BlackFog Logo

FAQs

How Does ADX Work?

ADX works by investigating outgoing data on endpoint devices. This gives it a markedly smaller footprint than other solutions, such as firewalls or DLP, which examines incoming and outgoing traffic at the edge of the network. ADX solutions are lightweight enough to run on mobile devices and do not need to work on the [...]

2024-01-28T23:14:05+00:00January 28th, 2024||

What is ADX?

Pioneered by BlackFog, ADX is a technique used to prevent unauthorized data from leaving a device. By targeting multiple parts of the kill chain, ADX effectively blocks the activation and spread of cyberattacks. Since cyberattacks, especially ransomware focuses on data theft for extortion this has become an important technique to thwart modern polymorphic attacks [...]

2024-01-28T23:12:35+00:00January 28th, 2024||

How can I trust ADX technology?

BlackFog has been around since 2015 and is the leader in ADX, a new category for anti data exfiltration technology. BlackFog has been endorsed by leading analysts and received several industry awards, so you can trust ADX technology. Hundreds of global customers across all industry verticals trust BlackFog to secure their data and prevent [...]

2024-01-28T23:09:49+00:00January 28th, 2024||

I have cyber insurance for ransomware, isn’t that enough?

While cyber insurance has become a ‘need to have’ for many organizations, it is only part of a cybersecurity strategy. Cyber insurance may help with the cost of remediation from an attack, but it doesn’t offer any protection. Cyber insurers are also suffering from an exponential rise in claims and the industry is changing [...]

2024-01-28T22:56:57+00:00January 28th, 2024||

We already have an EDR / XDR solution, why would I need ADX?

EDR / XDR solutions provide necessary endpoint protection as well as threat detection, investigation, and response by using threat intelligence and data analytics. BlackFog works well alongside these solutions but also offers some advantages over these technologies. Here are some main points to consider. AI powered EDRs can’t always provide persistent, protectable solutions for [...]

2024-01-28T22:54:15+00:00January 28th, 2024||

How does ADX interact with the zero trust approach?

ADX has been specifically designed to be a zero trust solution as it prevents any code from unauthorized data exfiltration. BlackFog effectively validates a zero trust architecture by ensuring every application is doing exactly what it says it should. In an ideal world this would not be necessary, but latent code can activate at anytime [...]

2024-01-28T22:50:02+00:00January 28th, 2024||

How is Updating BlackFog managed?

BlackFog utilizes different rule sets to protect your device. Updating BlackFog is managed within the application automatically. BlackFog periodically checks BlackFog servers for updated rules and downloads new ones as necessary. BlackFog uses SSL for all connections to its update servers. Please ensure you have all the relevant ports open to ensure it is [...]

2024-01-28T20:36:31+00:00June 22nd, 2016||

Title