Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Insider Threats

08:00 AM
Dark Reading
Dark Reading
Products and Releases

Digital Guardian Launches Digital Guardian 7.0 for Data Protection Against All Threats

Company Extends Proven Data Protection Capabilities for Insider Threats to Defend Against Outside Attacks and Bridge the Gap Between Systems Security and Data Protection

WALTHAM, Mass., February 18, 2015Digital Guardian, the only security solution to protect data from insider and outsider threats with a single endpoint agent, has launched Digital Guardian 7.0, which extends the functionality of the patented Digital Guardian Agent to protect against advanced threats. The extension of Digital Guardian’s data protection capabilities comes with a redesign of the product architecture for ease of deployment for use cases ranging from data visibility and device control to indicator of compromise (IOC) detection and incident response.

This launch comes as corporate data continues to be the target of threats of all types. With recent high-profile breaches, companies are realizing that the best approach to protect their sensitive information is a data-centric approach. Today, system breaches are inevitable, but losing sensitive data as a result doesn’t have to be. Digital Guardian is the only company to bridge the gap between systems security and data protection.

According to Forrester Research,¹“Almost every enterprise, from an online retailer to a hospital to a government agency, rarely works in isolation and can rarely confine data to within the four walls of the organization… In this new reality, traditional perimeter-based approaches to security are insufficient. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model.”

“Major system breaches with significant data loss continue to happen. But while the threats may change, be it from inside or outside of the organization, the target remains the same: the data,” said Ken Levine, president and CEO of Digital Guardian. “Companies need to completely rethink the way they approach security and adopt a data-centric approach. If we make it even just some order of magnitude harder to steal sensitive data, or render the data useless once outside the network, we will have improved our collective security postures by leaps and bounds. There are no shortcuts in data security, it simply must get done.”

Digital Guardian 7.0

Digital Guardian is the only data protection solution to defend against both insider and outside threats with a single endpoint agent. Digital Guardian has been focused on data protection for 11 years with its patented Digital Guardian Agent enabling centralized data classification, policy definition and enforcement. The latest release is an extension of its proven capability to protect data from insider threats to now protect systems and data from advanced threats. The company has taken a behavioral approach to detect threats in real-time across the attack sequence.


Digital Guardian enables visibility, control and protection for all your important data over its entire lifecycle. This release also includes a new content server with out-of-the-box rules and policies to deliver instant value to customers. Digital Guardian has the most comprehensive system coverage with agents for Windows, Linux, Mac and Virtual environments. It offers flexible deployment options where customers can host and manage on premise or choose the Managed Security Program or Hybrid Managed Security Program options.


Product Architecture

As Digital Guardian extended the capabilities of its agent functionality, the company also has made it easier to implement policies based on use cases. From a single Digital Guardian Management Console and one endpoint agent, customers have the ability to deploy functionalities for use cases without expensive add-on products or additional endpoint agents. The redesigned product architecture includes:

·         Digital Guardian for Visibility and Control enables users to understand exactly where your organization’s sensitive data is and how it’s being used with kernel-level data visibility. It also delivers device control and encryption.

·         Digital Guardian for Data Loss Prevention (DLP) adds deeper data visibility and fine-grained control and protection to stop insider threats. It also includes advanced classification by context, content and user with email and file control and encryption.

·         Digital Guardian for Advanced Threat Protection (ATP) provides real-time threat protection by following the attack sequence from initial contact through a myriad of attack stages, while offering flexible controls to defend in a manner commensurate to the customer’s risk tolerance. Furthermore, it enhances the existing security ecosystem with integrations to maximize investments in network solutions, like FireEye, and SIEM technologies, such as Splunk.

¹“The Future Of Data Security: A Zero Trust Approach”, Forrester Research, Inc., June 5, 2014

About Digital Guardian
Digital Guardian is the only data-centric security platform designed to stop data theft. The Digital Guardian platform performs across traditional endpoints, mobile devices and cloud applications to make it easier to see and stop all threats to sensitive data. For more than 10 years, it has enabled data-rich organizations to protect their most valuable assets with an on premise deployment or an outsourced managed security program (MSP). Digital Guardian’s unique data awareness and transformative endpoint visibility, combined with behavioral threat detection and response, let you protect data without slowing the pace of your business.



Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-12-02
CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
PUBLISHED: 2020-12-02
Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access.
PUBLISHED: 2020-12-02
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access,...
PUBLISHED: 2020-12-02
HCL Domino is susceptible to a Buffer Overflow vulnerability in DXL due to improper validation of user input. A successful exploit could enable an attacker to crash Domino or execute attacker-controlled code on the server system.
PUBLISHED: 2020-12-02
An out-of-bounds memory write flaw was found in how the Linux kernel’s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat ...