Dig enhances its platform to protect enterprise data in all storage environments
Dig has expanded the Dig Data Security Platform to protect data anywhere enterprises store sensitive information, including public cloud, software as a service (SaaS), database as a service (DBaaS) and on-premise environments.
Dig’s data security posture management (DSPM) and data detection and response (DDR) capabilities can now be deployed to protect data stored in Office365 as well as on-premises, making the Dig Data Security Platform the only DSPM solution to protect data anywhere it lives.
“The modern enterprise is on a journey to migrate their data processes to the cloud, but many must also retain on-premises components. This leads to a complex and fragmented toolchain that’s been extremely challenging to manage and secure–until now,” said Dan Benjamin, CEO, Dig Security.
“By extending our DSPM and DDR capabilities to on-prem environments, we’re equipping our customers with an unprecedented level of visibility and comprehensive data security–helping them safeguard sensitive information and avoid devastating attacks,” Benjamin added.
Dig Security’s latest update provides its users with:
- Single platform for enterprise data protection – Dig reduces tool bloat by combining disparate tools used to handle data security and compliance risks in the cloud (AWS, Azure, GCP, Snowflake); in SaaS (Office365); or on-premise (file shares). This benefits enterprises through consolidation and simplification of their data stores, uniform policy applications, and quicker response time.
- Ease of deployment and ongoing use – Dig is cloud native and entirely agentless, can be installed in minutes, and requires minimal permissions. Dig saves businesses months of evaluation and implementation of different tools, as well as maintaining complex toolchains; providing fast time to value overall.
- Higher level of coverage – Dig eliminates data blindspots across the entire data estate, cloud and on-prem. This reduces the risk of a potential calamity such as data exfiltration, ransomware, or compliance violations.
- Shorter time-to-detect and time-to-respond – Dig’s real time capabilities let businesses address incidents faster, allowing them to contain a breach or violation immediately, limiting its harm radius.