Define: Leakage (machine learning)?
In statistics and machine learning, leakage is the use of information in the model training process which would not be expected to be available at prediction time, causing the predictive scores (metrics) to overestimate the model’s utility when run in a production environment.
Top Data Leakage Companies and Solutions
This article showcases Threat.Technology’s top picks for the best Data Leakage solutions. We selected these companies for exceptional performance in one of these categories:
- Innovative ideas
- Innovative route to market
- Innovative product
- Exceptional growth
- Exceptional growth strategy
- Societal impact
Ensighten is a comprehensive website security company, offering next generation client-side protection against data loss, ad injection and intrusion. Through the Ensighten MarSecTM solution, organizations can assess privacy risk and stop unauthorized leakage or theft of data, as well as comply with the CCPA, GDPR and other global data privacy regulations.
The MarSecTM platform protects some of the largest brands in the world from data leakage whilst ensuring maximum web page performance.. .
SecurityAdvisor provides personalized, contextual, and real-time security awareness coaching to end-users by leveraging and integrating with existing technologies customers have already invested in like endpoint or cloud or email or web security tools and extract context from these tools about the risks faced by these individual users. Its main focus is around delivering measurable security outcomes like reducing the percentage of users who get infected on the endpoint every month or the average spam/email malware received by risky users or reducing data leakage incidents.
SecurityAdvisor achieves these outcomes by engaging with risky users and publish a monthly outcomes and cyber risk reduction report.. .
Sophos is a leader in IT security and data protection. They offer organizations complete protection and control — defending against known and unknown malware, spyware, intrusions, unwanted applications, spam, policy abuse and data leakage, and providing comprehensive network access control (NAC).
Their reliably engineered, easy-to-operate products protect over 100 million users in more than 150 countries. Their vision, commitment to research and development, and rigorous attention to quality have enabled them to maintain strong year-on-year growth and the highest levels of customer satisfaction in the industry..
EdgeWave (formerly St. Bernard Software, Inc.), a software development company, engages in the design, development, and marketing of Internet security appliances and service.
It offers secure content management and policy compliance solutions. The company’s solutions enable its customers to manage their employee usage policy for Internet access, email, and instant messaging.
Its products include iPrism, a Web content filtering appliance that enables organizations to enforce Internet use policies by providing multi-protocol Web filtering and access control; iPrism Enterprise Reporting Server, a non-filtering appliance that enables organizations to aggregate user activity reporting and archiving across multiple iPrism appliance deployments in one centrally managed reporting solution. The company products also consist of OEM Software Development Kit that allows the OEM partners the ability to leverage the Web filtering database; and ePrism, an email filtering and content inspection appliance, which protects against spam, viruses, and other unwanted email content, and against outbound data leakage through message content and attachment inspection and policy enforcement.
EdgeWave offers its products through distributors, dealers, and original equipment manufacturers, as well as through direct sales channels to network managers, directors, and administrators in enterprises, educational institutions, small and medium businesses, and government agencies worldwide. The company is headquartered in San Diego, California..
Leagsoft is the world’s leading leader in network access control and information leakage prevention. As the earliest group of high-tech information security companies in China, since its establishment, Liansoft has always focused on the research and development of enterprise information security technology and the design and development of product solutions.
It is an information security manufacturer in China that can compete with similar foreign products. After 11 years of continuous efforts, the company’s own brand, LeagView, has developed into a network with access control, terminal security management, business data leakage prevention, network data exchange, integrated system monitoring, service desk, document permission management, asset maintenance management.
Mach 1 Development
Mach 1 delivers hardware and software solutions that observe, track and analyze the components and data movement of your network. Synthesizing this data in an intuitive Graphical User Interface, we empower the customer to better secure their network and high value information from insider threats and security compliance issues.
DocuTRACER® is Mach 1’s flagship product that addresses issues caused by an insider threat that is becoming more serious every day. DocuTRACER® is built to defeat the insider threat and protect your valuable data as it moves within your network, while increasing situational awareness so that enterprises can better secure their networks, enforce security policies, and stop insider threats and data leakage (both inadvertent and malicious).
Mach 1 offers two additional asset tracking and security solutions. IN®ID is a RFID tracking and information bracelet or badge system for the healthcare, law enforcement, event management and correctional facilities industry.
Second is the e-Seal, a secure RFID/electronic cryptographic locking and tracking system for intermodal transportation containers or tankers that aids in logistics management and maintain a higher level of security than is available today.. .
Mezzobit’s audience optimization platform enables first-party publishers and marketers to regain control of their audience data, while improving the efficiency of web/mobile data collection and sharing. The Mezzobit platform addresses data leakage control, privacy management, spider/bot protection, and ultimately mobile data collection, built on the foundation of an advanced tag management system that is offered for free for websites of all sizes.
