sb-au logo
Story image

Loop Secure to provide Digital Guardian solution nationwide

31 Jul 2019

Loop Secure, a provider of cybersecurity solutions across Australia, and Digital Guardian have announced a partnership to deliver leading-edge data loss prevention (DLP) services to organisations looking to protect sensitive commercial data and IP.

“With the rise of global cybersecurity threats and a large increase in cybersecurity attacks on shore, Australian organisations require a data-centric approach to their cybersecurity solutions. Now, more than ever, is data protection and subsequent cybersecurity managed services crucial to maintaining balance in the cyber environment,” says Loop Secure chief executive officer Patrick Butler.

“By partnering with Digital Guardian, the Loop service team are able to offer more advanced protection for critical and non-mission critical data by providing oversight into data sources previously unnoticed in the network. The solution increases data visibility, increases IP protection and enhances compliance measures across items such as PCI DSS and the Australian Notifiable Data Breaches scheme.”

With a team of over 50 cybersecurity specialists across Australia, the Loop Secure team has seen major advances in cybersecurity technology in 30 years of operation and often incorporate the latest and most innovative technology in their cybersecurity managed services, offensive services and across governance, risk and compliance.

“We were attracted to the Digital Guardian value proposition due to their focus on the DLP category, which has enabled them to address the historical challenges of DLP through combining advanced behaviour analysis and with visibility and blocking controls for data on premise of in the cloud. This allows our cybersecurity experts to focus more on the movement of the data whilst avoiding the common pitfalls of DLP solutions. The fact that is a cloud-hosted is another bonus for our clients,” Butler says.

“As an organisation, we know that understanding and implementing an efficient DLP program is not just about the technology. Installing a tool can get you quick wins, but an efficient program is continuously improved and matured to ensure lasting success. This is one reason why we usually engage our consulting team to help clients develop their risk management, data classification and handling processes. Without these foundations, any data protection program is doomed to fail. 

“Further to this, we have realised that the problem often requires more than one technology, for example, many clients have strong potential through their existing Microsoft subscriptions, but lack the understanding of how to configure this effectively or incorporate this into a broader data protection capability.

“Our customer base in this area is growing and we’re consistently processing and understanding our customer data on how users, system and events interact with it to ensure protection. With the best of breed technology in our solutions, including Digital Guardian, we’re confident of successful threat detection and data protection for all of our clients,” adds Butler.

Story image
Reports suggest spike in vaccine-related phishing campaigns
According to new research from Check Point, the primary attack delivery method is email, constituting 82% of all attack vectors for malicious files in the last month.More
Link image
Rapid response: The best way to detect and respond to traffic anomalies
Metadata is a must-have security practice that allows analysts to parse through more devices, more communications and more data in less time.More
Story image
Video: 10 Minute IT Jams – Who is Claroty?
Its focus is on simplifying OT availability, reliability, and safety for a more secure working environment – without requiring downtime or dedicated teams.More
Download image
Why there's a huge push for NFV in today's enterprises
To help networking and IT professionals better understand the opportunities and challenges associated with deploying NFV technology, new research based on responses from more than 1,300 IT and networking professionals from around the world is now available. More
Story image
Cyber-attacks thrust IT compliance to the top of the business agenda
If an organisation is running on the cloud, its ecosystem has to be compliant with industry standards and frameworks. Here are some tips on how to ensure compliance processes are fit for purpose.More
Story image
Internet outages drastically increased during COVID-19 lockdowns, report finds
Global internet disruptions increased 63% in March, with internet service providers hit the hardest. This is according to the 2020 Internet Performance Report from ThousandEyes, the internet and cloud intelligence company.More