Digital Guardian takes an inventive angle to protecting the lifeblood of public missions: the data and intellectual property that drives decisions, informs policy, and defines our future.

Our threat-aware data protection software focuses on defending every moment in the life of government data - no matter how it's structured, where it lives, or how it's used. This data-centric platform for data integrity, insider and outsider threat protection, and user activity monitoring is an ideal match for today's boundary-less networks that span agencies, contractors and programs.

By working with Digital Guardian to place the focus on data, public-sector IT and security professionals can accelerate their time to mandate compliance; extend the value of existing IT security assets; move more operations ahead of the threat and beyond the complexity; and keep their promise to protect the people's trust.



GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021

SEWP Contracts


Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - May 1, 2025

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021


Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Maryland Master Contract (COTS)

Project No.: 060B249002, Term: September 30, 2027

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through November 30, 2021

Orange County National IPA Co-Op

Through May 31, 2020 (with 2 option years)

State of Indiana Contract

Contract Number: 0000000000000000000021430 Term: August 1, 2017 – July 31, 2021

State of New Mexico Contract

Contract Number: 80-000-18-00002 Contract Period: August 1, 2017 – August 1, 2021

Texas DIR-TSO-4288

Texas DIR Contract: DIR-TSO-4288 Contract Period: Through February 21, 2021 (with 2 option years)


Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021


Archived Events



With the rising value and volume of digital assets, there’s greater risk of Insiders leaking or stealing sensitive data. Once you grant insiders access to your network, perimeter security offers no protection. Guarding against insider threats requires a focus on understanding and securing the data...


Combining network and endpoint defenses to stop malware. The Digital Guardian server receives FireEye Alerts and converts new IOC discovered by FireEye into rules for endpoint agents to confirm the extent of an infection, quickly contain that infection, and block new infections.

Digital Guardian Endpoint Data Loss Prevention (DLP) gives you everything you need – the deepest visibility, the fine-grained control and the industry’s broadest data loss protection coverage – to stop sensitive data from getting out of your organization at the greatest point of risk – ...

Digital Guardian data classification can automatically locate and identify your sensitive data then apply labels to classify and determine how the data is handled. Our comprehensive data classification solutions - from automated content and context-based classification to manual user classificat...

The Digital Guardian App for Splunk Enterprise includes a Technology Add-on (TA) that collects data from the Digital Guardian Management Console and normalizes it to the Common Information Model (CIM) so it can be used in the Splunk Enterprise Security App and other CIM compliant Apps. Learn more a...


Almost all federal agencies are impacted by compliance mandates designed to protect the integrity of critical government records against accidental and malicious threats. To achieve compliance with these mandates, agencies must be able to identify critical data throughout their organization, clas...

Public agencies face a growing number of cyber threats from outside sources, from hacktivists and criminal syndicates to state-sponsored actors and rogue “lone wolfs”. These criminals use multiple forms of attack to target and extract critical data – requiring government to continuously g...

Traditional federal security solutions tend to focus on infrastructure, but overlook the employee or contractor. This can create a blind spot for your agency, preventing you from knowing what data users are accessing and what they’re doing with it. This security void, combined with increasin...

Public-sector security pros must be ready to sense, locate and stop threats of any size at any time, across every kind of data. But more of these threats are coming from unfamiliar vectors and unexpected actors – including employees and contractor insiders.Digital Guardian helps government res...

“On May 18, 2016, the Department of Defense published Change 2 to DoD 5220.22-M, ‘National Industrial Security Operating Manual (NISPOM).’ NISPOM Change 2 requires contractors to establish and maintain an insider threat program to detect, deter and mitigate insider threats. Contractors mus...