Preventing Outbound Data Loss
Preventing Outbound Data Loss
Introduction
BlackFog was founded as a solution to the global problem of data privacy and data security. Before the advent of rich mobile devices in 2007 with the first iPhone, the concept of losing your computer was considered a major problem for individuals and corporations. Many solutions were developed to try and prevent the theft of these devices with limited success.
The world has moved to a mobile device based economy, with focus around data creation, storage, cloud servers and information sharing. The idea of losing your device has become secondary to the information that is stored on it.
Corporations and individuals are more concerned with losing their data first and foremost. When you can lock your phone and get a replacement with in minutes or hours, the device itself becomes secondary.
BlackFog was conceived to fill the gap that exists in the market between the current security solutions that focus on preventing access through intrusion detection systems, such as Firewalls (pre-infection) and Anti-Virus/ Anti-Malware solutions (post-infection) that remove known infections after they have been discovered.
As a part of a layered approach to security BlackFog sits between these two types of solutions and prevents data loss and identity theft by preventing outbound data connections when it discovers anomalies in the behavior of applications or remote servers. By sitting just above the networking hardware itself at layer 3 of the networking stack it is able to see the traffic before it passes the information onto the operating system. Therefore it is possible to prevent any damage before it occurs.
Examples include preventing data flowing outside defined geo-fences, destination countries or certificate key exchange where ransomware applications try to encrypt files on your hard drive.
Existing Products
This new segment, which we define as “Cyber Privacy”, focuses on preventing data loss (data leaving the device), data profiling (behavioral analysis) and data collection (forensics).
BlackFog is currently the only product in this space that tackles this problem at all these levels simultaneously. Other “Privacy” products that currently exist focus exclusively on “Cleaning” your device, by removing trace activity from other applications. This is defined as forensic information using BlackFog terminology.
Adjacent products in the category include Firewall solutions that focus on intrusion detection. However these products focus specifically on blocking ports or anomalies in protocols that are well documented. Often existing at the edge of the network as dedicated hardware and extremely expensive these solutions focus on inbound packets.
Anti-virus and Anti-malware solutions focus on fingerprinting techniques. While some have some basic networking detection, they are very weak and rely on fingerprinting and again require detailed analysis and prior knowledge of attacks.
Macro Economics
In 2014, 69% of executives expressed concerned about cyber threats, including a lack of data security, according to a PricewaterhouseCoopers survey. In 2015, an updated survey increased that number to 86%, so it’s clear that the desire for better cybersecurity is not going away anytime soon. It is estimated that $655 billion will be spent on cybersecurity between 2015-2020 (Business Insider).
Share This Story, Choose Your Platform!
Related Posts
Ransomware Detection: Effective Strategies and Tools
What ransomware detection tools and techniques should businesses be using in order to improve their security?
Healthcare Ransomware Attacks: How to Prevent and Respond Effectively
Learn how to protect yourself from healthcare ransomware attacks. We discuss the main security weaknesses, suggest security steps, and offer possible means of protecting patient information.
What is Ransomware? Things You Need to Know About Ransomware
Everything you need to know about ransomware: what is ransomware, different types of ransomware, how does it spread, impact, and how to protect against it.
Akira Ransomware Group: The New Face of Ransomware
Learn how Akira ransomware group is defining cybercrime worldwide. Find out about their methods, how they focus on small and medium-sized businesses (SMBs), and get practical advice to help protect your organization.
The Role of Wireless Intrusion Detection: Guard Against Invisible Threats
Learn everything you need to know about wireless intrusion detection and why it should have a place in your cybersecurity strategy.
IPS Tools in Cybersecurity: Still Essential in 2025?
Learn why businesses need IPS tools and how these offerings work to boost cybersecurity defenses.