Preventing Outbound Data Loss
Preventing Outbound Data Loss
Introduction
BlackFog was founded as a solution to the global problem of data privacy and data security. Before the advent of rich mobile devices in 2007 with the first iPhone, the concept of losing your computer was considered a major problem for individuals and corporations. Many solutions were developed to try and prevent the theft of these devices with limited success.
The world has moved to a mobile device based economy, with focus around data creation, storage, cloud servers and information sharing. The idea of losing your device has become secondary to the information that is stored on it.
Corporations and individuals are more concerned with losing their data first and foremost. When you can lock your phone and get a replacement with in minutes or hours, the device itself becomes secondary.
BlackFog was conceived to fill the gap that exists in the market between the current security solutions that focus on preventing access through intrusion detection systems, such as Firewalls (pre-infection) and Anti-Virus/ Anti-Malware solutions (post-infection) that remove known infections after they have been discovered.
As a part of a layered approach to security BlackFog sits between these two types of solutions and prevents data loss and identity theft by preventing outbound data connections when it discovers anomalies in the behavior of applications or remote servers. By sitting just above the networking hardware itself at layer 3 of the networking stack it is able to see the traffic before it passes the information onto the operating system. Therefore it is possible to prevent any damage before it occurs.
Examples include preventing data flowing outside defined geo-fences, destination countries or certificate key exchange where ransomware applications try to encrypt files on your hard drive.
Existing Products
This new segment, which we define as “Cyber Privacy”, focuses on preventing data loss (data leaving the device), data profiling (behavioral analysis) and data collection (forensics).
BlackFog is currently the only product in this space that tackles this problem at all these levels simultaneously. Other “Privacy” products that currently exist focus exclusively on “Cleaning” your device, by removing trace activity from other applications. This is defined as forensic information using BlackFog terminology.
Adjacent products in the category include Firewall solutions that focus on intrusion detection. However these products focus specifically on blocking ports or anomalies in protocols that are well documented. Often existing at the edge of the network as dedicated hardware and extremely expensive these solutions focus on inbound packets.
Anti-virus and Anti-malware solutions focus on fingerprinting techniques. While some have some basic networking detection, they are very weak and rely on fingerprinting and again require detailed analysis and prior knowledge of attacks.
Macro Economics
In 2014, 69% of executives expressed concerned about cyber threats, including a lack of data security, according to a PricewaterhouseCoopers survey. In 2015, an updated survey increased that number to 86%, so it’s clear that the desire for better cybersecurity is not going away anytime soon. It is estimated that $655 billion will be spent on cybersecurity between 2015-2020 (Business Insider).
Share This Story, Choose Your Platform!
Related Posts
Infostealers Explained: The Hidden Gateway to Ransomware
Infostealers compromise credentials and open the door to ransomware. Learn what they are, how they work, and key steps to keep your business safe.
Data Poisoning Attacks: How Hackers Target AI-Driven Business Systems
Data poisoning corrupts the information resources that AI systems rely on. Learn how this growing threat works, why it matters and what steps your business can take to defend against it.
What is Cyber Resiliency and Why Does it Matter in 2025?
Discover why cyber resiliency is vital in 2025 as firms face complex threats. Learn how businesses can adapt, recover and protect trust.
The Interlock Ransomware Problem Security Teams Can’t Ignore
Interlock ransomware is disrupting healthcare, cities, and infrastructure in 2025 with fake update lures, data theft, and double extortion tactics.
Effective Data Security Management: Strategies and Best Practices
What must firms do to develop an effective data security management strategy? Here are some key best practices to follow.
What is Data Loss Prevention? | A Complete Guide to DLP Security
Learn everything you need to know about what data loss prevention is and how to implement it in this comprehensive guide.