Digital Guardian takes an inventive angle to protecting the lifeblood of public missions: the data and intellectual property that drives decisions, informs policy, and defines our future.

Our threat-aware data protection software focuses on defending every moment in the life of government data - no matter how it's structured, where it lives, or how it's used. This data-centric platform for data integrity, insider and outsider threat protection, and user activity monitoring is an ideal match for today's boundary-less networks that span agencies, contractors and programs.

By working with Digital Guardian to place the focus on data, public-sector IT and security professionals can accelerate their time to mandate compliance; extend the value of existing IT security assets; move more operations ahead of the threat and beyond the complexity; and keep their promise to protect the people's trust.



GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021

SEWP Contracts


Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021


Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Maryland Master Contract (COTS)

Project No.: 060B249002, Term: September 30, 2027

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through May 31, 2018 (with 2 option renewal years)

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Orange County National IPA Co-Op

Through May 31, 2020 (with 2 option years)

State of Indiana Contract

Contract Number: 0000000000000000000021430 Contract Period: August 1, 2017 – July 31, 2019

State of New Mexico Contract

Contract Number: 80-000-18-00002 Contract Period: August 1, 2017 – August 1, 2021


Contract Number: UVA1482501 Contract Term: May 2, 2014– December 19, 2021

VITA Contract

Term: through March 31, 2018


Archived Events



Combining network and endpoint defenses to stop malware. The Digital Guardian server receives FireEye Alerts and converts new IOC discovered by FireEye into rules for endpoint agents to confirm the extent of an infection, quickly contain that infection, and block new infections.

The Digital Guardian App for Splunk Enterprise includes a Technology Add-on (TA) that collects data from the Digital Guardian Management Console and normalizes it to the Common Information Model (CIM) so it can be used in the Splunk Enterprise Security App and other CIM compliant Apps. Learn more a...


Almost all federal agencies are impacted by compliance mandates designed to protect the integrity of critical government records against accidental and malicious threats. To achieve compliance with these mandates, agencies must be able to identify critical data throughout their organization, clas...

Public agencies face a growing number of cyber threats from outside sources, from hacktivists and criminal syndicates to state-sponsored actors and rogue “lone wolfs”. These criminals use multiple forms of attack to target and extract critical data – requiring government to continuously g...

Traditional federal security solutions tend to focus on infrastructure, but overlook the employee or contractor. This can create a blind spot for your agency, preventing you from knowing what data users are accessing and what they’re doing with it. This security void, combined with increasin...

Public-sector security pros must be ready to sense, locate and stop threats of any size at any time, across every kind of data. But more of these threats are coming from unfamiliar vectors and unexpected actors – including employees and contractor insiders.Digital Guardian helps government res...

“On May 18, 2016, the Department of Defense published Change 2 to DoD 5220.22-M, ‘National Industrial Security Operating Manual (NISPOM).’ NISPOM Change 2 requires contractors to establish and maintain an insider threat program to detect, deter and mitigate insider threats. Contractors mus...

With the rising value and volume of digital assets within agencies, there’s greater risk of insiders stealing sensitive data. Once you grant insider access to your network, perimeter security offers no defense. Bad actors enjoy the latitude that comes with trusted access, and can easily compro...