The Challenge
The challenge for 4Sight was twofold. Firstly, the group comprises four diverse Clusters formed and structured in 2020 with the new strategy. As with any diverse business, creating standards relating to legacy policies, procedures and products was a high priority.
The group needed to focus on standardizing practices across the group, as well as ensuring that information was secure. To ensure compliance, they also needed to be able to easily manage and report this across the group.
Secondly, as leaders in digital transformation, 4Sight is responsible for providing best-of-class solutions to their customers. With cybersecurity playing such a big part in their solutions portfolio, utilizing technologies that would secure data, was critically important.
The Solution
The concept of looking beyond perimeter defence and focusing on preventing exfiltration was interesting, and although some other providers concentrate on elements of that, no one was providing data exfiltration prevention to the full extent that BlackFog was,” commented Rudi Dreyer, Chief Business Environment Officer at 4Sight.
As a digital company with a focus on data and data management, 4Sight also needed to ensure they had the best cybersecurity practices across the group when they were in the process of obtaining their ISO 27001 certification. Adding an extra layer which would prevent any unauthorized data exfiltration, was an important part of that strategy.
The Approach
Initially the intention was to provide BlackFog to their customers, but they decided to use the solution internally over a six-month period.
BlackFog was deployed across several company devices. “Initially we really liked the fact that BlackFog was an on-device solution that would help us secure our devices, no matter where our employees were based. It was easy to use with a really intuitive console. We also really liked the Threat Hunting module, being able to detect suspicious activity and investigate it to determine the root cause and address it, was a very appealing feature”, said Rudi.
During the proof-of-concept process, it was evident that BlackFog would be of benefit to their customer base. “When working with customers, our transformation team looks for gaps so we can deploy technology solutions where appropriate. We felt that BlackFog would add significant business value for several of our customers and it made sense to add it to our end-to-end cybersecurity solution.
ADX provides an extra layer of defense, and there is no such thing as enough defence when it comes to cybersecurity as it’s such a fast- moving target. For example, we have a customer in the mining industry who relies on chat functionality to communicate with partners in Russia and China. During a POC BlackFog picked up the communication that was going to restricted geographies, in this instance someone was chatting with a business associate in China but in actuality the data was going to Russia or Serbia when it shouldn’t have been. BlackFog put a stop to it, meaning the company could continue to do business with associates in those countries safely with the unauthorized data exfiltration being blocked.
We’ve also seen BlackFog pick up ransomware attacks during POC’s. When we see these types of events happening it really makes sense to add BlackFog as an extra security layer for of our customers,” added Rudi.
The Results
Following the trial period and evaluation, 4Sight decided to deploy BlackFog to all of its company devices, in addition to adding it to their solutions portfolio for their customers. Rudi concluded, “As a company we are committed to helping our customers future proof their businesses through digital transformation.
Adding an anti-data exfiltration solution to our security stack means we are providing our customers with next- generation cybersecurity solutions to ensure our data and that of our customers is as secure as it can be.
I would definitely recommend BlackFog to other organizations. Most companies have a data exfiltration problem, they just don’t know it yet. BlackFog provides peace of mind, so much so that I even have it on all of my personal devices.”
Related Posts
Healthcare Ransomware Attacks: How to Prevent and Respond Effectively
Learn how to protect yourself from healthcare ransomware attacks. We discuss the main security weaknesses, suggest security steps, and offer possible means of protecting patient information.
Everything That You Need to Know About the Dark Web and Cybercrime
Learn about the dark web, including who uses it, how it operates, and what tools cybercriminals obtain on it. Find out how BlackFog monitors networks, forums, and ransomware leak sites in order to stay ahead of new threats.
Ongoing: New Ransomware Gangs in 2024
Ransomware gangs continue to break records and BlackFog will track all new ransomware gangs in 2024.
BlackFog unveils AI based anti data exfiltration (ADX) platform for ransomware and data loss prevention
BlackFog unveils the latest version of its AI based anti data exfiltration (ADX) platform for even more powerful ransomware and data loss prevention. Version 5 introduces new features including air gap protection, real-time geofencing, and baseline activity monitoring to ensure the highest level of cybersecurity protection.
EDR Kill Shifter: Why a Layered Cybersecurity Approach is Required
Learn how ransomware-as-a-service is simplifying ransomware tool creation and increasing ransomware attack accessibility in cybercrime. Find out how modern ransomware syndications use RaaS.
The Rise of Ransomware-as-a-Service and Decline of Custom Tool Development
Learn how ransomware-as-a-service is simplifying ransomware tool creation and increasing ransomware attack accessibility in cybercrime. Find out how modern ransomware syndications use RaaS.