The Challenge
The challenge for 4Sight was twofold. Firstly, the group comprises four diverse Clusters formed and structured in 2020 with the new strategy. As with any diverse business, creating standards relating to legacy policies, procedures and products was a high priority.
The group needed to focus on standardizing practices across the group, as well as ensuring that information was secure. To ensure compliance, they also needed to be able to easily manage and report this across the group.
Secondly, as leaders in digital transformation, 4Sight is responsible for providing best-of-class solutions to their customers. With cybersecurity playing such a big part in their solutions portfolio, utilizing technologies that would secure data, was critically important.
The Solution
The concept of looking beyond perimeter defence and focusing on preventing exfiltration was interesting, and although some other providers concentrate on elements of that, no one was providing data exfiltration prevention to the full extent that BlackFog was,” commented Rudi Dreyer, Chief Business Environment Officer at 4Sight.
As a digital company with a focus on data and data management, 4Sight also needed to ensure they had the best cybersecurity practices across the group when they were in the process of obtaining their ISO 27001 certification. Adding an extra layer which would prevent any unauthorized data exfiltration, was an important part of that strategy.
The Approach
Initially the intention was to provide BlackFog to their customers, but they decided to use the solution internally over a six-month period.
BlackFog was deployed across several company devices. “Initially we really liked the fact that BlackFog was an on-device solution that would help us secure our devices, no matter where our employees were based. It was easy to use with a really intuitive console. We also really liked the Threat Hunting module, being able to detect suspicious activity and investigate it to determine the root cause and address it, was a very appealing feature”, said Rudi.
During the proof-of-concept process, it was evident that BlackFog would be of benefit to their customer base. “When working with customers, our transformation team looks for gaps so we can deploy technology solutions where appropriate. We felt that BlackFog would add significant business value for several of our customers and it made sense to add it to our end-to-end cybersecurity solution.
ADX provides an extra layer of defense, and there is no such thing as enough defence when it comes to cybersecurity as it’s such a fast- moving target. For example, we have a customer in the mining industry who relies on chat functionality to communicate with partners in Russia and China. During a POC BlackFog picked up the communication that was going to restricted geographies, in this instance someone was chatting with a business associate in China but in actuality the data was going to Russia or Serbia when it shouldn’t have been. BlackFog put a stop to it, meaning the company could continue to do business with associates in those countries safely with the unauthorized data exfiltration being blocked.
We’ve also seen BlackFog pick up ransomware attacks during POC’s. When we see these types of events happening it really makes sense to add BlackFog as an extra security layer for of our customers,” added Rudi.
The Results
Following the trial period and evaluation, 4Sight decided to deploy BlackFog to all of its company devices, in addition to adding it to their solutions portfolio for their customers. Rudi concluded, “As a company we are committed to helping our customers future proof their businesses through digital transformation.
Adding an anti-data exfiltration solution to our security stack means we are providing our customers with next- generation cybersecurity solutions to ensure our data and that of our customers is as secure as it can be.
I would definitely recommend BlackFog to other organizations. Most companies have a data exfiltration problem, they just don’t know it yet. BlackFog provides peace of mind, so much so that I even have it on all of my personal devices.”
Related Posts
Endpoint Data Loss Prevention: Protect Your Data Securely
What should firms keep in mind when looking for advanced endpoint data loss prevention tools?
The Johnson Controls Ransomware Attack – Impact and Key Insights Review
In September 2023, Johnson Controls International suffered a ransomware attack linked to the Dark Angels group, resulting in the theft of 27TB of sensitive data. The breach caused $27 million in losses and disrupted operations, highlighting the critical need for robust cybersecurity defenses.
The 2024 Vulnerability Crisis – Managing Cybersecurity Threats
Learn how organizations can meet the onslaught of cybersecurity vulnerabilities, along with five of the most common vulnerabilities and successful management strategies. Find out why there’s a new vulnerability every 17 minutes.
What is Data Loss Prevention? | A Complete Guide to DLP Security
Data is the most valuable asset today's businesses possess - and volumes are growing all the time. In this article we look at what data loss prevention means heading into 2025 and what should firms be doing to improve their capabilities?
BlackFog: Personal Liability Concerns Impact 70% of Cybersecurity Leaders
70% of cybersecurity leaders face personal liability concerns. Discover how it impacts governance, accountability, and cybersecurity practices.
Ongoing: New Ransomware Gangs in 2024
Ransomware gangs continue to break records and BlackFog will track all new ransomware gangs in 2024.