An independent non-profit affiliate, DataNeutrality.org, sets the data management rules for Mezzobit and provides continuous compliance and reporting back to customers. This “closed loop” data and privacy management solution creates a level of transparency and accountability that should be required of any partner handling key enterprise data..
Virtual Computer is a venture-backed software company in the Boston area that develops intelligent desktop virtualization solutions. It’s flagship product, NxTop, combines centralized management with local execution on an enhanced Xen-based type-1 hypervisor that runs directly on end-user devices, delivering native performance and mobility.
By running the workload on the PC, Virtual Computer enables companies to have centralized management without servers, storage, and networking required for server-hosted VDI. The technology supports shared image management, enabling an IT professional to manage thousands of desktops and laptops the same way that they would manage one.
In March 2011, Virtual Computer announced its collaboration with Lenovo to optimize Virtual Computer’s NxTop client virtualization and management solution on Lenovo’s business-oriented systems. These include select models of Lenovo’s ThinkCentre A and M series desktops and ThinkPad T and X series laptops.
Centralized Virtual Desktop Management One-to-many Provisioning. NxTop provides a central console for all desktop management activities.
IT teams create and maintain a single virtual machine per operating system that can be published to thousands of users. User-specific personality, data, settings and applications are applied dynamically at each endpoint.
Scalable Patching with Rollback. Patches and updates are applied on a one-to-many basis.
Coronet SecureCloud is the only platform that secures the entire SaaS chain. From the user, through the device used, through the network, all the way to the SaaS/Cloud services themselves.
– SecureCloud is an end to end platform, there is no need to buy, integrate and manage multiple platforms, dramatically reducing TCO. – It is the only fully autonomous cloud security platform, detecting and mitigating threats without IT-Sec involvement, dramatically reducing staffing needs.
– SecureCloud is cloud Based: No hardware, nothing to install on premises, up and running in minutes – SecureCloud is the only platform that provides autonomous cross dimension response: Detect a risk in one area (e.g. Malicious network) and mitigate in another (e.g.
block access to Office365). .
Advenica is a leading European provider of cybersecurity. Advenica develops, manufactures and sells advanced cybersecurity solutions that prevent intrusions, theft and data leakage at information exchanges.
With future-safe and sustainable solutions, Advenica enable companies and organisations to take digital responsibility.. .
GeoEdge (www.geoedge.com) is the premier provider of ad security and verification solutions for the online and mobile advertising ecosystem. The company ensures high ad quality and verifies that sites and apps offer a clean, safe, and engaging user experience.
GeoEdge guards against malware (malvertising), non-compliance, inappropriate content, data leakage, operational, and performance issues. Leading publishers, ad platforms, exchanges, and networks rely on GeoEdge’s automated ad verification solutions to monitor and protect their ad inventory.
To find out how GeoEdge can enhance your quality assurance and verify your online and mobile campaigns, head to www.geoedge.com. .
The DeepBrain Chain is also a secure data trading platform that allows both parties to not worry about data leakage or reselling. Blockchain technology is used to realize the explicit separation of data ownership and data usage rights.
Thus, the value of data will be promoted greatly.. .
Mobiwol is an Android firewall that monitors and controls all data connections initiated by applications. It prevents data leakage, manages data limits, and increases battery uptime.
Mobiwol was founded in April 2015 and is based in Tel Aviv, Israel.. .
NetWitness Corporation provides network security monitoring software products for commercial and government organizations in the United Kingdom and internationally. It offers network content analysis methods, risk verification and determination methods, incident response, data leakage and content monitoring, and compliance services.
The company’s products include NetWitness NextGen, a network security monitoring solution to solve various network and security problems, including insider threat management, data leakage protections, compliance verifications, malware activity detections, zero-day detections, network performance management, and network-based e-discovery, as well as data governance, risk, and compliance management verifications; and a NextGen enterprise network forensics and advanced threat intelligence platform for security experts in various enterprises. It also provides infrastructure products, such as Investigator, an interactive software application that provides contextual analysis of captured network data; Informer, an automated reporting engine of the NetWitness NextGen product suite; Decoder, a component of an enterprise-wide network data recording solution; Concentrator, which is used to aggregate clusters of decoders in real-time for enterprise-wide analysis of network; and API/SDK, an open programming interface that leverages the NetWitness NextGen record once/re-use many times network capture infrastructure.
In addition, the company offers SIEMLink, a solution for translating security event data between Web-based consoles, such as security event and information management systems, and network and system management programs. It primarily serves defense organizations, financial services companies, national law enforcement and intelligence agencies, and banks.
