Datex’s DataStealth is a difficult product to classify. It resembles data loss prevention (DLP) and privacy software but doesn’t fit neatly in either category. By focusing on data obfuscation, DataStealth uses a novel approach aimed at limiting sensitive-data acquisition in the first place (i.e. with the logic that “you can’t lose what you don’t have”).
Traditional DLP solutions often resemble action heroes: they swoop in the last second to prevent some kind of catastrophic loss (assuming they were configured correctly, of course).
DataStealth, however, works by removing sensitive data from files and replacing it with placeholder “dummy” data, effectively converting such data into something far more innocuous. That is, it’s data you don’t need to fear losing.
The software can be used for incoming and outgoing data, which is a particularly nice feature to have when documents containing sensitive data must be shared with third parties. Because the personally identifiable information or other sensitive data has been removed, so has any liability that might exist if the third party is compromised.
This simple but effective approach to data protection and privacy has caught the attention of those in government, finance, and healthcare. But any organization that holds sensitive data could find a lot of value in DataStealth.
DataStealth is a difficult product to classify. It is not marketed as a DLP solution and, indeed, is not a DLP solution by any conventional standard. The term “data acquisition prevention” is perhaps more appropriate. Yet the product’s purpose is more or less the same as DLP, meaning it may present itself as another solution for those frustrated with conventional DLP options.
The recent Schrems II invalidation of the EU-US Privacy Shield has added a layer of difficulty for organizations that operate across borders, as they now require additional contractual clauses and measures in place to ensure data can transfer freely. Privacy program management vendor Proteus-Cyber offers a streamlined solution with the release of its Transfer Impact Assessment tool.
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
Microsoft recently previewed the specific features to tackle data security and risk management for end users with Microsoft Endpoint Data Loss Prevention (DLP) and Double Key Encryption. The reason for the launch? The increasing shift towards a remote work environment and a need to mitigate the accompanying risks.
IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
To bolster and broaden its data privacy capabilities for end users, cyber and data protection vendor Acronis has acquired DLP player DeviceLock. The acquisition aligns with the increasingly prevalent role that data privacy plays in cybersecurity.
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.