Using Anti Data Exfiltration (ADX) to Stop Ransomware and Other Threats to Data
Dr. EDWARD AMOROSO, FOUNDER & CEO, TAG
This series of blogs developed by TAG Infosphere highlights a powerful new cybersecurity solution known as Anti Data Exfiltration (ADX) which provides on-device data security and threat protection. Commercial vendor BlackFog pioneered ADX which is shown to effectively stop cyberattacks such as ransomware, spyware, malware, and phishing.
An ADX Action Plan for Enterprise
In this series of blogs we have emphasized the benefits of ADX and have explained how commercial solution provider BlackFog effectively implements and supports this important on-device protection approach. That said, the only means by which such concepts can be practically useful is through an action plan with the commitment to deploy and support the approach.
In the sections below, we make some recommendations for how a team might begin to develop an action plan to move forward with ADX. We understand that every organization will necessarily have a different local approach, but we hope that our general comments below can be applicable to a wide range of different projects plans for organizations of various sizes and business scenarios.
How Does an Organization Prepare for ADX?
The good news for any team considering deployment of ADX into their enterprise, and using BlackFog in particular, is that the options to either overlay, complement, or replace existing solutions is available. Despite limitations of traditional data loss prevention (DLP) solutions, nothing precludes an organization from combining on-device ADX agents with existing approaches.
That said, it is a good idea to address the relevant security control requirements that will exist locally. Our experience at TAG suggests that these can be based on the need to (1) reduce threat, perhaps after an incident, (2) address compliance demands often from major customers with supply chain requirements, or (3) lower the cost of existing solutions as a result of financial and budget challenges. These should be reviewed in advance of any ADX deployment.
What Process can be used to Deploy ADX?
The deployment of ADX to the endpoint devices can make use of any existing processes or tools for pushing agent software to targeted devices. Enterprise customers working with BlackFog can and should discuss any unique requirements that might exist locally to determine the best means for implementation.
Our experience at TAG is that deployments to endpoints do require up-front planning with the commercial vendor. Certainly, once a process has been identified and tested, scaled installation should be the goal. A unique advantage of the BlackFog agent is that it is auto updating. Once the initial deployment has been performed future updates are done automatically and can be controlled directly within the main console. This also includes the ability for MSP’s to uniquely apply specific settings based on organization and group as required.
How can TAG assist with ADX Planning?
As always, the TAG research and advisory team is always available to help with any projects that include technology such as ADX and products such as BlackFog. While we are not hands-on administrators, we can offer guidance, insight, and recommendations to help ensure that your ADX implementation project is not only successful, but that it future proofs your team from many types of new and emerging threats.
About BlackFog
BlackFog is the leader in on-device data privacy, data security and ransomware prevention. Its behavioral analysis and anti data exfiltration (ADX) technology stops hackers before they even get started. The company’s cyberthreat prevention software prevents ransomware, spyware, malware, phishing, unauthorized data collection and profiling and mitigates the risks associated with data breaches and insider threats. BlackFog blocks threats across mobile and desktop endpoints, protecting organizations data and privacy, and strengthening regulatory compliance.
About TAG
TAG is a trusted next generation research and advisory company that utilizes an AI-powered SaaS platform to provide on demand insights, guidance, and recommendations to enterprise teams, government agencies, and commercial vendors in cybersecurity, artificial intelligence, and climate science.
Copyright © 2024 TAG Infosphere, Inc. This report may not be reproduced, distributed, or shared without TAG Infosphere’s written permission. The material in this report is comprised of the opinions of the TAG Infosphere analysts and is not to be interpreted as consisting of factual assertions. All warranties regarding the correctness, usefulness, accuracy, or completeness of this report are disclaimed herein.
Related Posts
The Johnson Controls Ransomware Attack – Impact and Key Insights Review
In September 2023, Johnson Controls International suffered a ransomware attack linked to the Dark Angels group, resulting in the theft of 27TB of sensitive data. The breach caused $27 million in losses and disrupted operations, highlighting the critical need for robust cybersecurity defenses.
The 2024 Vulnerability Crisis – Managing Cybersecurity Threats
Learn how organizations can meet the onslaught of cybersecurity vulnerabilities, along with five of the most common vulnerabilities and successful management strategies. Find out why there’s a new vulnerability every 17 minutes.
What is Data Loss Prevention? | A Complete Guide to DLP Security
Data is the most valuable asset today's businesses possess - and volumes are growing all the time. In this article we look at what data loss prevention means heading into 2025 and what should firms be doing to improve their capabilities?
BlackFog: Personal Liability Concerns Impact 70% of Cybersecurity Leaders
70% of cybersecurity leaders face personal liability concerns. Discover how it impacts governance, accountability, and cybersecurity practices.
Ongoing: New Ransomware Gangs in 2024
Ransomware gangs continue to break records and BlackFog will track all new ransomware gangs in 2024.
BlackCat Ransomware: What It Is and How to Defend Against It
Learn how to protect your business from BlackCat ransomware with essential insights, ransomware prevention tips, and actionable defense strategies to mitigate risk.