NetWitness Corporation has a strategic partnership with Phoenix Datacom, Ltd. The company was incorporated in 2006 and is based in Herndon, Virginia..
Fiberlink Communications Corporation provides mobility as a service (MaaS) that helps enterprises to connect, control, and secure laptops and mobile devices. Its MaaS Platform helps mobile workers to connect to the Internet and the applications and data they need.
The company’s MaaS platform is used to perform identity management and authentication services; deploy, monitor, and manage security and connectivity applications on laptops and PCs; view information on compliance status, security events, and connectivity costs; and protect mobile devices and the data from loss, theft, data leakage, hackers, and viruses. Its MaaS360 mobility platform manages security and connectivity services on mobile and remote devices, as well as helps administrators to deploy, monitor, update, and remediate various endpoint security and connectivity applications..
DeepView protects companies from data leakage by staff. Real time alerts to public data leaks and opt-in encrypted channel recording make personal devices in the workplace safer.
DeepView’s unrivalled, patent pending technology and AI algorithm is built to read photos. It is the only solution that allows companies to manage data leakage from photos, videos and text shared by employees.
Thereby protecting companies from inadvertent and intentional data leaks. The advanced, slick encryption recording is the only solution to meet GDPR and MiFID II standards.
The platform instantly notifies you to confidential company data being shared for immediate action. Whilst also recording and archiving all business communications across current and emerging social channels..
Marble’s mobile app risk management service enables enterprises to detect and control apps with malicious and privacy-leaking behaviors that frequently lead to advanced persistent threats (APTs), spear phishing attacks on employees, and other information security risks. The Marble service combines comprehensive, correlated threat intelligence across multiple data sources with an adaptive scoring engine that produces dynamic app risk scores for Android and iOS apps.
Marble’s research and response team of analysts, developers and cybercrime specialists have analyzed millions of Android and iOS apps, testing for risky and dangerous behaviors including malware, spyware, data leakage and apps that take users to phishing sites, or communicate with botnet command and control servers. Marble can provide data feeds, formatted reports, or can integrate directly with mobile device management (MDM) or enterprise mobile management (EMM) solutions, providing granular risk control for bring-your-own-device (BYOD) programs.
The company was founded in 2005 and is based in Menlo Park, California.. .
BorderWare Technologies is a email and Web secure content and threat management platform provider for mid-sized enterprises, government and service providers alike, protecting these organizations from inbound threats and outbound data leakage. The BorderWare Security Platform provides correlated and consolidated email and Web threat prevention, data loss prevention and administration in an easy-to-use, high-performance and single appliance.
BorderWare has strategic alliances with Ericsson, F5 Networks, Kaspersky Labs, McAfee, Cisco, Sun Microsystems, and Symantec. The company was founded in 1994 and is headquartered in Mississauga, Canada.
It has additional offices in Dallas, London, Singapore, and Stockholm.. .
Renaissance is Ireland’s Premier IT security distributor and leading independent business continuity consultancy provider. Renaissance accredit and train re-sellers on their vendor’s products and work with them every step of the way.
This ensures that Their partners get top quality service and support and in return can offer this to their customers and clients. They guide your business through the data security and compliance landscape.
This covers cyber security issues, such as Data Leakage, Virus and Malware threats as well as Mail and Web borne threats. This ensures that their partners can improve their profitability, add value for their customers and grow their business..
CloudMe provides the European sync and cloud storage service (SaaS) for small and medium businesses (SMB), and consumers – with a user experience comparable to Dropbox and iCloud. An independent cloud service without US surveillance.
Its founders sold iCloud to Apple. The service allow IT administrators to get control over all data synced by employees’ computers and mobile devices, thereby allowing companies to make sure their mobiles are not synced with iCloud or Google – stopping potential data leakage and surveillance for businesses outside the US.
This is very important for all European businesses that need legal compliance with the EU Data Protection Act, which have made all use of US services for personal data illegal since the 1st of February 2016 (after the dismissal of the Safe Harbor Act). In addition to its US competition, CloudMe offers the following distinctive features; client-side encryption, syncing of multiple folders, offloading content to the cloud that will not be synced, accessing CloudMe as a network hard drive (without syncing), and a common central storage for company files.
The vision for CloudMe is to become the internet file system, removing the need for people to have and manage physical hard drives, to become the repository for Internet-of-Things (IoT), and the central storage point for online services and online identity. The 4th independent ecosystem, the only ecosystem outside the US, offering an European alternative to iCloud, Google and Microsoft for everyone outside the US..
