
This series developed by TAG Infosphere, highlights a powerful new cybersecurity solution known as Anti Data Exfiltration (ADX) which provides on-device data security and threat protection. Commercial vendor BlackFog pioneered ADX which is shown to effectively stop cyberattacks such as ransomware, spyware, malware, and phishing.
eBook Contents
Chapter | Title |
---|---|
Introduction | ANTI DATA EXFILTRATION (ADX) |
Chapter 1 | OVERVIEW OF ADX BENEFITS |
Chapter 2 | HOW ADX SUPPORTS AND IMPLEMENTS POLICY |
Chapter 3 | HOW ADX IS INTEGRATED INTO THE ENTERPRISE |
Chapter 4 | HOW ADX IS IMPLEMENTED BY BLACKFOG |
Chapter 5 | AN ADX ACTION PLAN FOR ENTERPRISE |
Introduction
It is now well-known by organizations of all sizes and across all sectors that ransomware prevention and data exfiltration prevention have emerged as primary objectives for leadership. The problem is that despite such recognition and attention from cybersecurity teams, breach incidents continue to occur. The City of Dallas, for example, recently reported paying millions after a ransomware attack in May 2023.¹ Furthermore, the loss of data in the enterprise continues to be a nagging cybersecurity problem, one that has been subjected to literally decades of attention, mostly with only modest improvement. In 2023, for example, IBM, Deloitte, PwC, and EY were all victims of a data extortion exploit, related to the MOVEit exploit that hit the industry, driven by a Russian-speaking group called Clop.²
In this Book we focus on a preventative method known as Anti Data Exfiltration (ADX) that exhibits many important cybersecurity principles for organizations.³ Pioneered by commercial vendor BlackFog, ADX involves an on-device means for addressing data security, privacy, and ransomware prevention.4 We will show how ADX complements existing controls, while effectively mitigating threats that can lead to high response cost.
The chapters will cover the salient aspects of ADX with the goal of helping security practitioners to understand how the method – and how the BlackFog solution, in particular – can be used to reduce cyber risk. The good news is that in addition to addressing ransomware risk, ADX is also highly effective in reducing the likelihood of successful spyware, malware, phishing, unauthorized data collection, and profiling attacks. Our hope is that by introducing you to ADX, you will take steps to begin reviewing how this data security method complements or perhaps even replaces your existing endpoint protection. Most of the deployments we’ve seen utilize ADX to make existing solutions such as endpoint detection and response (EDR) better. As the solution evolves, however, it is possible that ADX will become the preferred security approach for devices that can accept agents.
² See https://www.crn.com/news/security/10-major-cyberattacks-and-data-breaches-in-2023?page=5 for example data exfiltration scenarios that have occurred to live production systems.
³ See https://www.tag-infosphere.com/ for information on TAG Infosphere’s Research as a Service (RaaS) and related offerings in cybersecurity, artificial intelligence, and other areas.
4 See https://www.blackfog.com/ for information on how the company implements and support anti data exfiltration (ADX) for enterprise customers requiring data security solutions.
About BlackFog
BlackFog is the leader in on-device data privacy, data security and ransomware prevention. Its behavioral analysis and anti data exfiltration (ADX) technology stops hackers before they even get started. The company’s cyberthreat prevention software prevents ransomware, spyware, malware, phishing, unauthorized data collection and profiling and mitigates the risks associated with data breaches and insider threats. BlackFog blocks threats across mobile and desktop endpoints, protecting organizations data and privacy, and strengthening regulatory compliance.
About TAG
TAG is a trusted next generation research and advisory company that utilizes an AI-powered SaaS platform to provide on demand insights, guidance, and recommendations to enterprise teams, government agencies, and commercial vendors in cybersecurity, artificial intelligence, and climate science.
Copyright © 2024 TAG Infosphere, Inc. This report may not be reproduced, distributed, or shared without TAG Infosphere’s written permission. The material in this report is comprised of the opinions of the TAG Infosphere analysts and is not to be interpreted as consisting of factual assertions. All warranties regarding the correctness, usefulness, accuracy, or completeness of this report are disclaimed herein.
Related Posts
TAG Series – Using ADX to Stop Ransomware and Other Threats to Data
This series developed by TAG Infosphere, highlights a powerful new cybersecurity solution known as Anti Data Exfiltration (ADX) which provides on-device data security and threat protection.
Understanding Attack Surfaces in Cybersecurity
What do you need to know in order to minimise the risks of your network's attack surface?
Successful Cyberattack Vectors: Common Threats and How to Stop Them
Make sure you understand the threats your firm faces by learning about the most successful cyberattack vectors used by hackers.
Brute Force Attacks in 2025: How They Work, What’s Changed and How to Stop Them
How have brute force attacks evolved in 2025 and what can firms do to prevent these threats?
Types of Cybercrime: Understanding Today’s Threat Landscape
Recognizing the key types of cybercrime and knowing how they work is an essential starting point when developing a cybersecurity defense strategy.
Cybersecurity Incident Response: How to Prepare for and Manage Modern Threats
Following these seven data loss prevention best practices can help any firm reduce the risk of falling victim to threats like ransomware.