BlackFog White Paper
By |Published On: January 11th, 2019|3 min read|Categories: White Paper|

Preventing Outbound Data Loss

Introduction

BlackFog was founded as a solution to the global problem of data privacy and data security. Before the advent of rich mobile devices in 2007 with the first iPhone, the concept of losing your computer was considered a major problem for individuals and corporations. Many solutions were developed to try and prevent the theft of these devices with limited success.

The world has moved to a mobile device based economy, with focus around data creation, storage, cloud servers and information sharing. The idea of losing your device has become secondary to the information that is stored on it.

Corporations and individuals are more concerned with losing their data first and foremost. When you can lock your phone and get a replacement with in minutes or hours, the device itself becomes secondary.

BlackFog was conceived to fill the gap that exists in the market between the current security solutions that focus on preventing access through intrusion detection systems, such as Firewalls (pre-infection) and Anti-Virus/ Anti-Malware solutions (post-infection) that remove known infections after they have been discovered.

BlackFog OSI Layer 3 and data exfiltration

As a part of a layered approach to security BlackFog sits between these two types of solutions and prevents data loss and identity theft by preventing outbound data connections when it discovers anomalies in the behavior of applications or remote servers. By sitting just above the networking hardware itself at layer 3 of the networking stack it is able to see the traffic before it passes the information onto the operating system. Therefore it is possible to prevent any damage before it occurs.

Examples include preventing data flowing outside defined geo-fences, destination countries or certificate key exchange where ransomware applications try to encrypt files on your hard drive.

Existing Products

This new segment, which we define as “Cyber Privacy”, focuses on preventing data loss (data leaving the device), data profiling (behavioral analysis) and data collection (forensics).

BlackFog is currently the only product in this space that tackles this problem at all these levels simultaneously. Other “Privacy” products that currently exist focus exclusively on “Cleaning” your device, by removing trace activity from other applications. This is defined as forensic information using BlackFog terminology.

Adjacent products in the category include Firewall solutions that focus on intrusion detection. However these products focus specifically on blocking ports or anomalies in protocols that are well documented. Often existing at the edge of the network as dedicated hardware and extremely expensive these solutions focus on inbound packets.

Anti-virus and Anti-malware solutions focus on fingerprinting techniques. While some have some basic networking detection, they are very weak and rely on fingerprinting and again require detailed analysis and prior knowledge of attacks.

Macro Economics

BlackFog Market Sizing

In 2014, 69% of executives expressed concerned about cyber threats, including a lack of data security, according to a PricewaterhouseCoopers survey. In 2015, an updated survey increased that number to 86%, so it’s clear that the desire for better cybersecurity is not going away anytime soon. It is estimated that $655 billion will be spent on cybersecurity between 2015-2020 (Business Insider).

Share This Story, Choose Your Platform!

Related Posts

  • BlackFog V5

BlackFog unveils AI based anti data exfiltration (ADX) platform for ransomware and data loss prevention

November 12th, 2024|

BlackFog unveils the latest version of its AI based anti data exfiltration (ADX) platform for even more powerful ransomware and data loss prevention. Version 5 introduces new features including air gap protection, real-time geofencing, and baseline activity monitoring to ensure the highest level of cybersecurity protection.

Data Exfiltration Detection: Best Practices and Tools

November 1st, 2024|

Data exfiltration, a tactic used in 93% of ransomware attacks, can lead to severe consequences including financial losses, reputational damage, and loss of customer trust. To mitigate these risks, organizations must implement effective detection strategies and technologies.