
Cheyenne, Wyoming, March 7, 2016. BlackFog is pleased to announce that it has partnered with ITAMSoft B.V. to act as a distributor of BlackFog Privacy, its Cyber Privacy solution throughout the Netherlands, France, Belgium and Luxembourg. With the increased awareness and regulatory environment in Europe it is more important than ever that businesses and individuals have the best cyber privacy protection available.
“BlackFog provides a lightweight, yet comprehensive solution for detecting, intercepting and preventing data leakage, which is particularly important for corporate data loss.” said Harry Lieferink, CEO of ITAMSoft.
“BlackFog is very pleased to be partnering with ITAMSoft which has a clear demand for Cyber Privacy among its large and growing customer base. We look forward to reducing the rapidly growing privacy threats throughout Europe.” said Dr. Darren Williams, CEO of BlackFog.
About ITAMSoft
Organizations don’t buy technology for technology’s sake — they need solutions to business problems. ITAMSoft helps to meet those needs with best-of-breed solutions from the industry’s leading vendors. We combine them with a full suite of Professional and Managed Services in order to help our customers to optimize IT investments, save money and reduce risk. ITAMSoft is a privately held corporation based in Amsterdam, The Netherlands. For more information please visit www.itamsoft.com
About BlackFog
BlackFog provides fileless cyberattack defense for real time protection against online threats. It focuses on non signature based threat detection using outbound traffic monitoring to protect the device and privacy of the end user. It consists of 10 layers of defense against ransomware, spyware, malware and unauthorized data collection and profiling. BlackFog, Inc. is a privately held corporation based out of Cheyenne, Wyoming, USA. For more information about BlackFog, visit www.blackfog.com or contact media at blackfog.com
Share This Story, Choose Your Platform!
Related Posts
Qilin Ransomware: Analysis, Impact and Defense (2025)
In-depth 2025 Qilin ransomware analysis covering its rise, attack chain, intimidation tactics, double extortion model, and defense strategies.
Kerberoasting Attack Explained: Example And Prevention Guide
Kerberoasting attack explained with examples, detection tips, and prevention steps. Learn how to secure Active Directory from credential theft.
BlackFog Appoints Former Yahoo CFO Kenneth A. Goldman To Board Of Advisors
Kenneth A. Goldman joins BlackFog’s Board of Advisors, bringing decades of tech and finance leadership to accelerate enterprise growth and AI-based data protection.
Why Every Business Needs A Cybersecurity Roadmap
Find out what's involved in creating a cybersecurity roadmap and how having one can help navigate an extremely challenging threat landscape.
Cybersecurity Risk Assessment: Why It Matters And How To Do It Right
What do you need to complete a successful cybersecurity risk assessment and how can outsourced solutions like a virtual CISO aid in the process?
5 Effective Ways To Mitigate Risk In Cybersecurity
Follow these five proven strategies to help your firm mitigate risk in cybersecurity and ensure effective protection in today’s challenging digital environment.






