As Broadcom CIO Ken Venner tells it, several years back his company urgently needed an enterprise-wide security solution. The company, a global leader in semiconductors, had suffered some serious data leaks – from its own employees.
Trusted staffers had taken key intellectual property with them when they left the company. It’s every CIO’s worst nightmare: to spend vast energy protecting against external threats, only to face a deep threat from within.
“The people you fear the most are the people you trust the most,” Venner tells me.
Action was required. To take full control of dataflow, Venner needed a rock-solid security solution that addressed both internal and external threats. The solution, he explains, had to “be able to track, manage, understand, report, do post-analysis and trending, [monitoring] what is IP, where is IP going, who’s had IP, and does anyone go after, take, or steal IP?”
Furthermore, given that many employees work on laptops, the solution had to be geared for the individual rather than the data. Upping the challenge, in a single day a sensitive document might visit a half-dozen digital mediums. What solution could supervise all these transactions?
Venner chose Digital Guardian, by Verdasys. The security solution recently won a Datamation Product of the Year Award in the Enterprise Security category. (The other nominees were Code Green Networks, Data Domain DD580 Appliance, Kazeon Information Server IS1200-ECS, Bluesocket v6.1 software platform, and nuBridges Secure Transaction Manager.)
The Digital Guardian platform touts itself as a veritable octopus of data control. It handles file and mail encryption, content inspection, context management, application logging and masking, and other sensitive tasks.
Once Venner began using Digital Guardian’s monitoring and control capabilities, security at Broadcom improved. “I could actually control what was IP, how it was flowing, who could do what with it, could you copy and paste, could you transfer, could you email it, those kinds of activities.”
Adaptive Encryption
Broadcom recently upgraded to the Digital Guardian 5.0 platform; this platform’s adaptive encryption capability is of particular interest to Venner. (Adaptive encryption encrypts and decrypts files selectively and automatically based on data context, rather than using a “one size fits all” approach.)
Venner explains the value of adaptive encryption: “By default our policy is if you copy a file to an external USB drive, we will encrypt it so that only other Broadcom PCs can read it, unless we capture information around why you’re passing it in an unencrypted fashion.”
“We’re also thinking of using adaptive encryption to control certain files that are tagged appropriately, so that they’re always stored on your laptop or desktop, raw in an encrypted format. Every time that document flows, it flows as an encrypted object, never becoming unencrypted in an unprotected space. Even though we’re implementing disk encryption technology, this would be even a layer on top of that for IP protection.”
This heavy-duty encryption method would protect data that Venner calls the “crown jewels of the organization,” information so sensitive that only a tiny cadre should be viewing it.
“And if anyone was to steal their device, you hope [the employee] started an encrypted directory on the machine so they couldn’t get to it. But even if they could hack the encrypted directory, it has a second layer of encryption to ensure that they could never get to the file.”
Security Policy Implementation Engine
The rationale behind the development of Digital Guardian, says Verdasys president Nick Stamos, is that companies need a centralized encryption platform that implements company policies. So the DG solution is not DRM-based (because DRM methods are proprietary, so if the provider goes out of business it’s a problem). And it’s not disc based (because if someone steals your machine, the default mode is decrypt).
Instead, Digital Guardian is what Stamos calls a “security policy implementation engine.”
“With DG, before it actually decrypts the file, it takes into account: what’s the document classification? And, based on who you are, what are you allowed to do or not do with that particular document?”
The focus is on a comprehensive solution that handles every data transfer scenario. And significantly, DG doesn’t require end users to be aware of what’s going on in the background.
“Once you have one system that both provides the protection and the information policy enforcement, it’s much easier to now manage a large company…because it’s all centralized, it’s all one policy,” Stamos says. “There’s no longer a need to make clearance decisions on an individual basis.”
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.