Logos Technologies to Introduce New Range of Data-Centric, Enterprise-Wide Security Tools at 2014 Cyber Security Summit in New York City
Axios will allow users to secure and monitor data in real time across public and private networks.
FAIRFAX, Va., Sept. 10, 2014 /PRNewswire/ -- In response to the increased incidence and severity of network security breaches in the U.S. and globally, Logos Technologies envisioned Axios, an integrated suite of cyber security tools designed to monitor and secure a company's valuable data.
To be debuted at the upcoming Cyber Security Summit in New York City, Sept. 18, Axios will allow organizations to monitor and track data usage with complete transparency across networks - private, public, and peer-to-peer (P2P). At the summit, Logos Technologies will also offer a limited number of free trials to eligible participants.
In 2013 alone, U.S. businesses suffered from more than 1,300 reported security breaches, with many thousands more not publicly disclosed. The cost of these incidents — reported and undisclosed — is estimated to be between $250 and $400 billion annually1. (To learn more, download our whitepaper.)
"Contrary to what many people think, less than 10 percent of data breaches are point-of-sale attacks like those suffered by major U.S. retailers in the past 12 months," said Timothy Calhoun, head of Logos Technologies' cybersecurity business and manager of the Axios product line. "The most costly breaches are those that target intellectual property and proprietary data, such as financial statements or product and business strategy. These less publicized but far too common events are precisely what Axios was designed to prevent."
Building on experience gained through its work with a range of government and intelligence community customers, Axios offers customers triple-layered protection with three key capabilities:
- Axios Data Loss Prevention: Axios offers a high-speed data-loss protection (DLP) capability that enables organizations to monitor data — both in motion and at rest — across their network in real time. By creating an exact fingerprint of each document, Axios allows the file to be identified and isolated as a forensic copy. This helps inform organizations where sensitive data is located, where it is going, who is sending it and how it is getting there, while also preventing it from leaving approved network locations.
- Axios Data Protection: Axios allows user to embed a cryptographic token into Microsoft® and other popular software documents. This enables organizations to track a variety of metrics, such as who is consuming (reading) the data, the amount of time a user has interacted with the data, and most importantly, who is transferring sensitive content to a generic data source, possibly to avoid detection.
- Axios Data Discovery: Axios gives users the ability to scan the deep web's peer-to-peer (P2P) network to find leaked data. P2P exchanges account for about 70 percent of all Internet activity (compared to 10 percent for the World Wide Web), but the majority of P2P activity is hidden and difficult to track with traditional search methods. This capability enables organizations to use conventional key-word searches to scan the deep web for leaked information in order to determine whether networks have been compromised and if data has been exposed.
"Axios ensures companies are in control of their data, allowing them to learn behaviors across their network and identify anomalies before they become a critical security concern," Calhoun continued. "With Axios, companies can create a forensic storyline that enables them to monitor and track their data within their own infrastructure and help locate it on the Internet if a data loss occurs. Whether it's the action of a rogue insider or an external actor, data is always the target. By focusing on this element, Axios' data-centric approach can alert companies before expensive breaches occur."
Logos Technologies and its partners will be offering a select group of participants at the upcoming Cyber Security Summit a free 30-day trial of the Axios suite. To find out if your organization qualifies, register at www.logos-technologies.com/Axios or visit booth 164 at the conference.
The Cyber Security Summit will be held Sept. 18 at the New York City Hilton hotel, 1335 Sixth Ave., New York, NY. For more information, or to register, visit http://www.cybersummitusa.com/register/
About Logos Technologies
Founded in 1996, Logos Technologies LLC, is a diversified science, engineering and technology company specializing in the fields of advanced sensors, wide area motion imagery, cyber operations, advanced analytics and processing of large, multisource datasets. Logos serves government customers including the Department of Defense, Department of Energy and Department of Homeland Security, as well as a range of customers in commercial and international markets. Learn more at www.logos-technologies.com
Media Contact:
Susan Kerin
Communications Director
Email
703-237-6550
1 Source: 2014 Verizon Data Breach Investigations Report
SOURCE Logos Technologies
WANT YOUR COMPANY'S NEWS FEATURED ON PRNEWSWIRE.COM?
Newsrooms &
Influencers
Digital Media
Outlets
Journalists
Opted In
Share this article