Digital Shadows’ context-based security alerts expand sensitive doc management

New alerts will be part of SearchLight, Digital Shadows’ risk-detection platform

Today, Digital Shadows announced upgraded capabilities for its digital risk-protection platform, SearchLight, to help organizations protect sensitive data from unauthorized access and manipulation. 

SearchLight already alerts customers about potential sensitive document exposure before they become emergencies. SearchLight currently categorizes documents noted as “sensitive” because they include password-protection, encryption or words similar to “Private and confidential.” These documents may consist of company tax documents, payroll information and proprietary product designs. 

According to the press release, starting December 1, SearchLight will gain two new alerts: exposed technical documents (security assessments and product designs) and commercial documents (legal and payroll data). Plus, these documents won’t require protective markings to be identified as sensitive and associated with their organizations, thanks to new contextual analysis. 

The ability to consider a document’s context will also help customers understand an alert’s severity. In the case of a leaked technical document, the alert will indicate the compromised file is a product-related document and assign it a visible risk-prioritization score. Because a leaked technical document is extremely sensitive, it will attract a high-risk prioritization score.

Additional context within the alert will include when someone last viewed the document and if it’s still online. Clients can also use domain information and file metadata to identify the original misconfigured file store’s author and creation date.

"Every day more product designs, security assessments, and payroll data are exposed online – and organizations have no idea. We give them new visibility into this problem and provide the best ways to mitigate the risks," said Russell Bentley, VP of product at Digital Shadows.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

BEC scammers using Google Forms to identify easy victims
phishing

BEC scammers using Google Forms to identify easy victims

21 Jan 2021
Weekly threat roundup: SAP, Windows 10, Chrome
vulnerability

Weekly threat roundup: SAP, Windows 10, Chrome

21 Jan 2021
Biden nominees highlight tough cyber security challenges
cyber security

Biden nominees highlight tough cyber security challenges

20 Jan 2021
Report: Security staff excluded from app development
cyber security

Report: Security staff excluded from app development

20 Jan 2021

Most Popular

Citrix buys Slack competitor Wrike in record $2.25bn deal
collaboration

Citrix buys Slack competitor Wrike in record $2.25bn deal

19 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021
SolarWinds hackers hit Malwarebytes through Microsoft exploit
hacking

SolarWinds hackers hit Malwarebytes through Microsoft exploit

20 Jan 2021