How do I deploy Nightfall?
Nightfall integrates with services via their APIs, and is fully cloud hosted. Nightfall is the industry's first cloud-native DLP platform.…Read More
How long does it take to deploy Nightfall?
For most systems it takes on the order of minutes to deploy. Because Nightfall is cloud-native and integrates directly via…Read More
How does Nightfall classify data?
Nightfall uses machine learning to classify data. Our deep learning-based classifiers are trained on massive volumes of data to yield…Read More
What types of data does Nightfall classify?
Nightfall classifies over 100+ types of sensitive data, including forms of personally identifiable data (PII), protected health information (PHI), payment…Read More
Does Nightfall scan unstructured data?
Yes, Nightfall scans unstructured data and parses text from 100+ file types. For example, this could be data like customer…Read More
How does Nightfall integrate with Slack?
Nightfall integrates directly with your Slack organization or workspace as a Slack bot. Installing the bot takes just one click…Read More
How does Nightfall yield time savings for my team?
Nightfall saves time by automating data detection, classification, and remediation. First, Nightfall installs in minutes, so you won't need IT…Read More
How does Nightfall help with compliance?
Compliance regimes like GDPR, CCPA, HIPAA, and PCI-DSS require effective management & protection of customer data to keep consumers safe.…Read More
Nightfall vs. Legacy DLP: What’s the difference?
Traditional data loss prevention (DLP) platforms focus primarily on securing data on endpoints (devices like laptops, phones, servers) or networks.…Read More
Latest from the Blog
CISO Insider S1E4 – Change management and risk triage with Lisa Hawke
Everlaw VP of Security and Compliance Lisa Hawke joins CISO Insider to share her insights on the hidden skills necessary to succeed as an infosec leader and her journey from working in environmental law to security and compliance. Also, get some birding recommendations in Central Park.Read Now
3 Permanent Security Risks in a Post-Pandemic World
These threats will continue to take priority for companies of all sizes well into the future. Learn how to protect your data even when the pandemic is over.Discover More
January news & updates from Nightfall
Read the latest from Nightfall: the launch of our CISO Insider podcast, blog posts on key security vulnerabilities within Google Drive and what we can learn from the biggest GitHub security incidents of 2020, and more.Read Now
Network, Endpoint, and Cloud DLP: A Quick Guide
Learn the differences between network security, endpoint security, cloud DLP, and how these tools and platforms work together.Discover More
How is Data Stored in Confluence?
Understanding how data is stored in Confluence, as well as the security measures in place, can help you design a data protection strategy that works.Discover More
CISO Insider S1E3 — The OODA Loop with J.J. Agha
Compass Chief Information Security Officer J.J. Agha joins CISO Insider to share some of the most important learnings from his career as a security leader: the many practical applications of the OODA loop in infosec, how COVID is forcing us all to become better communicators, and why creative problem solving can help us face the neverending challenges of ambiguity while working in tech.Read Now
CISO Insider S1E2 – “You have unlimited questions left” with Ty Sbano, Part 2
Sisense Chief Security & Trust Officer Ty Sbano returns for the second part of his interview with us on finding community within the infosec industry, plus some must-listen security podcasts, and things for early career professionals to look out for as COVID-19 extends into 2021.Read Now
CISO Insider S1E1 – “Cybersecurity is a mindset” with Ty Sbano, Part 1
We're excited to have Sisense Chief Security & Trust Officer Ty Sbano as our very first guest on the CISO Insider podcast. In part 1 of our chat, Ty discusses his path to the CISO role: his early beginnings, his learnings on the job, and how to find the right balance while building a career.Read Now
Why Third-Party Risk on Google Drive Should Be a #1 Concern
Third-party risk is especially prevalent in Google Drive: learn how to protect your files from accidental breaches through partners and contractors.Read Now
3 Critical Lessons from 2020’s Largest GitHub Leaks
Leaks of credentials and secrets remains a big problem as several major GitHub leaks from 2020 show. Learn the largest lesions that organizations can learn from five of the biggest GitHub leaks of the year.Read More
Threat Alert: Protect Your Files from New Google Drive Security Risks
Hackers are increasingly targeting Google Drive with phishing and malware attacks. Here’s how to keep your sensitive information safe.Read Now