Mustafa to Focus on Prevention of Malicious Data Breaches, Which Account for 61 Percent of All Data Leaks
Moscow – DLP-Russia 2010 Conference – nexTier Networks, a leading provider of next-generation data leak prevention (DLP) solutions, today announced that CEO and co-founder, Tarique Mustafa, will be an invited guest speaker at the DLP-Russia 2010 Conference being held in Moscow on October 14-15, 2010. This exclusive conference is focused on all aspects of DLP, including its problems, issues and challenges. Mustafa will speak on 'Malicious Data Leak Prevention - Impact and Challenges for Business Processes.’
Recent surveys have shown that about 61 percent of data leaks are due to malicious intent. The data security industry, however, has typically focused on preventing accidental data leaks, thus limiting the usefulness of their DLP solutions. nexTier pioneered the concept of malicious DLP, and Mustafa introduced the company's groundbreaking algorithms and processes for protecting against malicious and purposeful data leaks and data theft in his presentation at the RSA Conference 2009.
"Malicious DLP is extremely difficult to prevent, and solving this problem required fundamental technological innovations,” said Mustafa. “We built our product line from the ground up around an identity- and role-driven DLP paradigm to address this all-encompassing issue. At the heart of nexTier's ability to protect against malicious DLP is our patented ontology-driven Semantic Analysis technology and Semantic-Security Correlation and Indexing (S2OREX) algorithms.”
nexTier provides a new class of DLP products designed to help small and mid-sized businesses (SMBs) mitigate data-security risks. The nexTier Compliance Enforcer family of turnkey appliances leverage nexTier’s powerful DLP algorithms with semantic DNA analysis for advanced accuracy, automated security policy management and compliance reporting in a single, centralized administrator’s console. As a result, companies can reduce data security and compliance administration and enforcement from weeks to just minutes while minimizing data breaches and internal malicious threats.
For more information: