News

Phalanx Named Finalist for Distinguished Service Award in Emerging Business Category 2023

Phalanx has been named a finalist in the Emerging Business category of the prestigious Distinguished Service Awards, presented by the NOVA Chamber of Commerce. This esteemed recognition honors individuals, companies, and non-profit organizations for their outstanding service to veterans in the Greater Washington business community, highlighting their dedication to community stewardship and business leadership.

The Distinguished Service Awards event is set to take place at the esteemed Army Navy Country Club in Arlington, VA. The event will be a celebration of the unsung heroes in the business community who have devoted their time and resources to make a difference in the lives of those who have served our nation.

Phalanx’s nomination in the Emerging Business category reflects the company’s commitment to supporting veterans and their contributions to the Greater Washington business landscape. As a company that values innovation and impact, Phalanx recognizes the unique and enduring businesses that military veterans have created, making them vital pillars of strength and stability within the community.

“We are incredibly honored to be recognized as a finalist for the Distinguished Service Award in the Emerging Business category,” said Ian Garrett, CEO & Co-founder at Phalanx. “At Phalanx, we believe in the power of diversity and the invaluable contributions of veterans to our business community. This nomination further motivates us to continue supporting and empowering veterans in their journey to success.”

The Distinguished Service Awards ceremony will feature an elite keynote speaker, along with the showcase of all finalists in various categories, drawing a distinguished audience of military and veteran business leaders. This gathering will provide an exceptional opportunity for attendees to network, celebrate accomplishments, and build meaningful connections within the business community.

About Phalanx:

Phalanx is a lightweight Data Loss Prevention (DLP) and document mapping solution that secures document access by combining automation, identity, and encryption. We transform existing workspaces, such as Office 365, Google Workspace, or local devices, into secure systems to provide CISOs cyber risk intelligence of their sensitive documents and automated security to mitigate the risk.

Phalanx’s dedication to creating opportunities for veterans aligns perfectly with the vision of the Distinguished Service Awards. Their recognition as a finalist in the Emerging Business category stands as a testament to the company’s unwavering dedication to veterans’ success and their remarkable contributions to the Greater Washington business community.

For more information about the Distinguished Service Awards and the NOVA Chamber of Commerce, please visit here.

News

Phalanx MUZE Awarded Winner of the Q2 Product Awards

__wf_reserved_inherit

Phalanx announced today that it has been named a top product in the 2024 Q2 Product Awards. The Q2 Product Awards, presented by Products That Count in partnership with Mighty Capital and Capgemini, is the only awards program designed to celebrate the tools that help Product Managers build great products.

Nominees are chosen by Products That Count’s product manager network, and winners are chosen by an independent Awards Advisory Board composed of top product leaders.

Phalanx MUZE is a cutting-edge cybersecurity solution that seamlessly integrates encryption and secure, traceable data access into the workspaces businesses already use. By transforming environments like desktops, Google Drive, and OneDrive into fortified, secure spaces, Phalanx MUZE significantly reduces human risk in managing business files. With features such as automated encryption and compliance with regulations like CMMC and ITAR, Phalanx MUZE provides robust protection against ransomware and insider threats while ensuring businesses can operate efficiently without the need for deep technological expertise.

“Great tools are the Product Manager’s secret weapon,” said SC Moatti, Founder and Board Chair of Products That Count, “essential for staying ahead in the competitive market landscape. I congratulate Phalanx on defining product excellence in 2024 and beyond.”

“We’re thrilled to be recognized for our dedication to simplifying cybersecurity for businesses of all sizes,” said Ian Garrett, CEO of Phalanx. “Phalanx MUZE offers peace of mind by securing data effortlessly, allowing companies to focus on growth without the constant worry of cyber threats.”

Learn more about all of the winners of the 2024 Q2 Product Awards here: https://productsthatcount.com/product-awards/

ABOUT PHALANX

Phalanx is a B2B SaaS company dedicated to mitigating human risk in managing business files, effectively reducing vulnerabilities to cyber threats. Phalanx automates file protection, safeguarding data from accidental or intentional risks, and provides peace of mind that security incidents won’t compromise business operations. Within the first 12 hours, Phalanx decreases attack exposure by over 60%, requiring no additional effort from users. Our software seamlessly integrates with existing workspaces, turning them into secure environments without disrupting daily workflows. Learn more at phalanx.io.

ABOUT PRODUCTS THAT COUNT

Products That Count is a 501(c)3 nonprofit that helps everyone build great products. It celebrates product excellence through coveted Awards that inspire over 500,000 product managers and honor great products and the professionals responsible for their success. It accelerates the career and rise to the C-suite of more than 30% of all Product Managers globally by providing exceptional programming – including award-winning podcasts and popular newsletters – for free. It acts as a trusted advisor to all CPOs at Fortune 1000 and publishes key insights from innovative companies, like Capgemini, SoFi, and Amplitude, that turn product success into business success. Learn more at ProductsThatCount.com.

News

Phalanx Joins Tampa Bay Wave 2023 CyberTech | X Accelerator

Phalanx Joins Tampa Bay Wave 2023 CyberTech | X Accelerator

Phalanx is excited to announce that it has been selected to join the Tampa Bay Wave’s CyberTech | X 2023 Accelerator cohort. The accelerator, which is set to begin in March and run for three months, will offer mentoring from tech founders and cybersecurity industry giants, as well as providing sales training, pitch coaching, and introductions to investors.

Phalanx is honored to be among the 15 companies selected to participate in this prestigious program, which has been running for three years. The key funding partners supporting the program include A-LIGN, KnowBe4, and Ernst & Young, and strategic partners 360 Advanced and Bank of America.

As the President and Founder of Tampa Bay Wave, Linda Olson, stated in a press release,

“Florida’s technology and startup ecosystems have been experiencing tremendous growth over the past five-10 years, including in sectors like cybersecurity.”

With cybersecurity threats on the rise, programs like the CyberTech | X Accelerator can go a long way in addressing these growing security concerns, while showcasing Tampa Bay’s tech and cybersecurity talent and helping advance Wave’s mission to build Florida’s innovation economy.

Phalanx is excited to be a part of this accelerator and looks forward to working with the other startups and industry leaders to take our cybersecurity solutions to the next level. At the end of the program on March 29, Phalanx will have the opportunity to pitch our company to accredited investors, venture capitalists, cybersecurity industry leaders, and other potential partners.

Stay tuned for updates on Phalanx’s progress throughout the accelerator program and be sure to check out the official press release for more information.

Learn About Zero Trust Data Access and More With Phalanx

To learn more about how Phalanx can help you reduce the risk of data breaches, contact us for a demo today.

News

Phalanx is Selected as a DCA Live Red Hot Cyber Company 2023

Co-founder & CMO Carl Kenney (left) and Co-founder & CEO Ian Garrett (right)

Phalanx is proud to announce its selection as a recipient in the prestigious RedHot Cyber 2023 event held at Northeastern University in Arlington.

The event, a cornerstone for the cybersecurity community in the Washington, D.C. region, brought together top entrepreneurs, investors, and leaders to discuss the future of cybersecurity and acknowledge the significant contributions of regional companies.

Phalanx co-founder Ian Garrett, who represented the company, expressed his enthusiasm about the opportunities for networking and collaboration presented at the event. “RedHot Cyber 2023 was not just a meeting of minds but a convergence of visionary ideas and groundbreaking solutions in the cybersecurity landscape,” said Garrett.

