Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Insider Threats

08:00 AM
Dark Reading
Dark Reading
Products and Releases

Digital Guardian Launches Digital Guardian 7.0 for Data Protection Against All Threats

Company Extends Proven Data Protection Capabilities for Insider Threats to Defend Against Outside Attacks and Bridge the Gap Between Systems Security and Data Protection

WALTHAM, Mass., February 18, 2015Digital Guardian, the only security solution to protect data from insider and outsider threats with a single endpoint agent, has launched Digital Guardian 7.0, which extends the functionality of the patented Digital Guardian Agent to protect against advanced threats. The extension of Digital Guardian’s data protection capabilities comes with a redesign of the product architecture for ease of deployment for use cases ranging from data visibility and device control to indicator of compromise (IOC) detection and incident response.

This launch comes as corporate data continues to be the target of threats of all types. With recent high-profile breaches, companies are realizing that the best approach to protect their sensitive information is a data-centric approach. Today, system breaches are inevitable, but losing sensitive data as a result doesn’t have to be. Digital Guardian is the only company to bridge the gap between systems security and data protection.

According to Forrester Research,¹“Almost every enterprise, from an online retailer to a hospital to a government agency, rarely works in isolation and can rarely confine data to within the four walls of the organization… In this new reality, traditional perimeter-based approaches to security are insufficient. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model.”

“Major system breaches with significant data loss continue to happen. But while the threats may change, be it from inside or outside of the organization, the target remains the same: the data,” said Ken Levine, president and CEO of Digital Guardian. “Companies need to completely rethink the way they approach security and adopt a data-centric approach. If we make it even just some order of magnitude harder to steal sensitive data, or render the data useless once outside the network, we will have improved our collective security postures by leaps and bounds. There are no shortcuts in data security, it simply must get done.”

Digital Guardian 7.0

Digital Guardian is the only data protection solution to defend against both insider and outside threats with a single endpoint agent. Digital Guardian has been focused on data protection for 11 years with its patented Digital Guardian Agent enabling centralized data classification, policy definition and enforcement. The latest release is an extension of its proven capability to protect data from insider threats to now protect systems and data from advanced threats. The company has taken a behavioral approach to detect threats in real-time across the attack sequence.


Digital Guardian enables visibility, control and protection for all your important data over its entire lifecycle. This release also includes a new content server with out-of-the-box rules and policies to deliver instant value to customers. Digital Guardian has the most comprehensive system coverage with agents for Windows, Linux, Mac and Virtual environments. It offers flexible deployment options where customers can host and manage on premise or choose the Managed Security Program or Hybrid Managed Security Program options.


Product Architecture

As Digital Guardian extended the capabilities of its agent functionality, the company also has made it easier to implement policies based on use cases. From a single Digital Guardian Management Console and one endpoint agent, customers have the ability to deploy functionalities for use cases without expensive add-on products or additional endpoint agents. The redesigned product architecture includes:

·         Digital Guardian for Visibility and Control enables users to understand exactly where your organization’s sensitive data is and how it’s being used with kernel-level data visibility. It also delivers device control and encryption.

·         Digital Guardian for Data Loss Prevention (DLP) adds deeper data visibility and fine-grained control and protection to stop insider threats. It also includes advanced classification by context, content and user with email and file control and encryption.

·         Digital Guardian for Advanced Threat Protection (ATP) provides real-time threat protection by following the attack sequence from initial contact through a myriad of attack stages, while offering flexible controls to defend in a manner commensurate to the customer’s risk tolerance. Furthermore, it enhances the existing security ecosystem with integrations to maximize investments in network solutions, like FireEye, and SIEM technologies, such as Splunk.

¹“The Future Of Data Security: A Zero Trust Approach”, Forrester Research, Inc., June 5, 2014

About Digital Guardian
Digital Guardian is the only data-centric security platform designed to stop data theft. The Digital Guardian platform performs across traditional endpoints, mobile devices and cloud applications to make it easier to see and stop all threats to sensitive data. For more than 10 years, it has enabled data-rich organizations to protect their most valuable assets with an on premise deployment or an outsourced managed security program (MSP). Digital Guardian’s unique data awareness and transformative endpoint visibility, combined with behavioral threat detection and response, let you protect data without slowing the pace of your business.



Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-05
LimeSurvey 4.3.2 allows reflected XSS because application/controllers/LSBaseController.php lacks code to validate parameters.
PUBLISHED: 2020-08-05
USVN (aka User-friendly SVN) before 1.0.9 allows XSS via SVN logs.
PUBLISHED: 2020-08-05
IBM UrbanCode Deploy (UCD),,, and is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 181848.
PUBLISHED: 2020-08-05
CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to bypass authentication and send altered c...
PUBLISHED: 2020-08-05
Directory traversal vulnerability in CAMS for HIS CENTUM CS 3000 (includes CENTUM CS 3000 Small) R3.08.10 to R3.09.50, CENTUM VP (includes CENTUM VP Small, Basic) R4.01.00 to R6.07.00, B/M9000CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R8.03.01 allows a remote unauthenticated attacker to cre...