Dig­i­tal Shad­ows an­nounces in­dus­try's broad­est ever dig­i­tal risk cov­er­age

Kuwait Times - - TECHNOLOGY -

Dig­i­tal Shad­ows, the in­dus­try leader in dig­i­tal risk man­age­ment, yes­ter­day an­nounced com­pre­hen­sive en­hance­ments of its award-win­ning SearchLight so­lu­tion's dark web cov­er­age ca­pa­bil­i­ties with a fo­cus on scal­able data an­a­lyt­ics plus human led data col­lec­tion and con­tex­tual in­ter­ac­tion to best pro­tect an or­ga­ni­za­tion's busi­ness, brand, and rep­u­ta­tion.

Start­ing to­day, with con­tin­u­ous cov­er­age up­dates added daily, Dig­i­tal Shad­ows SearchLight(tm) has sig­nif­i­cantly ex­panded its au­to­mated dark web col­lec­tion ca­pa­bil­i­ties, com­ple­mented by human data sci­en­tist sup­port to mon­i­tor, man­age, and pro­tect or­ga­ni­za­tions against threats as­so­ci­ated with fo­rums and mar­ket­places across the open, deep, and dark web.

Or­ga­ni­za­tions can now eas­ily see many dark web in­ci­dents, with con­text, as they hap­pen, wher­ever they hap­pen. With these en­hance­ments, cus­tomers will be quickly no­ti­fied that they are at risk and in­tel will be shared with an up-to-date list of posts in the of­fend­ing threads with key con­tex­tual in­for­ma­tion on each fo­rum user. Within mar­ket­places, risky prod­uct list­ings will be flagged and key in­for­ma­tion will be dis­played about the sell­ers' rep­u­ta­tion.

When it comes to closed sources on the open, deep and dark web, au­to­mated col­lec­tion alone is in­suf­fi­cient. Dig­i­tal Shad­ows rec­og­nizes it is crit­i­cal to com­ple­ment au­to­ma­tion with a team of data sci­en­tists and in­tel­li­gence ex­perts who gain ac­cess to closed sources, and qual­ify the data col­lected to en­hance an­a­lytic ca­pa­bil­i­ties. This gives cus­tomers the full breadth and con­text needed to ad­dress the dig­i­tal risks that are most rel­e­vant and im­pact­ful to their busi­ness. Au­to­ma­tion in dig­i­tal risk man­age­ment alone is not enough, as it can­not col­lect ev­ery­thing, and can lead to an un­man­age­able level of false pos­i­tives.

"The threat in­tel­li­gence com­po­nent of dig­i­tal risk man­age­ment is all about giv­ing or­ga­ni­za­tions the in­sight to mon­i­tor, man­age and pro­tect against threats no mat­ter where they are com­ing from. Ven­dors that only fo­cus on the dark web don't pro­vide a com­pre­hen­sive un­der­stand­ing of risk and open their cus­tomers up to blindspots," said Rick Hol­land, VP Strat­egy at Dig­i­tal Shad­ows. "De­fense in Depth', the pop­u­lar se­cu­rity mantra, is in­creas­ingly giv­ing way to Ex­pense in Depth as CISOs strug­gle to man­age the dis­parate data com­ing from an over­whelm­ing num­ber of point so­lu­tions. Se­cu­rity pro­fes­sion­als need com­pre­hen­sive se­cu­rity so­lu­tions that con­sol­i­date and pro­vide con­text across their dig­i­tal risks without adding ad­di­tional com­plex­ity and costs" Hol­land said.

Dig­i­tal Shad­ows was re­cently rec­og­nized as a leader in the The For­rester Wave(tm): Dig­i­tal Risk Mon­i­tor­ing, Q3 2016 . In April, a re­port by For­rester's Se­nior An­a­lyst Josh Zelo­nis en­ti­tled Achieve Early Suc­cess In Threat In­tel­li­gence With The Right Col­lec­tion Strat­egy stated that "the value of threat in­tel­li­gence only be­comes ap­par­ent when you're de­vel­op­ing a col­lec­tion strat­egy based on strate­gic in­tel­li­gence." A col­lec­tion strat­egy that is only fo­cused on dark web sources falls short and doesn't pro­vide the com­plete picture in­clud­ing the strate­gic in­tel­li­gence that or­ga­ni­za­tions need.

Newspapers in English

Newspapers from Kuwait

© PressReader. All rights reserved.