The event highlighted the importance of innovative approaches in tackling security challenges faced by government, national security, and consumers. As one of the honored companies, Phalanx showcased its commitment to developing cutting-edge cybersecurity technologies that safeguard digital assets and infrastructure.

“We are excited to contribute to the vibrant cybersecurity ecosystem in the DC area,” added Garrett. “Events like RedHot Cyber are essential in fostering a community of collaboration, driving forward our collective goal of a more secure digital world.”

Phalanx extends its gratitude to DCA Live and the host committee for organizing an impactful event and looks forward to continued involvement in initiatives that propel the cybersecurity industry forward.

About Phalanx:

Phalanx is a lightweight Data Loss Prevention (DLP) and document mapping solution that secures document access by combining automation, identity, and encryption. We transform existing workspaces, such as Office 365, Google Workspace, or local devices, into secure systems to provide CISOs cyber risk intelligence of their sensitive documents and automated security to mitigate the risk.

For more information, please visit www.phalanx.io.

News

Phalanx Identified as a Cutting Edge Tech Companies Disrupting its Industry in USA Today

Phalanx provides cyber-secure file transfers & storage around existing employee workflows to save time, increase cybersecurity, and increase productivity. We’re very excited to see we’ve been showcased in USA Today as a cutting edge tech company disrupting the cybersecurity industry.

“People think good security comes at the cost of productivity. Since human-related issues are the leading cause of data breaches, we founded Phalanx to allow organizations to have both high cybersecurity and high productivity. Our customers are ecstatic about how simple we’ve made their secure file transfer and storage processes without needing additional infrastructure or burdening their employees,” said Ian Garrett, CEO & co-founder.

We’re looking forward to moving forward in our mission to provide the easiest experience to end-users while also enabling security leaders visibility and assurance with a traditionally very difficult data type to deal with.

Want to learn more about how Phalanx can secure your file transfers and storage? Book a demo today, or request a trial and we’d love to chat.

News

Phalanx Founders Recognized in the Rising Stars Category of the Lunch Pail 100

__wf_reserved_inherit

We’re thrilled to announce that Phalanx’s very own founders, Ian Garrett and Austin Garrett, have been honored as Rising Stars in the prestigious Lunch Pail 100 list for 2024! This recognition celebrates Virginia Tech alumni who have demonstrated remarkable growth, innovation, and leadership within their companies.

Innovation Meets Security: Phalanx’s Impact

At Phalanx, our mission has always been to simplify and strengthen cybersecurity for businesses, especially those with limited resources. By transforming everyday workspaces into secure environments, Phalanx has rapidly become a trusted solution for businesses looking to protect their data without complicating their workflow. Our approach to cybersecurity—leveraging automated file protection and seamless integration with existing tools—has proven essential for many businesses navigating today’s complex digital landscape.

The recognition of Ian and Austin as Rising Stars is a testament to their visionary leadership and commitment to making top-tier cybersecurity accessible for all businesses. From their deep expertise in cybersecurity, honed through years of experience in both military and industry settings, to their relentless drive to innovate, they have positioned Phalanx as a leader in the cybersecurity space.

Why This Matters for Our Customers

This award is not just a win for Ian, Austin, and the Phalanx team—it’s a win for our customers. It highlights the effectiveness of Phalanx’s solutions in providing robust, easy-to-implement security that protects businesses from both accidental and intentional data breaches. Our clients, from small businesses to larger enterprises, trust Phalanx to safeguard their sensitive information, knowing that they are supported by leaders who are recognized for their excellence and innovation.

As we celebrate this achievement, we remain committed to our mission: protecting businesses from the rising threats of cyberattacks, ensuring that they can operate with confidence and peace of mind.

Join Us in Celebrating

We invite you to join us in congratulating Ian and Austin on this well-deserved recognition. Their dedication to cybersecurity is driving Phalanx forward, helping businesses across the country stay secure in an increasingly digital world.

To learn more about the Lunch Pail 100 and the incredible companies and leaders recognized this year, visit the official Lunch Pail Ventures website.

Here’s to continuing our journey of innovation, growth, and excellence—together!

News

Phalanx Featured in Startup To Follow

Phalanx Gets Featured in Startup To Follow

Phalanx, was recently featured in Startup To Follow in an article titled “Phalanx Conquers Human Error for a Cyber-Secure Future” for our innovative solution to human error that provides visibility in data access. In a world where data breaches are on the rise and remote work is becoming the norm Phalanx MUZE (Monitoring Unstructured Data with Zero Trust Encryption) is more important than ever.

How Does Phalanx Help?

Phalanx’s solution combines automation, encryption, and identity to create a seamless data access experience that doesn’t sacrifice productivity. Unlike other competitors in the space, Phalanx is designed to overlay on existing environments, ensuring there is no gap in protection.

Phalanx’s solution, MUZE, consists of an endpoint and web application. The endpoint application and its integrations (Outlook/Gmail, OneDrive/SharePoint/Google Drive, MS Teams) work in the background to automatically encrypt data at the file level and enable secure, trackable sharing across each of those environments. This automated file-level security allows users to work securely without hindering productivity, doesn’t require users to learn new behaviors, and doesn’t require them to make security decisions.

The meta-data gathered from the endpoint application and integrations is then sent to the web application where security leaders and operators can view risk and understand all aspects of how their unstructured data is accessed and shared across the organization, regardless of location.

In the words of Phalanx CEO and Co-founder Ian Garrett, “Human-related issues are the leading cause of data breaches because perfect security would require people to focus on never making a mistake, which isn’t a reality. We founded Phalanx with a mission to enable businesses to operate in a quick, efficient way without sacrificing security, and without putting a burden on their employees. Our customers are astonished at how intuitive and simple we’ve made the platform, and we strive to continue evolving it to adapt to everyday workflows.”

Get in touch

Want to learn more about how Phalanx can provide security & visibility to your data? Book a demo today, or request a trial and we’d love to chat.

Security

NIST 800-171 vs. NIST 800-53 What’s the Difference

NIST 800-171 vs. NIST 800-53 What’s the Difference

NIST 800-171 vs. NIST 800-53: What’s the Difference?

The National Institute of Standards and Technology (NIST) has developed several cybersecurity standards to help organizations protect their sensitive information. Two of the most well-known standards are NIST 800-171 and NIST 800-53. While both standards aim to improve cybersecurity, they have different scopes and target different audiences. NIST 800-171 is primarily focused on contractors and subcontractors of federal agencies, while NIST 800-53 is intended for federal agencies and organizations. Let’s explore the key differences between NIST 800-171 and NIST 800-53 and explain why it is important for organizations to understand these differences. Whether you are a small business contractor or a federal agency, understanding these standards is crucial for ensuring the security of your sensitive information.

NIST 800-171 vs NIST 800-53

1. NIST 800-171 Overview

NIST 800-171 is a set of security controls and guidelines that are intended to protect controlled unclassified information (CUI) held by non-federal organizations. This standard provides a set of guidelines that organizations must follow to safeguard sensitive information and protect against unauthorized access, use, disclosure, disruption, modification, or destruction. The standard is primarily intended for contractors and subcontractors of federal agencies who handle CUI on behalf of the federal government. Compliance with NIST 800-171 is mandatory for these organizations, as it is a requirement for doing business with the federal government. In We’ll provide an overview of NIST 800-171, including its purpose, scope, and the types of organizations that it applies to.

What is NIST 800-171?