Safend provides Data Leakage Prevention solutions for enterprise endpoints. The company’s DLP solution â€œSafend Data Protection Suiteâ€ protects enterprises against endpoint data loss, misuse and theft through its single server, single management console, single agent architecture Its modular components can transparently encrypt internal hard drives (Safend Encryptor); granularly control ports and devices and encrypt external media (Safend Protector); inspect, classify and block leakage of sensitive content through email, web, external storage and other channels (Safend Inspector); map, classify and locate sensitive data stored on organizational endpoints (Safend Discoverer); Generate detailed graphical reports for compliance assessment (Safend Reporter); quickly and non intrusively audit endpoints for past and present connected devices and WiFi networks (Safend Auditor).
Safend’s solution is deployed by security aware enterprises, governmental agencies and SMBs. The company serves Federal, State and Local Government, Healthcare, Finance and retail organizations across the globe and helps them comply with industry and national regulations such as HIPAA, PCI, SOX and multiple privacy regulations.
It sells its products internationally through resellers and partners.. .
Cylent Security is a network security company that brings users to a security approach for mobile phones and cellular devices. The complete providing true BYOD enterprise security overlay network over any cellular network infrastructure.
A first of its kind protection from Cyberattacks, Data leakage and Interceptions that can fit into existing industries such as Enterprise Mobility, Critical Infrastructure, IoT and Connected cars, without any software installed. Cylent Security developing the Sparrow, a tiny, patent-pending security device designed to automatically protect all cellular devices against cyberattacks and data leakages, providing enterprise organizations and employees with protection far beyond that provided by today’s software options.
The Sparrow’s installation-free solution protects an organization’s data without interrupting the way that employees use their private phones. Cylent Security was founded in 2016 and is based in Tel Aviv, Israel..
SkyRecon Systems SA design and develops system and data security solutions. Its StormShield Unified Endpoint Protection solution provides data leakage and theft protection, system attack and intrusion prevention, integrated device control, data encryption, application control, system firewall, wireless security, anti-virus/-spyware, and network access control solutions for laptops, desktops, and servers running the Windows operating system.
The company was founded in 2003 and is headquartered in Paris, France with additional offices in San Jose, California; and London, the United Kingdom. As of November 12, 2009, SkyRecon Systems SA operates as a subsidiary of Arkoon Network Security..
Based in France’s innovation hub Sophia Antipolis, BlackBoxSecu® provides security solutions against phone tapping and eavesdropping for audio communication systems (smart phones, fixed lines, VoIP and radios). BlackBoxSecu develops its encrypted voice military grade products in order to fight against snooping and industrial secrets and data leakage.
BlackBoxSecu’s response is positioned as the reference for private and professional security solution for large companies, governments, executives, lawyers, and VIPs. With the growing insecurity and the need to protect their private lives, BlackBoxSecu offers both ease of use and cryptography technologies efficiency to ensure confidentiality of communications for sensitive or strategic information (professional or personal).
The company has been awarded the Innovation Award of Special Forces SOFINS 2017, Trophées de la Sécurité 2017 (Bronze medal) in France and has been selected by Village by CA (Crédit Agricole).. .
Founded in 2004, Breach Security, Inc. was the leading provider of real-time, continuous web application integrity and security that protects sensitive web-based information.
Breach Security products protected web applications from hacking attacks and data leakage, and ensure applications operate as intended. Breach Security was acquired by Trustwave Holdings, Inc..
Abacus Systems reduces operational risk, develops robust business processes with risk-free solutions to protect their customers businesses from issues such as; data loss, data leakage, skills shortages, energy waste, overloaded legacy systems, and, ultimately, the failure of business processes. With leading technical expertise and practical management skills, Abacus Systems is your partner of choice for technology solutions.
As a leading provider of quality services and products, combined with a proven record,they always aim to exceed their clients’ expectations when addressing their IT challenges.. .
Privacy & Cookies
Organisations must rethink privacy. Why? Because Brands must focus on the value of trust and earn consent; more so following Data Protection Authorities (DPAs) recent clarifications of the regulation and now that enforcement has begun against a number of the 89% of websites that are non-compliant.
How can so many be non-compliant? -The lack of clarity has been taken advantage of by some – blatantly ignored by others. -The majority of Consent Management Platforms (CMP) services fail to ensure consent – despite vendor promises.
-Brands (websites) have failed to respect privacy, consent has largely been forced. -An inconsistent, inefficient approach to deployment of cookie services / CMPs.
About Privacy & Cookies | rethinking privacy. We offer a proven, compliance-led Consent Management Platform that is focused on gaining visitor trust and earning consent.
