Cheyenne, Wyoming, March 7, 2016. BlackFog is pleased to announce that it has partnered with ITAMSoft B.V. to act as a distributor of BlackFog Privacy, its Cyber Privacy solution throughout the Netherlands, France, Belgium and Luxembourg. With the increased awareness and regulatory environment in Europe it is more important than ever that businesses and individuals have the best cyber privacy protection available.
“BlackFog provides a lightweight, yet comprehensive solution for detecting, intercepting and preventing data leakage, which is particularly important for corporate data loss.” said Harry Lieferink, CEO of ITAMSoft.
“BlackFog is very pleased to be partnering with ITAMSoft which has a clear demand for Cyber Privacy among its large and growing customer base. We look forward to reducing the rapidly growing privacy threats throughout Europe.” said Dr. Darren Williams, CEO of BlackFog.
About ITAMSoft
Organizations don’t buy technology for technology’s sake — they need solutions to business problems. ITAMSoft helps to meet those needs with best-of-breed solutions from the industry’s leading vendors. We combine them with a full suite of Professional and Managed Services in order to help our customers to optimize IT investments, save money and reduce risk. ITAMSoft is a privately held corporation based in Amsterdam, The Netherlands. For more information please visit www.itamsoft.com
About BlackFog
BlackFog provides fileless cyberattack defense for real time protection against online threats. It focuses on non signature based threat detection using outbound traffic monitoring to protect the device and privacy of the end user. It consists of 10 layers of defense against ransomware, spyware, malware and unauthorized data collection and profiling. BlackFog, Inc. is a privately held corporation based out of Cheyenne, Wyoming, USA. For more information about BlackFog, visit www.blackfog.com or contact media at blackfog.com
Share This Story, Choose Your Platform!
Related Posts
Infostealers Explained: The Hidden Gateway to Ransomware
Infostealers compromise credentials and open the door to ransomware. Learn what they are, how they work, and key steps to keep your business safe.
Data Poisoning Attacks: How Hackers Target AI-Driven Business Systems
Data poisoning corrupts the information resources that AI systems rely on. Learn how this growing threat works, why it matters and what steps your business can take to defend against it.
What is Cyber Resiliency and Why Does it Matter in 2025?
Discover why cyber resiliency is vital in 2025 as firms face complex threats. Learn how businesses can adapt, recover and protect trust.
The Interlock Ransomware Problem Security Teams Can’t Ignore
Interlock ransomware is disrupting healthcare, cities, and infrastructure in 2025 with fake update lures, data theft, and double extortion tactics.
Effective Data Security Management: Strategies and Best Practices
What must firms do to develop an effective data security management strategy? Here are some key best practices to follow.
What is Data Loss Prevention? | A Complete Guide to DLP Security
Learn everything you need to know about what data loss prevention is and how to implement it in this comprehensive guide.