NIST 800-171 is a set of guidelines and security controls developed by the National Institute of Standards and Technology (NIST) to help organizations protect Controlled Unclassified Information (CUI) from unauthorized access, use, disclosure, disruption, modification, or destruction. The standard is designed to be a flexible framework that organizations can use to implement appropriate security measures based on their specific needs.

The standard is based on the NIST SP 800-53, which provides security controls and guidelines for federal agencies, but it is tailored to the specific needs of non-federal organizations that handle CUI on behalf of the federal government. NIST 800-171 includes a set of 110 security controls that organizations must implement to protect CUI. These controls are organized into 14 families, including access control, incident response, and system and communications protection.

NIST 800-171 is mandatory for contractors and subcontractors of federal agencies that handle CUI on behalf of the federal government. Organizations that handle CUI must comply with the standard to be eligible to do business with the federal government. NIST 800-171 helps organizations to protect sensitive information and keep it from falling into the wrong hands. It also helps contractors and subcontractors to meet their legal and contractual obligations to protect CUI and to be in compliance with federal regulations.

Purpose and scope of NIST 800-171

The purpose of NIST 800-171 is to provide a set of guidelines and security controls that organizations can use to protect Controlled Unclassified Information (CUI) from unauthorized access, use, disclosure, disruption, modification, or destruction. The standard is intended to help organizations safeguard sensitive information and meet their legal and contractual obligations to protect CUI.

The scope of NIST 800-171 includes 110 security controls that organizations must implement to protect CUI. These controls are organized into 14 families and include guidelines for access control, incident response, and system and communications protection. Organizations must implement these controls to protect CUI, including data stored in systems and networks, data in transit, and data stored in physical media. The standard also includes requirements for incident response, continuity of operations, and system security management.

NIST 800-171 applies to contractors and subcontractors of federal agencies that handle CUI on behalf of the federal government. Compliance with the standard is mandatory for these organizations as it is a requirement for doing business with the federal government. Organizations that handle CUI must comply with the standard to be eligible for contract awards and maintain their contract. The standard helps organizations to safeguard sensitive information and keep it from falling into the wrong hands, it also helps contractors and subcontractors to meet their legal and contractual obligations to protect CUI and to be in compliance with federal regulations.

Who does NIST 800-171 apply to?

NIST 800-171 applies primarily to contractors and subcontractors of federal agencies that handle Controlled Unclassified Information (CUI) on behalf of the federal government. These organizations must comply with the standard to be eligible to do business with the federal government. The standard applies to any organization that handles CUI, regardless of size or industry. This includes, but is not limited to, small businesses, large corporations, and non-profit organizations.

Organizations that handle CUI include those that process, store, transmit or handle CUI on behalf of the federal government. This can include businesses that provide services such as IT, logistics, and engineering support to the federal government, as well as organizations that conduct research or perform other activities that require access to CUI.

Compliance with NIST 800-171 is mandatory for contractors and subcontractors of federal agencies that handle CUI on behalf of the federal government. Organizations that handle CUI must comply with the standard to be eligible for contract awards and maintain their contract. Non-compliance with the standard can result in contract termination and may also result in fines and penalties. The standard helps organizations to safeguard sensitive information and keep it from falling into the wrong hands, it also helps contractors and subcontractors to meet their legal and contractual obligations to protect CUI and to be in compliance with federal regulations.

2. NIST 800-53 Overview

NIST 800-53 is a set of security controls and guidelines that are intended to help federal agencies protect their information systems and sensitive information. The standard is developed by the National Institute of Standards and Technology (NIST) and it provides a comprehensive set of security controls and guidelines for securing federal information systems and the sensitive information they contain. The standard is intended to be a flexible framework that organizations can use to implement appropriate security measures based on their specific needs. We’ll provide an overview of NIST 800-53, including its purpose, scope, and the types of organizations that it applies to.

What is NIST 800-53?

NIST 800-53 is a set of guidelines and security controls developed by the National Institute of Standards and Technology (NIST) to help federal agencies protect their information systems and the sensitive information they contain. The standard provides a comprehensive set of security controls and guidelines for securing federal information systems and provides a flexible framework that organizations can use to implement appropriate security measures based on their specific needs.

The standard includes security controls for various security areas such as access control, incident response, and system and communications protection. The controls are grouped into 18 families, and these families are further grouped into three classes: basic, medium, and high. The standard also includes a set of management controls that help organizations to manage and monitor their security controls. Additionally, NIST 800-53 includes guidelines for risk management, incident response, and system and communications protection.

NIST 800-53 is mandatory for federal agencies, and it is also used as a reference by non-federal organizations. The standard helps organizations to protect sensitive information and keep it from falling into the wrong hands. It also helps federal agencies to meet their legal and contractual obligations to protect the information they handle and to be in compliance with federal regulations.

Purpose and scope of NIST 800-53

The purpose of NIST 800-53 is to provide a comprehensive set of security controls and guidelines that federal agencies can use to protect their information systems and the sensitive information they contain. The standard is designed to be a flexible framework that organizations can use to implement appropriate security measures based on their specific needs. The standard covers a wide range of security areas such as access control, incident response, and system and communications protection, and it helps organizations to protect sensitive information and keep it from falling into the wrong hands.

The scope of NIST 800-53 includes security controls for various security areas such as access control, incident response, and system and communications protection. The controls are grouped into 18 families, and these families are further grouped into three classes: basic, medium, and high. The standard also includes a set of management controls that help organizations to manage and monitor their security controls. Additionally, NIST 800-53 includes guidelines for risk management, incident response, and system and communications protection.

NIST 800-53 applies to federal agencies and organizations that handle sensitive information on behalf of the federal government. Compliance with the standard is mandatory for federal agencies, and it is also used as a reference by non-federal organizations. The standard helps organizations to protect sensitive information and keep it from falling into the wrong hands. It also helps federal agencies to meet their legal and contractual obligations to protect the information they handle and to be in compliance with federal regulations.

Who NIST 800-53 applies to (federal agencies and organizations)

NIST 800-53 applies to federal agencies and organizations that handle sensitive information on behalf of the federal government. The standard is mandatory for federal agencies, and it is also used as a reference by non-federal organizations. This includes, but is not limited to, large corporations, small businesses, and non-profit organizations.

Federal agencies are required to comply with NIST 800-53 to secure their information systems and sensitive information. They must implement the security controls and guidelines outlined in the standard to protect their information systems and the sensitive information they contain. Compliance with NIST 800-53 is mandatory for federal agencies, and non-compliance can result in fines and penalties.

Non-federal organizations that handle sensitive information on behalf of the federal government also use NIST 800-53 as a reference. These organizations use the standard as a guide to implement appropriate security measures to protect their information systems and the sensitive information they handle. NIST 800-53 helps these organizations to meet their legal and contractual obligations to protect the information they handle and to be in compliance with federal regulations.

NIST 800-53 applies to federal agencies and organizations that handle sensitive information on behalf of the federal government. Compliance with the standard is mandatory for federal agencies, and it is also used as a reference by non-federal organizations to secure their information systems and protect the sensitive information they handle.

3. Differences between NIST 800-171 and NIST 800-53

NIST 800-171 and NIST 800-53 are both standards developed by the National Institute of Standards and Technology (NIST) to help organizations protect sensitive information and improve cybersecurity. While both standards aim to improve cybersecurity, they have different scopes and target different audiences. NIST 800-171 is primarily focused on contractors and subcontractors of federal agencies, while NIST 800-53 is intended for federal agencies and organizations. We’ll explore the key differences between NIST 800-171 and NIST 800-53 and explain why it is important for organizations to understand these differences. Whether you are a small business contractor or a federal agency, understanding these standards is crucial for ensuring the security of your sensitive information.

