
The Challenge
The challenge for 4Sight was twofold. Firstly, the group comprises four diverse Clusters formed and structured in 2020 with the new strategy. As with any diverse business, creating standards relating to legacy policies, procedures and products was a high priority.
The group needed to focus on standardizing practices across the group, as well as ensuring that information was secure. To ensure compliance, they also needed to be able to easily manage and report this across the group.
Secondly, as leaders in digital transformation, 4Sight is responsible for providing best-of-class solutions to their customers. With cybersecurity playing such a big part in their solutions portfolio, utilizing technologies that would secure data, was critically important.
The Solution
The concept of looking beyond perimeter defence and focusing on preventing exfiltration was interesting, and although some other providers concentrate on elements of that, no one was providing data exfiltration prevention to the full extent that BlackFog was,” commented Rudi Dreyer, Chief Business Environment Officer at 4Sight.
As a digital company with a focus on data and data management, 4Sight also needed to ensure they had the best cybersecurity practices across the group when they were in the process of obtaining their ISO 27001 certification. Adding an extra layer which would prevent any unauthorized data exfiltration, was an important part of that strategy.
The Approach
Initially the intention was to provide BlackFog to their customers, but they decided to use the solution internally over a six-month period.
BlackFog was deployed across several company devices. “Initially we really liked the fact that BlackFog was an on-device solution that would help us secure our devices, no matter where our employees were based. It was easy to use with a really intuitive console. We also really liked the Threat Hunting module, being able to detect suspicious activity and investigate it to determine the root cause and address it, was a very appealing feature”, said Rudi.
During the proof-of-concept process, it was evident that BlackFog would be of benefit to their customer base. “When working with customers, our transformation team looks for gaps so we can deploy technology solutions where appropriate. We felt that BlackFog would add significant business value for several of our customers and it made sense to add it to our end-to-end cybersecurity solution.
ADX provides an extra layer of defense, and there is no such thing as enough defence when it comes to cybersecurity as it’s such a fast- moving target. For example, we have a customer in the mining industry who relies on chat functionality to communicate with partners in Russia and China. During a POC BlackFog picked up the communication that was going to restricted geographies, in this instance someone was chatting with a business associate in China but in actuality the data was going to Russia or Serbia when it shouldn’t have been. BlackFog put a stop to it, meaning the company could continue to do business with associates in those countries safely with the unauthorized data exfiltration being blocked.
We’ve also seen BlackFog pick up ransomware attacks during POC’s. When we see these types of events happening it really makes sense to add BlackFog as an extra security layer for of our customers,” added Rudi.
The Results
Following the trial period and evaluation, 4Sight decided to deploy BlackFog to all of its company devices, in addition to adding it to their solutions portfolio for their customers. Rudi concluded, “As a company we are committed to helping our customers future proof their businesses through digital transformation.
Adding an anti-data exfiltration solution to our security stack means we are providing our customers with next- generation cybersecurity solutions to ensure our data and that of our customers is as secure as it can be.
I would definitely recommend BlackFog to other organizations. Most companies have a data exfiltration problem, they just don’t know it yet. BlackFog provides peace of mind, so much so that I even have it on all of my personal devices.”
Share This Story, Choose Your Platform!
Related Posts
From Reactive to Proactive: Cyber Risk Reduction at Hillcrest Insurance with BlackFog vCISO
Hillcrest Insurance stopped phishing and ransomware attacks with BlackFog’s proactive vCISO service, gaining 24/7 protection and peace of mind.
Why AI Prompt Injection Is the New Social Engineering
Find out why cybersecurity pros should be treating AI prompt injection hacks in the same way as social engineering attacks.
Adaptive Security: Why Cyber Defense Needs to Evolve with the Threat Landscape
What does adaptive security involve and why is it essential in an era of AI-powered cyberthreats?
Prompt Injection Attacks: Types, Risks and Prevention
Understand how AI prompt injection attacks work, the damage they can cause and how to stop them in this comprehensive guide.
LLM Cybersecurity: How Businesses Can Protect and Leverage AI Safely
Learn about some of the key LLM cybersecurity issues that need to be considered when adding tools like generative AI to firms' systems.
How Can a Zero-Trust Approach Help Guard Against LLM prompt injection attacks?
Adapting zero-trust network security principles for use with AI is one way in which businesses can defend models from LLM prompt injection attacks.