Data exfiltration

CTERA Adds Data Exfiltration Prevention to CTERA Ransom Protect

Retrieved on: 
вторник, апреля 16, 2024

New York, NY, April 16, 2024 (GLOBE NEWSWIRE) -- CTERA , the leader in edge-to-cloud file services, today announced the enhancement of its award-winning ransomware protection engine, CTERA Ransom Protect , with active protection against data exfiltration using honeypot techniques.

Key Points: 
  • New York, NY, April 16, 2024 (GLOBE NEWSWIRE) -- CTERA , the leader in edge-to-cloud file services, today announced the enhancement of its award-winning ransomware protection engine, CTERA Ransom Protect , with active protection against data exfiltration using honeypot techniques.
  • CTERA Ransom Protect is an AI-powered cyber defense engine integrated into the CTERA global file system, providing zero-day protection against widespread ransomware attacks.
  • Key features of CTERA Ransom Protect include:
    Data Exfiltration Prevention: Decoy files enable real-time detection and blocking of data exfiltration attacks.
  • With the introduction of CTERA Ransom Protect with honeypot, CTERA reinforces its commitment to delivering cutting-edge Cyberstorage solutions that address the evolving threats faced by modern enterprises, safeguarding their critical data assets from malicious actors.

Trellix Safeguards Sensitive and Proprietary Information with New Protections for macOS

Retrieved on: 
среда, марта 13, 2024

Trellix , the cybersecurity company delivering the future of extended detection and response (XDR), today announced new macOS Trellix Data Loss Prevention Endpoint Complete capabilities to better secure sensitive and proprietary information from accidental or intentional exposure.

Key Points: 
  • Trellix , the cybersecurity company delivering the future of extended detection and response (XDR), today announced new macOS Trellix Data Loss Prevention Endpoint Complete capabilities to better secure sensitive and proprietary information from accidental or intentional exposure.
  • “Workstations and laptops present an increasing risk for employees sharing sensitive data and intellectual property – both accidentally and intentionally,” said John Morgan, XDR General Manager, Trellix.
  • Ease of Use: Manage macOS protection from one unified console, along with Windows workstations, servers, networks, and the cloud.
  • Learn more about Trellix Data Loss Prevention Endpoint Complete here .

Nightfall AI Transforms Enterprise DLP with AI-Native Platform

Retrieved on: 
понедельник, марта 11, 2024

SAN FRANCISCO, March 11, 2024 (GLOBE NEWSWIRE) -- Nightfall AI today unveiled new capabilities to transform data security for the modern enterprise.

Key Points: 
  • SAN FRANCISCO, March 11, 2024 (GLOBE NEWSWIRE) -- Nightfall AI today unveiled new capabilities to transform data security for the modern enterprise.
  • The industry’s first generative AI (GenAI) DLP platform now offers coverage for SaaS Security Posture Management (SSPM), data encryption, data exfiltration prevention and sensitive data protection.
  • Nightfall is the first DLP solution to leverage GenAI to prevent data leaks without disrupting modern workflows.
  • “Nightfall’s industry-first GenAI detectors make the platform a smarter, more scalable way to protect sensitive data in the enterprise.

Ridge Security Announces Security Validation Hyperautomation Solution at RSAC 2022

Retrieved on: 
среда, июня 8, 2022

Ridge Security , a cutting-edge security validation automation solution provider, today announced the availability of RidgeBot 4.0 , a major update to its proven, automated penetration testing capabilities.

Key Points: 
  • Ridge Security , a cutting-edge security validation automation solution provider, today announced the availability of RidgeBot 4.0 , a major update to its proven, automated penetration testing capabilities.
  • RidgeBot 4.0 also enables managed security service providers (MSSPs) to provide continuous security testing and penetration testing on demand to their customers.
  • Ridge Security will showcase the solution during RSAC in San Francisco, from June 6-9.
  • Ridge Security delivers automated, efficient, and affordable security validation solutions to enterprises, small and large.

Dig exits stealth with $11M for first cloud Data Detection and Response solution

Retrieved on: 
четверг, мая 19, 2022

TEL AVIV, Israel, May 19, 2022 /PRNewswire/ -- Cloud data security company Dig emerged from stealth today, announcing $11M in seed funding for the first cloud Data Detection and Response (DDR) solution. The seed round was led by Team8, with cybersecurity firms CrowdStrike, through their Falcon Fund, and CyberArk joining as strategic investors alongside Merlin Ventures. Moving beyond posture solutions, Dig Security helps organizations discover, monitor, detect, protect and govern their cloud data in real time through a single unified policy engine.

Key Points: 
  • Moving beyond posture solutions, Dig Security helps organizations discover, monitor, detect, protect and govern their cloud data in real time through a single unified policy engine.
  • Dig gives organizations complete control over their cloud data, providing real-time Data Detection and Response (DDR).
  • Using one of the industry's most comprehensive threat models for cloud data attacks, Dig detects, analyzes and responds instantly to threats to cloud data, triggering alerts on suspicious or anomalous activity, stopping attacks, exfiltrations and employee data misuse.
  • "Dig's active approach, bringing detection and response to data in the cloud, is precisely what the market needs.