Comparison of Security controls

NIST 800-171 and NIST 800-53 both provide a set of security controls for protecting sensitive information. However, the two standards have different sets of security controls, with NIST 800-53 providing a more comprehensive set of controls compared to NIST 800-171.

NIST 800-171 includes 110 security controls that organizations must implement to protect Controlled Unclassified Information (CUI). These controls are organized into 14 families, including access control, incident response, and system and communications protection. NIST 800-53, on the other hand, includes a more extensive set of security controls, with a total of 114 controls grouped into 18 families and three classes: basic, medium, and high.

Another key difference between the two standards is that NIST 800-53 provides more in-depth guidance on security control implementation and security control assessment. This includes guidance on system and communications protection, incident response, and access control. NIST 800-171, on the other hand, focuses on protecting CUI and does not provide as much guidance on security control implementation and assessment.

In summary, the main difference between NIST 800-171 and NIST 800-53 in terms of security controls is that NIST 800-53 provides a more comprehensive set of controls, with more in-depth guidance on security control implementation and assessment, while NIST 800-171 focuses on protecting CUI and provides a set of guidelines and security controls that organizations can use to protect CUI.

Comparison of Risk management

Both NIST 800-171 and NIST 800-53 include guidelines for risk management, however, they have different scopes and levels of detail when it comes to risk management.

NIST 800-53 includes a comprehensive set of guidelines for risk management. It provides guidance on the risk management framework, risk assessment, and risk management planning. The standard also includes guidelines for continuous monitoring, incident response, and system and communications protection. It requires federal agencies to conduct regular risk assessments and to develop and implement risk management plans to protect their information systems and sensitive information.

NIST 800-171, on the other hand, includes a more limited set of guidelines for risk management. It focuses on protecting Controlled Unclassified Information (CUI) and does not provide as much guidance on risk management as NIST 800-53. The standard requires organizations to implement security controls to protect CUI but does not require regular risk assessments or the development of risk management plans.

In summary, the main difference between NIST 800-171 and NIST 800-53 in terms of risk management is that NIST 800-53 provides a more comprehensive set of guidelines for risk management, including risk assessment, risk management planning, and continuous monitoring, while NIST 800-171 focuses on protecting CUI and does not provide as much guidance on risk management.

Comparison of Compliance requirements

Both NIST 800-171 and NIST 800-53 have compliance requirements, but they have different scopes and levels of detail.

NIST 800-53 compliance is mandatory for federal agencies, and it includes a comprehensive set of requirements for securing information systems and sensitive information. The standard requires federal agencies to implement security controls, conduct regular risk assessments, and develop and implement risk management plans. Compliance with NIST 800-53 is mandatory for federal agencies, and non-compliance can result in fines and penalties.

NIST 800-171 compliance is mandatory for contractors and subcontractors of federal agencies that handle Controlled Unclassified Information (CUI) on behalf of the federal government. The standard requires organizations to implement security controls to protect CUI, but it does not require regular risk assessments or the development of risk management plans. Compliance with NIST 800-171 is mandatory for these organizations as it is a requirement for doing business with the federal government. Non-compliance with the standard can result in contract termination and may also result in fines and penalties.

Ultimately, the main difference between NIST 800-171 and NIST 800-53 in terms of compliance requirements is that NIST 800-53 is mandatory for federal agencies and includes a comprehensive set of requirements for securing information systems and sensitive information, while NIST 800-171 is mandatory for contractors and subcontractors of federal agencies that handle CUI and it focuses on protecting CUI.

Comparison of Auditing and reporting

Both NIST 800-171 and NIST 800-53 have auditing and reporting requirements, but they have different scopes and levels of detail.

NIST 800-53 requires federal agencies to conduct regular self-assessments of their information systems and to report the results to the appropriate authorities. The standard also requires federal agencies to conduct regular external assessments of their information systems and to address any vulnerabilities identified during the assessment. Compliance with NIST 800-53 is mandatory for federal agencies and non-compliance can result in fines and penalties.

NIST 800-171, on the other hand, does not have the same level of detail when it comes to auditing and reporting requirements. The standard does not require regular self-assessments or external assessments of information systems. However, contractors and subcontractors of federal agencies that handle Controlled Unclassified Information (CUI) on behalf of the federal government, must be able to demonstrate compliance with the standard through documentation, testing, or other means as required by their contract.

The main difference between NIST 800-171 and NIST 800-53 in terms of auditing and reporting is that NIST 800-53 requires federal agencies to conduct regular self-assessments and external assessments of their information systems and to report the results to the appropriate authorities, while NIST 800-171 does not have the same level of detail when it comes to auditing and reporting requirements. However, contractors and subcontractors of federal agencies that handle CUI must be able to demonstrate compliance with the standard through documentation, testing, or other means as required by their contract.

In Summary

NIST 800-171 and NIST 800-53 are both standards developed by the National Institute of Standards and Technology (NIST) to help organizations protect sensitive information and improve cybersecurity. However, they have different scopes and target different audiences. NIST 800-171 is primarily focused on contractors and subcontractors of federal agencies, while NIST 800-53 is intended for federal agencies and organizations. Key differences between the two standards include security controls, risk management, compliance requirements, and auditing and reporting requirements.

It is important for organizations subject to both standards to understand these differences to ensure compliance and protect sensitive information. Organizations should review their specific needs, resources, and risk tolerance to determine which standard is appropriate for them and how to implement them.

For further reading and resources for compliance with NIST 800-171 and NIST 800-53, organizations can refer to the NIST website where the standards and guidelines are published. Additionally, organizations can consider using automated security tools like Phalanx to help them comply with the standards and keep their sensitive information secure.

Learn About NIST 800-171 and More With Phalanx

To learn more about how Phalanx can help you with NIST 800-171, contact us for a demo today. 

Security

NIST 800-171 Compliance Checklist in 8 Steps

NIST 800-171 Compliance Checklist in 8 Steps

Are you in need of a security compliance checklist for the NIST 800-171 standard? Look no further. This comprehensive list of steps and best practices will help you ensure that your organization is compliant and secure.

What is NIST 800-171 Compliance?

NIST 800-171 compliance is a set of requirements outlined by the National Institute of Standards and Technology (NIST) to help protect Controlled Unclassified Information (CUI). It is a comprehensive set of requirements that address the security of CUI when stored, processed, or transmitted in non-federal information systems and organizations. The requirements are designed to protect the confidentiality, integrity, and availability of CUI from unauthorized access, use, disclosure, disruption, modification, or destruction.

The NIST 800-171 compliance requirements cover a wide range of topics such as access control, asset management, system and information integrity, personnel security, incident response, and system and communications protection. It focuses on areas such as access control, authentication, system and information integrity, personnel security, incident response, and system and communications protection. It also covers physical and environmental protection, as well as audit and accountability.

NIST 800-171 compliance is a necessary step in the security of CUI and is often required by federal agencies when they contract with organizations that store or handle CUI. Organizations that are not compliant with NIST 800-171 may be subject to fines and penalties. As such, organizations should take steps to ensure they are compliant with the requirements in order to protect the security of their CUI.

