
BlackFog unveils AI based anti data exfiltration (ADX) platform for ransomware and data loss prevention
San Francisco, CA, 12 November 2024 – BlackFog, the leader in ransomware prevention and anti data exfiltration (ADX), today announced the launch of its next generation enterprise platform to deliver even more powerful ransomware and insider threat prevention.
BlackFog’s pioneering platform focuses specifically on anti data exfiltration to prevent unauthorized data from leaving a device, ensuring that an organization’s most sensitive information is protected.
The latest product enhancements in Version 5 are designed to provide enhanced data loss prevention without the need for data classification. This comes at a time when ransomware attacks continue to evolve and disrupt businesses worldwide, with 93% of incidents now involving data exfiltration.
The key updates in Version 5 include:
Air Gap protection for sensitive data
The latest release features a significant new enhancement – air gapping – to ensure no data can leave without passing through its AI based threat detection engine. This feature acts like a bridge that all traffic passes through before connecting, stopping communication entirely rather than resetting an established connection.
This provides even more reassurance for customers that their intellectual property, customer and employee data cannot be shared outside the network.
Real-time geofencing for detecting bad actors
Leveraging BlackFog’s global network of servers to identify the destination of every packet, real time geofencing improves the accuracy with which the platform detects bad actors, prevents data exfiltration and lateral movement across the network. With intelligent data enrichment it not only geolocates the intended destination but also gathers important signals to assess the legitimacy of the packet itself.
Baseline activity monitoring
BlackFog’s AI based algorithms identify zero-day attacks in real time and monitor process behaviour, intent and data chain of custody to determine the legitimacy of every packet. A new layer of detection – baseline activity monitoring – helps detect dwell time, payload activation and insider threats. Enterprise customers can configure a threshold traffic volume so that once exfiltration exceeds this value it will trigger an activity alert within the main console. This further protects organizations from unusual activity, including rogue employees and other insider threats.

Commenting on the latest release, Dr. Darren Williams, CEO and Founder, BlackFog said, “We’ve introduced powerful new features to help those on the front line of the fight against costly, disruptive and, in some cases, devastating ransomware attacks. It’s the culmination of years of research and development and underlines our commitment to delivering the highest levels of cybersecurity protection.”
He continues, “With AI being leveraged by bad actors for deepfakes and other advanced phishing techniques, it is important organizations are equally armed with tools like BlackFog to fight back.”
About BlackFog
BlackFog is the category-defining vendor in anti data exfiltration (ADX). Founded in 2015, the company invented ADX on the thesis that the endpoint is the only control point capable of stopping data from leaving an organization, an architectural bet that has now been validated across three exfiltration vectors: ransomware, shadow AI, and autonomous AI agents. BlackFog’s endpoint-native platform protects more than 500 enterprises, government agencies, and critical infrastructure operators worldwide. The company is the publisher of the annual State of Ransomware report and the BlackFog/Sapio Shadow AI Research, the most-cited primary research in the category. BlackFog’s recognition includes the teiss Awards 2026, the AI Excellence Award 2026, the Cybersecurity Excellence Awards 2026, and the Cybersecurity Breakthrough Award. Headquartered in San Francisco with international operations in London and Belfast. Learn more at blackfog.com.
Share This Story, Choose Your Platform!
Related Posts
Shadow AI and Governance: Why Traditional Control Is Failing CISOs
Shadow AI and Governance: Why traditional controls are failing CISOs as AI adoption accelerates, increasing risk and reducing visibility.
Oracle Breach: What Happened and Why It Matters
The 2025 Oracle breach exposed millions of records across three separate incidents. Learn how attackers got in, which industries were hit, and how to protect your organization.
What Is An Integrity Data Breach?
Find out what an integrity data breach involves, how it differs from data loss and why it's vital for businesses to be aware of the potential risks.
How Quickly Should A Suspected Data Breach Be Reported?
Data breach reporting deadlines can be tight. Learn when firms must report a suspected data breach, who must be informed and the risks of delay.
What Are The 5 Most Common Sources Of Data Leaks On The Internet?
Understanding how these five common sources of data leaks occur and how they can be prevented is an essential part of a data security strategy.
What Are The Latest Major Data Breaches And What Was Leaked?
These ten major data breaches from 2025 highlight the worldwide scale of cybersecurity incidents in the past year.






