Overview

Digital Guardian takes an inventive angle to protecting the lifeblood of public missions: the data and intellectual property that drives decisions, informs policy, and defines our future.

Our threat-aware data protection software focuses on defending every moment in the life of government data - no matter how it's structured, where it lives, or how it's used. This data-centric platform for data integrity, insider and outsider threat protection, and user activity monitoring is an ideal match for today's boundary-less networks that span agencies, contractors and programs.

By working with Digital Guardian to place the focus on data, public-sector IT and security professionals can accelerate their time to mandate compliance; extend the value of existing IT security assets; move more operations ahead of the threat and beyond the complexity; and keep their promise to protect the people's trust.

Products

Contracts

Federal

GSA Schedule 70

GS-35F-0119Y
Dec 20, 2011- Dec 19, 2021

SEWP V

NNG15SC03B/NNG15SC27B
May 01, 2015- Apr 30, 2025

State and Local

CMAS

3-12-70-2247E
Aug 28, 2012- Mar 31, 2022

City of Seattle Contract

0000003265
Jul 11, 2014- Dec 19, 2021

Department of General Services PA - Symantec

4400004253
May 01, 2009- Dec 19, 2021

Maryland Master Contract (COTS)

060B2490021
Oct 01, 2012- Sep 30, 2027

State of Indiana Contract

0000000000000000000021430
Aug 01, 2017- Jul 31, 2021

State of New Mexico Contract

80-000-18-00002
Aug 01, 2017- Aug 01, 2021

Texas DIR-TSO-4288

DIR-TSO-4288
Feb 22, 2019- Feb 21, 2021
*Additional Option Years Available

Education

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022

VASCUPP

UVA1482501
May 02, 2014- Dec 19, 2021

Events

Archived Events

Resources

Resource

“On May 18, 2016, the Department of Defense published Change 2 to DoD 5220.22-M, ‘National Industrial Security Operating Manual (NISPOM).’ NISPOM Change 2 requires contractors to establish and maintain an insider threat program to detect, deter and mitigate insider threats. Contractors mus...

With the rising value and volume of digital assets within agencies, there’s greater risk of insiders stealing sensitive data. Once you grant insider access to your network, perimeter security offers no defense. Bad actors enjoy the latitude that comes with trusted access, and can easily compro...



Resources

Today’s most successful enterprises are instrumenting and digitizing virtually every aspect of their business. This change is dramatically increasing the value and volume of sensitive data that must be protected. Enterprise data loss prevention (DLP) is a time-tested solution that ensures your...

Solutions Brief

Many organizations struggle to find qualified security professionals to protect their sensitive data from insider and outsider threats. Even for organizations with a mature security team, deploying solutions often take too long to achieve meaningful results. Digital Guardian’s Managed Security...

Today’s malware is sophisticated, targeted and difficult to detect. With the speed of new threats accelerating, attacks have become inevitable. On the other hand, building and retaining a team of cyber security experts that can detect, respond and remediate these attacks can be incredibly cha...