NIST 800-171 Compliance Checklist

1. Identify Federal Contract Information

2. Establish Security Requirements

3. Develop System Security Plan

4. Implement Security Controls

5. Monitor and Test Security Controls

6. Manage System Security

7. Implement Incident Response Plan

8. Document and Maintain Records

1. Identify Federal Contract Information: Determine if your organization is subject to the NIST 800-171 standard and assess the scope of the contract.

Identifying Federal Contract Information is an important step in the NIST 800-171 Compliance Checklist. This step involves determining if your organization is subject to the NIST 800-171 standard, and assessing the scope of the contract.

The first step is to identify whether or not your organization is subject to the NIST 800-171 standard. This can be done by reviewing the contract documents, or by asking the contracting officer. Once it is determined that the organization is subject to the standard, the scope of the contract must be assessed. The scope of the contract will determine which of the NIST 800-171 requirements apply to the organization. It is important to understand the scope of the contract in order to determine which requirements the organization must meet to be compliant.

Once the scope of the contract is determined, the organization can begin to assess which NIST 800-171 requirements apply to them. This process will involve determining which requirements are applicable to their environment, and creating a plan to implement those requirements. Once the requirements have been identified, the organization can begin the process of implementing the necessary controls to bring their environment into compliance with the NIST 800-171 standard.

2. Establish Security Requirements: Establish and document the security requirements for your system and define the roles and responsibilities associated with the security requirements.

Establishing security requirements is one of the most important steps in a NIST 800-171 Compliance Checklist. The purpose of this step is to ensure that an organization’s information systems are adequately protected from unauthorized access, modification, and disclosure. The security requirements must be tailored to the specific needs of each organization, as no two organizations have the same security requirements.

When establishing security requirements, it is important to consider the following:

  • The type of system being protected.
  • The level of security required for the system.
  • The type of data being stored.
  • The level of access control needed for the system.

Additionally, organizations should define roles and responsibilities associated with the security requirements. This will ensure that all members of the organization understand their role in maintaining the security of the system. It is also important to create policies and procedures that outline how the security requirements should be implemented and enforced.

Once the security requirements are established, organizations should regularly review them to ensure they remain up to date with the latest security requirements and trends. This will help ensure that the system remains compliant with NIST 800-171.

3. Develop System Security Plan: Develop a system security plan that is in compliance with the NIST 800-171 standard. This plan should address the security roles, responsibilities, and requirements for the system.

Developing a system security plan is a key step in ensuring NIST 800-171 compliance. The plan should clearly define the roles and responsibilities of all involved personnel, outline the security requirements of the system, and include a description of the security controls and measures that will be implemented to protect the system. The plan should also include a process for monitoring and auditing the system to ensure that it is in compliance with NIST 800-171. 

The system security plan should be tailored to the specific needs of the system and should include any relevant information such as system architecture, hardware/software components, system environment, and external systems. Additionally, the plan should address the roles and responsibilities of all personnel authorized to access the system and include a procedure for granting access. It should also document any specific security controls or measures that will be implemented to protect the system from unauthorized access, data leakage, and other security threats. 

The system security plan should be reviewed regularly to ensure that it is up to date and in compliance with the NIST 800-171 standard. This review should include an assessment of the system’s security controls and measures to ensure that they are effective in protecting the system from potential threats. Additionally, the plan should be regularly tested to ensure that it is still applicable and effective in meeting the security needs of the system.

4. Implement Security Controls: Implement the security controls identified in the system security plan. This includes documenting security policies, procedures, and processes as well as implementing technical controls.

Implementing the security controls identified in the system security plan is a critical step in the process of NIST 800-171 Compliance Checklist. This step involves documenting security policies, procedures, and processes as well as implementing technical controls. The purpose of this step is to ensure that the system is secure and compliant with NIST standards.

The security controls identified in the system security plan should be implemented in a systematic manner. This includes following standard operating procedures, documenting all changes, ensuring that all security processes are up to date, and monitoring the system for any changes or irregularities. Additionally, any changes to the system should be documented to ensure that the system remains compliant with NIST standards.

In addition to documenting security policies, procedures, and processes, this step also involves implementing technical controls. Technical controls are designed to protect the system from unauthorized access and malicious activity. These controls include firewalls, antivirus software, encryption, and other measures that protect the system. Additionally, any changes to the system should be monitored to ensure that the system is secure and compliant with NIST standards.

Overall, implementing the security controls identified in the system security plan is an important step in the NIST 800-171 Compliance Checklist. This step involves documenting security policies, procedures, and processes as well as implementing technical controls. In addition, any changes to the system should be documented and monitored to ensure that the system remains secure and compliant with NIST standards.

5. Monitor and Test Security Controls: Monitor and test the security controls to ensure that they are functioning correctly and providing adequate security.

Monitoring and testing security controls is an essential step in the NIST 800-171 compliance checklist. It allows organizations to ensure that their security controls are functioning as expected and providing adequate security. Proper monitoring and testing of security controls is necessary to identify weaknesses in the system, as well as any unauthorized access or activity.

Organizations should use tools such as vulnerability scanners and intrusion detection systems to monitor and test their security controls. These tools can detect weaknesses and alert administrators when suspicious activity is detected. Additionally, organizations should regularly review system logs and audit trails to detect suspicious activity and identify unauthorized access attempts.

Organizations should also use penetration testing to test the effectiveness of their security controls. Penetration testing simulates an attack on the system and identifies any vulnerabilities that could be exploited by an attacker. This type of testing should be performed periodically to ensure that the system is secure and operating as expected.

Finally, organizations should review their security policies and procedures to ensure that they are adequately addressing the security needs of the organization. This includes evaluating the effectiveness of the security controls and making any necessary changes. Regularly reviewing and updating security policies and procedures is essential to ensure that the system remains secure and compliant.

6. Manage System Security: Establish a process to manage the system security and ensure that the security controls are being maintained and updated as needed.

The Manage System Security step of a NIST 800-171 Compliance Checklist is a critical part of ensuring the security of any system. This step requires the establishment of a process to manage the system security and to ensure that security controls are being maintained and updated as needed. This process must include the development of a security plan, maintenance of the system security configuration, and the implementation of security controls.

The security plan should detail how the system is to be protected and how any changes to the system will be evaluated and implemented. The security configuration should be regularly monitored and updated as new threats and vulnerabilities are identified. Finally, security controls must be implemented in order to ensure that the system is protected from unauthorized access and malicious activity. This can include authentication and access control measures, encryption of data, and secure communication protocols.

In addition to these steps, organizations must also continuously monitor their systems for any security incidents and respond to them in an appropriate manner. A comprehensive security program should be developed and maintained to ensure that all security measures are in place and are regularly updated. By following these steps, organizations can ensure that their systems remain secure and compliant with NIST 800-171.

7. Implement Incident Response Plan: Establish an incident response plan to ensure that your organization is prepared to respond to security incidents.

The implementation of an incident response plan is an essential part of a NIST 800-171 Compliance Checklist. An incident response plan is designed to help an organization respond quickly and effectively to security incidents. The plan should include detailed procedures for detecting, reporting, and responding to security incidents. It should also specify how to escalate incidents to the appropriate personnel, as well as how to document the response process.

The plan should include roles and responsibilities for the incident response team and provide guidance on how to handle different types of incidents. It should also provide guidance on the use of incident response tools, such as malware analysis, network forensics, and system analysis. Finally, it should include guidance on how to communicate with external parties, such as law enforcement and other organizations, in the event of a security incident.