Our automation removes inconsistency and offers secure, efficient, fully scalable deployment. P&Cs clients include the world’s largest single deployment with thousands of websites in more than one hundred countries.
Our Consent Management Platform (CMP) Our SaaS supports the journey to legal compliance, combat data leakage and improve site performance. We have automated the assessment of sites for cookies, categorising and deploying country specific consent management and monitoring to ensure ongoing compliance.
Founded in 2011, WiseSec is a privately-held company, committed to redefining the future of indoor location-based mobile consumer experiences. Based on its patent-pending technology, WiseSec develops markets and deploys advanced mobile platform indoor location solutions for the security, defense and retail industries.
Their products and solutions includes: – CelluSec – Indoor location-based mobile security policy for data leakage prevention in restricted facilities. – WiseBy – Indoor location-based mobile consumer experiences, including indoor navigation, micro-location coupons and promotions, personalized check in/out messages, NFC-like payment experience and a full dashboard of indoor traffic patterns and statistics..
Trinity Future-In Pvt. Ltd.
We Secure your Digital World. We protect any information from duplication using our unique copy protection technology.
We have a wide array of patented products and expertise in providing solutions to protect IP. We develop new technologies to enhance security, copyright protection and product ownership for industries dealing with Information Technology, Tele-Communications, Computer and Online security, for Audio and Video products and for the Digital Entertainment industries..
MyDLP is the sole open source solution in the market which provides network and end point information leak detection and prevention capabilities. With MyDLP, you can filter data transfers on HTTP, FTP, e-mail and USB Flash drives against data leakage.
Target customers for MyDLP are organisations that demands a cost effective and complete DLP solution.. .
SecureWave provides endpoint security software solutions. The company offers desktop security, data leakage prevention, malware protection, IT system health maintenance, and compliance solutions.
It provides Sanctuary, an endpoint security solution to manage, monitor, and control applications and devices on the corporate network, as well as secures organizations from known and unknown data threats. The company serves financial, government, healthcare, education, manufacturing, and legal sectors.
It offers its products through a network of reseller and service provider partners.. .
Hangzhou Huato Software
Hangzhou Huato Software (杭州华途软件) is a provider of data leakage-proof (DLP) products, solutions, and security services for data encryption, file security, and other needs. Founded in 2007, Huato Software has become the leading professional information security software company with completely independent intellectual property rights domestically.
Huato Software is committed to providing document information E2E security solutions for customers, whose products and solutions are widely used in government, energy, research and development, design, automotive, medical, manufacturing, and other major industries. Its service networks spread throughout more than 30 provinces, municipalities, and autonomous regions in the country and a nationwide “”24-hour response”” service system is established..
IPV Security is focused in Information Security and Cyber Security consulting services combining security risk analysis with leading security audit & assessment solutions integrated into a unique, unified and innovative Business-Centric Security Analysis Services. IPV’s top-down approach “the 3rd generation of security risk analysis” assists enterprises protect critical information and business assets and ensure network security by pro-actively addressing the top critical issues; thus preventing costly data leakage, downtime and loss of reputation.
IPV Security offers a unique and innovative holistic approach to security risks audit & assessment by both mapping and pinpointing the security risks within the corporate IT network as well as by focusing on business aspects & contexts.. .
Sinnott Wolach Technology Group
Sinnott Wolach Technology Group (SWTG) is a leading provider of Next-Generation Network and Information Security Solutions & Services. Through partnerships with leading technology providers — they offer solutions for high-level network monitoring and deep packet inspection as well as solutions for Network Access Control, WAN Optimization, Vulnerability & Threat Monitoring, Monitor & Block Data Leakage, and Endpoint Security.
They provide solutions to Fortune 1000 companies, State & Local Government Agencies, as well as many small / medium business organizations throughout Florida. The company was founded as MS Networks in 2000, expanded in 2006 and changed its name to Sinnott Wolach Technology Group, Inc..
Nucleuz Inc is a privately owned and operated company which focuses on Data Leakage Protection, Information Protection, and Compliance in all environments. They specialize in providing DLP Policies and Rules for Microsoft Exchange and Microsoft Outlook.
Their products are available for on-premise mail servers, Microsoft O365, and companies utilizing an Exchange hosting provider. Nucleuz Inc is founded by a team who designed and developed Microsoft’s Data Loss Prevention (DLP) solution for Office & Exchange 2013 and Office 365..
This article was written by Benjamin Skute from Threat.Technology. The editor for this article was Tess Page. If your company is featured in this article and you want to have amendments made please contact us on: [email protected].
Alternatively you may write to us at: Threat.Technology/Fupping Ltd, First Floor, 61-63 Rochester Pl, London NW1 9JU.