sb-au logo
Story image

Loop Secure to provide Digital Guardian solution nationwide

31 Jul 2019

Loop Secure, a provider of cybersecurity solutions across Australia, and Digital Guardian have announced a partnership to deliver leading-edge data loss prevention (DLP) services to organisations looking to protect sensitive commercial data and IP.

“With the rise of global cybersecurity threats and a large increase in cybersecurity attacks on shore, Australian organisations require a data-centric approach to their cybersecurity solutions. Now, more than ever, is data protection and subsequent cybersecurity managed services crucial to maintaining balance in the cyber environment,” says Loop Secure chief executive officer Patrick Butler.

“By partnering with Digital Guardian, the Loop service team are able to offer more advanced protection for critical and non-mission critical data by providing oversight into data sources previously unnoticed in the network. The solution increases data visibility, increases IP protection and enhances compliance measures across items such as PCI DSS and the Australian Notifiable Data Breaches scheme.”

With a team of over 50 cybersecurity specialists across Australia, the Loop Secure team has seen major advances in cybersecurity technology in 30 years of operation and often incorporate the latest and most innovative technology in their cybersecurity managed services, offensive services and across governance, risk and compliance.

“We were attracted to the Digital Guardian value proposition due to their focus on the DLP category, which has enabled them to address the historical challenges of DLP through combining advanced behaviour analysis and with visibility and blocking controls for data on premise of in the cloud. This allows our cybersecurity experts to focus more on the movement of the data whilst avoiding the common pitfalls of DLP solutions. The fact that is a cloud-hosted is another bonus for our clients,” Butler says.

“As an organisation, we know that understanding and implementing an efficient DLP program is not just about the technology. Installing a tool can get you quick wins, but an efficient program is continuously improved and matured to ensure lasting success. This is one reason why we usually engage our consulting team to help clients develop their risk management, data classification and handling processes. Without these foundations, any data protection program is doomed to fail. 

“Further to this, we have realised that the problem often requires more than one technology, for example, many clients have strong potential through their existing Microsoft subscriptions, but lack the understanding of how to configure this effectively or incorporate this into a broader data protection capability.

“Our customer base in this area is growing and we’re consistently processing and understanding our customer data on how users, system and events interact with it to ensure protection. With the best of breed technology in our solutions, including Digital Guardian, we’re confident of successful threat detection and data protection for all of our clients,” adds Butler.

Download image
How rapidly evolving workforces can bring risk - and how to take it on
The times they are a-changing. Workforces, becoming more diverse, are changing too. Here's how this could be risky for businesses, and what actions could be taken to minimise that risk.More
Story image
Trend Micro sheds light on advanced attacks on IIoT environments
"As our research shows, there are multiple vectors now exposed to such threats, which could result in major financial and reputational damage for Industry 4.0 businesses."More
Story image
Interview: Thriving in lockdown - how a coding school in Vietnam beat the odds
It's March 10 2020, and CoderSchool in Ho Chi Minh just went entirely online. A success story followed - here's how a lockdown helped a school thrive.More
Story image
Why it’s critical to ensure your IoT doesn’t become a tangled web of vulnerability
Has your business found a use case for the Internet of Things (IoT) yet? If not, there’s a fair chance it’s already found you. More
Story image
How DDoS protection is like a car’s airbags
Just as someone would never remove the airbags from their car simply because they have never had a serious accident, so they should not cut back on cyber defences just because they hadn’t had a major attack in a while.More
Story image
Four tips for organisations to help future-proof their OT security strategy
IT and OT networks are founded on different and often conflicting priorities, making IT-OT security challenging for businesses. Only when the needs of both environments are thoroughly understood can digital convergence be successful.More