Once the incident response plan is developed, it should be tested regularly to ensure that it is effective and up-to-date. Additionally, regular training should be conducted to ensure that all personnel are familiar with the plan and that they understand their roles and responsibilities. Finally, the incident response plan should be reviewed on a regular basis to ensure that it is still appropriate for the organization’s needs.

8. Document and Maintain Records: Document and maintain records of the security controls and processes in place.

Documenting and maintaining records of the security controls and processes in place is a step in achieving NIST 800-171 compliance that should also have a lot of attention. This step helps to ensure that the implemented security measures are in compliance with the standards set forth in NIST 800-171. It also helps to ensure that any potential risks or threats are identified and addressed in a timely manner.

The documentation of security controls and processes should be comprehensive and detailed, and should include information such as the specific control that is in place, the purpose of the control, the method of implementation, and the results of any tests or audits that have been conducted. This information should be kept up-to-date and should be reviewed regularly to ensure that the security controls and processes are still effective.

Additionally, it is important to maintain records of any changes that are made to the security controls and processes. This will ensure that the security measures remain in compliance with NIST 800-171, and will also help to identify any potential risks or threats that may have been introduced by the changes. It is also important to document any incident response plans, so that the organization can respond quickly and effectively in the event of a security incident.

By following these steps, you can ensure that your organization is in compliance with the NIST 800-171 standard. This will help you protect your organization and its data from security threats.

Learn About NIST 800-171 Compliance and More With Phalanx

To learn more about how Phalanx can help you achieve NIST 800-171 compliance, contact us for a demo today. 

Security

Mitigating Healthcare Data Loss & Data Exposure

Executive Summary

Healthcare has had the most expensive data breaches of any industry for the last 11 consecutive years, but many of the leading factors of that cost can be reduced by focusing on managing the cyber risk associated with human error. From ransomware to state sponsored attacks to increasingly sophisticated social engineering, organizations must be more vigilant than ever. The move to remote and hybrid work models mark the shift to perimeterless corporate IT infrastructure and increasing reliance on cloud computing and third-party SaaS applications. These changes, while generally beneficial, have introduced a myriad of cybersecurity risks and challenges.

This paper examines the current state of data breaches, with a particular focus on the healthcare industry. It breaks down the various costs of healthcare data breaches, what causes or contributes to such data breaches, and provides insights into how an organization can mitigate the risks associated with these breaches. The average total cost of a data breach for healthcare increased 29.5% from $7.13 million in 2020 to $9.23 million in 2021. The average total cost of a healthcare data breach is nearly double that of the global average. Healthcare breaches are in part more costly because of HIPAA fines, of which the average HIPAA penalty cost in 2021 was $427,296.43. The primary cause for data breaches in healthcare organizations is human error and most often takes the form of misdelivery of sensitive data. Human error is particularly troublesome as 85% of breaches include a human element and ransomware was found in 13 percent of human-related breaches. Human error is primarily mitigated through cybersecurity awareness training, but security teams have often been left wanting for more active prevention of human error. 

There are existing cybersecurity solutions, as well as new entrants, that can help healthcare organizations to address the cybersecurity risks created by human error. In order to maximize value and protection from human error, healthcare organizations should evaluate cybersecurity solutions that integrate zero trust, encryption, and security automation. Zero trust establishes how to best trust and authenticate users in increasingly perimeterless corporate IT infrastructures. Encryption continues to be the best form of protection for information and ensures that when mistakes are made, data is not useful to malicious actors. Security automation reduces the amount of human intervention required for cybersecurity processes, ensuring less mistakes happen and security is consistently applied.

Download this white paper here.

The State of Data Breaches in Healthcare

The prevalence of data breaches and their average cost continue to increase at staggering rates. In 2021 massive breaches affected Saudi Aramco, customers of Accelion’s file transfer application, and customers of Kaseya’s remote monitoring and management platform. Over the past year, the average total cost of a data breach increased by nearly 10% year over year, the largest single year cost increase in the last seven years. Customer PII was not only the most common data compromised, but it was also the most costly with an average cost per record of $180, up from $150 in 2020. The severity of breaches have in part been exacerbated by the COVID-19 pandemic and a shift to remote work. The average cost of a breach was $1.07 million higher where remote work was a factor in causing the breach, compared to those where remote work was not a factor. 

Among all industries, healthcare not only experiences breaches more often than most, but they also incur the highest data breach costs. The Herjavic Group notes that more than 93% of healthcare organizations experienced a data breach in the past three years. According to IBM and the Ponemon Institute, healthcare has topped all industries in cost for 11 consecutive years. The average total cost of a data breach for healthcare increased from $7.13 million in 2020 to $9.23 million in 2021. Healthcare’s average total cost is nearly double that of the global average total cost of $4.24 million. Healthcare leads in cost not only because malicious actors stand to gain more financially from health records, but also because of the fines resulting from noncompliance with HIPAA. HIPAA violations can cost from $100 to $50,000 per patient record based on the level of negligence identified by the government. HIPAA Journal reports that the average HIPAA penalty cost in 2021 was $427,296.43.

Leading Cause of Breaches in Healthcare

According to Verizon’s Data Breach Investigation Report, the leading cause for breaches in healthcare is basic human error and has been for the past several years. They found the most common error continues to be misdelivery, making up 36% of total errors. The next most common errors include publishing errors and misconfigurations, making up just over 20% of total errors each. After human error, the next leading causes for breaches in healthcare are basic web application attacks, system intrusions, and social engineering.

The combination of human error and social engineering can prove disastrous for organizations. The Society for Human Resource Management (SHRM) noted that phishing attacks that trick employees into revealing login and personal information came up as the top avenue of incursion (more than 30 percent of all incidents). Overall, they suggest that 85% of breaches included a human element and 61 percent related to stolen or misused credentials. SHRM also found that ransomware was found in 13 percent of human-related breaches. In addition to locking organizational systems, about 10 percent of the ransomware attacks cost organizations an average of $1 million, which included the cash paid out in the ransom, the price tag for remediation and lost revenue. Among attack vectors that involve some level of human error, IBM reports that business email compromise had the highest average total cost at $5.01 million. The second costliest initial attack vector was phishing ($4.65 million), followed by malicious insiders ($4.61 million), social engineering ($4.47 million), and compromised credentials ($4.37 million). 

Human errors continue to be a leading cause of data breaches due to the simple misalignment between an employee’s role and security decisions. Employees are primarily paid to be productive and support growing the bottom line of a business. Security tools either hinder productivity or in the case where an employee is faced with a security decision, they may sacrifice security for the sake of productivity. In order to improve productivity or even bypass security, employees may also adopt unapproved tools leading to a Shadow IT problem. Shadow IT directly impacts an organization’s cyber risk and can lead not only to data breaches but also compliance fines. Core found Shadow IT has exploded by 59% due to COVID-19, with 54% of IT teams considering themselves ‘significantly more at risk’ of a data breach. Employee education continues to be the primary mitigation for human error in an organization and few tools exist to easily mitigate this risk.

Organization Cost Breakdown

While knowing the average total cost of a data breach is helpful to understand the severity of a breach for a given industry relative to others, it is important to understand what components of a business incur the costs of the breach. The best way to break down the costs is to apply it to four primary cost centers: detection & escalation, lost business, notification, and post breach response. 

