06-20
A vulnerability in the CLI of Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient validation of user-supplied input at the CLI. An attacker could exploi...