Bat Blue's Search Engine DLP Solution Secures Popular Google Services
March 29, 2012
By Calvin Azuri
, TMCnet Contributor
A new Search Engine Data Leakage Prevention (Search Engine DLP) solution from Bat Blue Networks which can address privacy concerns when using popular Google (News - Alert) services was recently introduced by the company. Some of the popular Google services which the solution will help in securing include Gmail collaboration system, Google Apps office suite, Google Search, Google+ Social Network, Picaso photo suite, Android (News - Alert) Mobile platform among a host of others services.
In a release, Babak Pasdar, President and CEO of Bat Blue Networks, said that, “Google, through the use of its various services, can build such an accurate profile of an individual or an organization's operations that we consider the use of Google an information security concern. As an organization charged with maintaining the privacy and integrity of our clients' information we are not comfortable with a third party that has this level of visibility, and thus have created a solution with significant Google internal controls.”
The Google approach allows it to keep a track of users and organizations simply through their specific identity. And because a substantial amount of data is retained by Google indefinitely, it is provided with unprecedented visibility into an individual's personal life or into the operations of an organization. Google categorizes and builds profiles on individuals and organizations which cannot be accessed by the average user. However, consumers and organizations remain largely unaware of the level of exposure points or impact.
Bat Blue's Cloud/Sec Search Engine DLP solution has been based on a number of advanced technologies which work together to hide the Google footprint of an organization without impacting the usage of these popular Google services. Google’s approach revolves around having multi-dimensional view of an organization’s operations or an individual's life. The Bat Blue solution effectively secures this approach by eliminating unnecessary dimensions via transparent granularly disabling access to hidden services.
Pasdar said that, “We've all seen a simple Google search translate into a deluge of targeted advertising from Google Ads. What happens when you search for a vulnerability that impacts your organization? Or research a new approach that is part of a competitive business strategy? Are you now broadcasting your exposure points or business direction? In the name of marketing, this information can be manipulated by others for competitive advantage or to wage targeted or mass attacks.”
Edited by Jennifer Russell