Detection & escalation includes activities that enable a company to reasonably detect a breach, such as forensic and investigative activities, assessment and audit services, crisis management, and communications to executives and boards. Lost business includes activities that attempt to minimize the loss of customers, business disruption, and revenue losses, such as business disruption and revenue losses from system downtime, cost of lost customers and acquiring new customers, and reputation losses and diminished goodwill. Notification includes activities that enable the company to notify data subjects, data protection regulators and other third parties. Post breach response includes activities to help victims of a breach communicate with the company and redress activities to victims and regulators, such as help desk and inbound communications, credit monitoring and identity protection services, issuing new accounts or credit cards, legal expenditures, product discounts, and regulatory fines. IBM calculated the average distribution of costs across these four cost centers is 38% from lost business, 29% for detection & escalation, 27% for post breach response, and 6% for notification. For healthcare organizations, it is expected that post breach response would account for more of the cost distribution due to the cost of HIPAA fines. As previously stated, HIPAA violations can cost from $100 to $50,000 per patient record.

Not included in the costs and cost centers mentioned above is cyber insurance. In the event of a breach, an organization may have a hard time renewing their policy or maintaining their original premium, even if they significantly increase their retention. According to Marsh, cyber insurance pricing in the US increased an average of 96%, year-over-year, in the third quarter of 2021. The third quarter increase was a 40 percentage point rise over the prior quarter, and the largest since 2015. Marsh further added that prices rose even as more than 60% of their clients increased their retentions in an effort to minimize increases.

The recent data breach at Monongalia Health System (Mon Health) demonstrates the effect a cyber breach can have on a health organization. In July 2021, a vendor informed Mon Health of a missed payment. Upon investigating, they discovered several threat actors gained access to a contractor’s email account to send emails seeking to obtain funds via fraudulent wire transfers. The phishing attack resulted in unauthorized access to emails and attachments in several employee email accounts for three months between May 2021 and August 2021. The compromised accounts contained patient information and information pertaining to members of Mon Health’s employee health plan, including Medicare Health Insurance Claim numbers, addresses, birth dates, health insurance plan member ID numbers, medical record numbers, provider names, dates of service, claims information, and medical and clinical treatment information. While evidence suggests the purpose of the attack was to secure fraudulent wire transfers and to send further phishing emails the investigation could not rule out obtaining personal information. The potential compromise was determined in October 2021 and work is underway to determine how many of Mon Health’s 398,164 patients had their protected health information compromised.

If only one tenth of Mon Health’s patients had their information compromised, the total cost of the breach would be $7.17 million, with an average cost per record of $180. The cost for HIPAA violations would make up $3.98M on the very conservative end. Breaking down the costs into the cost centers would look something like this: $4.3 million for post breach response (60%), $2.08 million for detection & escalation (29%), $430,017 for notification (6%), and $358,348 for lost business (5%). You will notice that in this estimation we kept the average percentage for detection & escalation and notification consistent with IBM’s findings. The post breach response makes up a significantly larger percentage of the breach due to the inclusion of HIPAA fines. Lost business is displaced by the increase to post breach response, but is not unreasonable considering the nature of healthcare. Health systems tend to dominate the regions they operate in and insurance restricts where patients can go. This results in a lower likelihood of patients switching health systems or new patients avoiding that health system.

Solutions to Mitigate Data Loss

While the number of data breaches and their costs are cause for alarm among healthcare organizations, there are solutions that can mitigate both the likelihood and severity of a breach. This section focuses on technologies as opposed to operational activities like employee education and incident response planning. Current solutions that may be leveraged to reduce data breach risk include data loss prevention (DLP), cloud access security brokers (CASB), standalone encryption, file transfer tools and cloud storage.

When assessing solutions to reduce your data breach risk, there are three key features that can significantly impact your overall risk. They are zero trust, encryption, and security automation. Zero trust is a framework or architecture representing the notion of perimeterless security wherein an organization assumes they are always in a state of breach. Put another way, the goal of zero trust is to “never trust, always verify,” all devices and users accessing a corporate network, even if they have previously connected to the network or been verified. IBM reports the average cost of a data breach was higher for organizations that had not deployed or started to deploy zero trust. The average cost of a breach was $5.04 million in 2021 for those with no zero trust approach but for organizations in a mature stage of zero trust deployment, the average cost of a breach was $3.28 million, a cost difference of 42.3%. Solutions that layer in zero trust principles are much more effective at mitigating data breach risk than their counterparts without zero trust. 

While we previously discussed standalone encryption tools, encryption can be built into many different systems and used in a variety of applications. IBM points out that organizations using high standard encryption (using at least AES-256 encryption, at rest and in motion), had an average total cost of a breach of $3.62 million, compared to $4.87 million at organizations using low standard or no encryption, a difference of $1.25M or 29.4%. Again, it is important to note encryption will not prevent data from being lost or stolen, but it will render the contents of that data useless to interceptors and so with robust encryption implemented, breach severity is greatly reduced. 

Security automation consists of security technologies that augment or replace human intervention in the identification and containment of incidents and intrusion attempts. IBM found that organizations with no security automation experienced average breach costs of $6.71 million in 2021, but organizations with fully deployed security automation experienced average breach cost of only $2.90 million. In addition to significantly reduced average breach costs, IBM further noted that for organizations with fully deployed security AI/automation, it took an average of 184 days to identify the breach and 63 days to contain it, for a total lifecycle of 247 days. Organizations with no security AI/automation deployed took an average of 239 days to identify the breach and 85 days to contain it, for a total lifecycle of 324 days. Security automation reduced the average lifecycle by 77 days or 27%. Security platforms with automation built in to them will outperform those requiring additional human input.

Phalanx Vs Other Solutions

Phalanx is uniquely designed to overcome human error to mitigate data loss and breaches while providing oversight to a class of data that is traditionally very difficult to track. It can operate on its own and in conjunction with many other solutions to secure your organization’s data. 

Phalanx Vs Data Loss Prevention (DLP)

DLP platforms perform both content inspection and contextual analysis of data sent via messaging applications such as email and instant messaging, in motion over the network, in use on a managed endpoint device, and at rest in on-premises file servers or in cloud applications and cloud storage. These solutions execute responses based on policy and rules defined to address the risk of inadvertent or accidental leaks or exposure of sensitive data outside authorized channels.

Phalanx can replace or work in conjunction with DLP systems. Since DLP solutions generally focus on the egress of data from boundaries it requires tedious policy management, and often generates a large number of requests for exceptions to policies. Phalanx provides foundational security for organizations without DLP, and supplemental security for those with DLP by enabling each file to have its own encryption so the data is secure at-rest and in-transit regardless of boundary controls. 

In lieu of DLP, Phalanx is significantly more lightweight, easy to manage, and requires next-to-zero configuration. Alongside DLP, Phalanx will cover DLPs blind spots and reduce rule exception workarounds from causing data loss. Few DLPs include encryption as a feature of their platforms or only apply it in specific cases, but Phalanx automates encryption so that when data ends up where it shouldn’t be, it is still protected and organizations know who accessed the data.

Phalanx Vs Cloud Access Security Brokers (CASB)

A CASB is on-premises or cloud based software that sits between cloud service users and cloud applications, and monitors all activity and enforces security policies. A CASB can offer services such as monitoring user activity, warning administrators about potentially hazardous actions, enforcing security policy compliance, and automatically preventing malware. CASBs that deliver security must be in the path of data access, between the user and the cloud provider. Architecturally, this might be achieved with proxy agents on each end-point device, or in agentless fashion without configuration on each device.