FCI Deepens Data Exfiltration Protection for Financial Services Firms

Retrieved on: 
вторник, марта 29, 2022

FCI enables Enterprises, Field and Home Offices to avoid data exfiltration and data leaks with a Data Exfiltration Protection solution that:

Key Points: 
  • FCI enables Enterprises, Field and Home Offices to avoid data exfiltration and data leaks with a Data Exfiltration Protection solution that:
    Allows cyber teams to monitor, alert and block private data transfer
    Brian Edelman, FCI's Founder and CEO notes, "With this unique solution, we have created the coordination between data exfiltration protection and systems of private data.
  • Our passion is to stay current on threats and regulations to help firms understand how to stay compliant and keep data safe."
  • About FCI Cyber FCI is a NIST-Based Managed Security Service Provider (MSSP) offering Cybersecurity Compliance Enablement Technologies & Services to CISOs and security personnel of Financial Services organizations with prescriptive cybersecurity regulatory requirements.
  • FCI blends best-of-breed technologies, cybersecurity best practices, expertise, and innovation to perform Security Assessments and deliver cloud-based Managed Endpoint and Network Protection.

Cymulate research reveals unique threats in the wild rose by over 35% in 2021

Retrieved on: 
среда, февраля 9, 2022

While the majority of companies are at medium risk of attacks, the technology sector is the most vulnerable followed by critical infrastructure and manufacturing.

Key Points: 
  • While the majority of companies are at medium risk of attacks, the technology sector is the most vulnerable followed by critical infrastructure and manufacturing.
  • Risks to the technology industry increased dramatically in 2021 from 2020 with a rise in spear phishing attacks attempting to gain a foothold.
  • The Americas are the most vulnerable region, with the most immediate threats from Data Exfiltration and WAF, while APAC had the most phishing attempts.
  • The Cymulate risk score provides a quantifiable metric that enables customers to prioritize their mitigation activity, track performance and benchmark themselves over time.

Cymulate research reveals unique threats in the wild rose by over 35% in 2021

Retrieved on: 
среда, февраля 9, 2022

NEW YORK and TEL AVIV, Israel, Feb. 9, 2022 /PRNewswire/ -- Cymulate, the Extended Security Posture Management market leader, today announced a summary of its platform usage in 2021 illustrating that web application firewalls are the least effective security solutions, making them prime target for adversaries and high risk points for organizations.

Key Points: 
  • While the majority of companies are at medium risk of attacks, the technology sector is the most vulnerable followed by critical infrastructure and manufacturing.
  • Risks to the technology industry increased dramatically in 2021 from 2020 with a rise in spear phishing attacks attempting to gain a foothold.
  • The Americas are the most vulnerable region, with the most immediate threats from Data Exfiltration and WAF, while APAC had the most phishing attempts.
  • The Cymulate risk score provides a quantifiable metric that enables customers to prioritize their mitigation activity, track performance and benchmark themselves over time.

Global Data Exfiltration Market to Reach $103 Billion by 2026

Retrieved on: 
вторник, октября 5, 2021

SAN FRANCISCO, Oct. 5, 2021 /PRNewswire/ -- A new market study published by Global Industry Analysts Inc., (GIA) the premier market research company, today released its report titled "Data Exfiltration - Global Market Trajectory & Analytics" .

Key Points: 
  • SAN FRANCISCO, Oct. 5, 2021 /PRNewswire/ -- A new market study published by Global Industry Analysts Inc., (GIA) the premier market research company, today released its report titled "Data Exfiltration - Global Market Trajectory & Analytics" .
  • Preview Registry
    Amid the COVID-19 crisis, the global market for Data Exfiltration estimated at US$56.6 Billion in the year 2020, is projected to reach a revised size of US$103 Billion by 2026, growing at a CAGR of 10.3% over the analysis period.
  • The U.S. Market is Estimated at $19 Billion in 2021, While China is Forecast to Reach $17.9 Billion by 2026
    The Data Exfiltration market in the U.S. is estimated at US$19 Billion in the year 2021.
  • Global Industry Analysts, Inc., ( www.strategyr.com ) is a renowned market research publisher the world`s only influencer driven market research company.

Code42 Incydr Detects Corporate Data Exfiltration Movement to Personal Google Drive, Box and other Cloud Applications

Retrieved on: 
среда, августа 4, 2021

Code42 , the Insider Risk Management leader, announced that its Code42 Incydr software solution can now automatically distinguish between browser uploads to corporate and personal cloud applications, including Google Drive and Box.

Key Points: 
  • Code42 , the Insider Risk Management leader, announced that its Code42 Incydr software solution can now automatically distinguish between browser uploads to corporate and personal cloud applications, including Google Drive and Box.
  • View the full release here: https://www.businesswire.com/news/home/20210804005434/en/
    The Code42 Incydr software solution can automatically distinguish between browser uploads to corporate and personal cloud applications, including Google Drive and Box.
  • Code42 Incydrs new functionality reduces alert noise of data movement to authorized sanctioned applications while alerting on data exfiltration to unsanctioned destinations, such as personal cloud apps.
  • Incydr quickly identifies which users are moving data to personal Google Drive and Box accounts, ensuring that organizations are protected from insider data exfiltration.