Phalanx can enhance existing CASB solutions in a similar way to DLP. CASB solutions focus on monitoring cloud activities, and occasionally also provide encryption. CASBs rely on complex configurations and rulesets to detect and stop improper data use or access which often create significant amounts of management work and white noise for security monitoring. 

Phalanx secures files in both cloud and local environments and provides encrypted security instead of just policy enforcement. Since Phalanx automates encryption in the background, it eliminates the need for technical know-how, and enables file sharing comparable to the experience of cloud sharing platforms but with fewer steps. The solution allows data to seamlessly move across environments without sacrificing security. Phalanx can add security to cloud storage environments as current cloud storage solutions may provide encryption within their environments but once data leaves their boundaries that protection disappears. 

Phalanx Vs  Secure File Transfer Protocol (SFTP)

File transfer tools allow individuals to move documents from one device to another or from person to another in a secure manner. File transfer tools come in a variety of forms from DLP email plug-ins, web portals, Secure File Transfer Protocol (SFTP), and cloud-enabled link sharing. These tools allow files to be exchanged in a secure manner, but usually require both parties to have the technology installed to be effective.

While a common secure transfer solution is to set up SFTP servers across organizations to create a secure connection between them, it is a cumbersome process that requires technical expertise on both sides as well as a significant amount of coordination. Both parties require SFTP servers to be set up and connected to each other. If the two users do not have the technical expertise to conduct the setup, this will require additional resources, often from the IT staff. Once the SFTP connection is established, the file transfer process is sustainable, but not scalable to other organizations.

Instead, Phalanx provides a solution that allows for the secure transmission of files while reducing the burden on both the sending and receiving parties. The solution enables organizations to easily store encrypted files in the cloud and only allow access to them via links. These links only display decrypted data to the receiving party when a secure connection via HTTPS is established, and after the receiving party authenticates themselves with a multi-factor authenticated code. The process is handled through Phalanx so the sending party only needs to right-click a file to generate a link and the receiving party only needs to receive the link.  In the background, Phalanx handles automatic encryption, cloud uploading, and third-party access code management.

Phalanx Vs Standalone File Encryption

The best method to secure individual files is through encryption. Standalone encryption tools allow for the encryption of hard drives, folders, or files using a variety of different encryption algorithms. These tools often require the passing of keys or passwords across messaging services in order for separate users to decrypt information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.

Current existing encryption solutions allow users to specify which files to encrypt but don’t easily allow other parties to decrypt the files.  This often results in insecure practices, such as sending the encryption key or password in an email or other communication method. 

Phalanx enhances the file encryption process by enabling automatic encryption, in addition to the ability to perform on-demand encryptions.  Furthermore, there is a greater benefit when it comes time to decrypt. Since keys are managed through Phalanx, each user only needs to keep track of their Phalanx account information and never need to share passwords or keys. 

Phalanx Vs Cloud storage

Cloud storage platforms can operate as secure environments to host data, collaborate on files, and share information. Cloud storage platforms usually incorporate some form of encryption and access management to protect information. Since these platforms are usually focused on productivity instead of security they can be integrated with DLP and CASB solutions to further increase security around the information stored within them.

The rise of cloud storage enabled enhanced productivity as users were able to access their files without being constrained to any one device. However, since cloud storage was designed to prioritize accessibility it doesn’t always offer much security for files. Also, even if there are access controls for the data in the cloud, if it’s not encrypted then there is always a possibility of data breaches through the provider. Phalanx allows for agnostic use of cloud storage providers while still providing encrypted security on each of the files. 

How Phalanx Can Help

Phalanx mitigates data exposure risk and data breaches through lightweight, human-centric data security that leverages automation to make a frictionless everyday user experience. As human error causes a significant portion of data loss and breaches, Phalanx allows workers to practice security without even realizing it and without the need for technical knowledge. It is designed to work within current workflows and even enhance productivity. Phalanx’s secure file sharing and storage solution combines high standard encryption, automation, and zero trust principles to seamlessly protect organizational information at the file level. Phalanx applies zero trust by delivering a method of encryption to each file on a user’s device in a way that is minimally invasive to the users’ workflow but provides provable security. While most zero trust methods currently focus on authenticating devices on a network, Phalanx knows that this architecture should also be applied to data on devices. The automation built into Phalanx’s solution not only allows for a seamless user experience but also reduces the burden placed on IT and security teams. Phalanx is a lightweight, low configuration platform that can be deployed quickly across an enterprise without time-consuming monitoring and modifying.

Phalanx’s secure file sharing and storage solution consists of both an endpoint and web application. The endpoint application handles the automated encryption and sharing functionalities while the web application allows for organization management. IT and security teams can fine-tune Phalanx’s configuration, manage users, and access data analytics. Phalanx’s metrics, security alerts, and audit logs paint your organization’s data picture and enhance your ability to understand your cyber risk. In the case of a possible HIPAA breach, Phalanx can prevent the need for a breach notification through the automated encryption and audit logs as illustrated in the graphic below. All of the data that Phalanx provides can be accessed by API as well, automating reporting and notification. Administrators will also have the power to immediately revoke all files shared by links in the event of a security incident to further limit potential data breach fallout.

Conclusion

While data breaches and their associated costs have continued to increase year over year for healthcare organizations, there are numerous, proactive steps organizations can take to reduce their risk and mitigate losses in a breach. Organizations must first understand that the question is not if, but when will they experience a breach. Accepting this reality allows for a mindset of continuous improvement and awareness. Healthcare organizations need to focus on the prime factors leading to data breaches in their industry; human error and social engineering. While employee education and cyber-savvy culture are necessary to mitigate human error and social engineering, minimally invasive cybersecurity tools that take into account human behavior and work alongside employee workflows must be adopted. When education fails you’ll want a safety net. In this line of effort, healthcare organizations should evaluate cybersecurity solutions that integrate zero trust, encryption, and security automation. Zero trust establishes how to best trust and authenticate users in increasingly perimeterless corporate IT infrastructures. Encryption continues to be the best form of protection for information and ensures that when mistakes are made, data is not useful to malicious actors. Security automation reduces the amount of human intervention required for cybersecurity processes, ensuring less mistakes happen and security is consistently applied. Phalanx can help healthcare organizations secure sensitive information and mitigate human error by combining zero trust principles, encryption, and automation in a solution that works with end users to keep them safe and productive while enriching the organization’s view of their data exposure risk. If you would like to learn more about how to mitigate data breaches or about Phalanx’s secure file collaboration solution, please visit us at https://www.phalanx.io or email us at info@phalanx.io. Click to download this whitepaper here.

Scroll to Top

Specifies total amount of data that can be shared per secure links.

Gives you direct access to support through phone or video calls, for immediate assistance.

Offers faster email support, ensuring your queries are prioritized.

Provides assistance and answers your questions via email.

Lets you brand the file send page with your company’s logo and colors, providing a professional and secure way to send files.

Extends protection to more complex or specialized document types, ensuring all your data is secure.

Ensures common types of office documents, like Word and Excel files, are protected and managed securely.

The ability to set when your links will expire.

Allows you to see a record of who’s looked at your link, what time they looked at it, and if they downloaded the file.

Number of File Receives

How many file links you can generate to send files.

Lets you safely preview PDF files without the need to download them, adding an extra layer of security.

Provides a secure way for people outside your company to send you files, ensuring they’re protected during transfer.

Allows you to share files securely through links, ensuring that only people with the link can access them with many ways to restrict access.