• Solutions
    • Solutions


    • Scan
    • Analyze
    • Score
    • Automate
    • What is on my network?
      Quickly, comprehensively and accurately assess endpoints and servers for operating system and application vulnerabilities.
    • Which assets are at risk, and what should I do about their vulnerabilities?
      Identify which assets are at risk and receive actionable intelligence to reduce workload and increase effectiveness.
    • How do I measure my overall risk and where should I focus remediation efforts?
      Benefit from a clear, easy-to-understand metric to determine your organization’s security posture.
    • How can I integrate Frontline vulnerability findings into my security workflow?
      Easily integrate discovered, analyzed, scored, and prioritized vulnerabilities into leading security workflow management platforms and SIEMs.
    • Test
    • Educate
    • Compliance
    • How do I assess where I’m exposed from an attacker’s perspective?
      Assess your “network attack surface” and your “personnel attack surface”.
    • How do I ensure all personnel are cognizant of risky “digital behavior”?
      Increase the security IQ of employees, contractors, and patrons to effectively defend against a security breach.
    • Am I meeting requisite compliance standards?
      Leverage the expertise of one of the world’s longest tenured PCI Approved Scanning Vendors (ASV) to achieve compliance AND an optimal level of security.
  • Cloud Subscriptions
    • Frontline Cloud Subscriptions


    • Frontline Advanced™
    • Frontline Pro™
    • Frontline PCI Pro™
    • Frontline Pen Test™
    • Frontline Advanced is Digital Defense’s flagship vulnerability management offering. Powerful and effective, the service is delivered in a rich, affordable and easy to consume subscription.
    • Frontline Pro provides the same industry leading solution subscription as Frontline Advanced, but adds a Personal Security Analyst (PSA) to help lift the burden of vulnerability management.
    • Frontline Payment Card Industry-Professional (Frontline PCI-Pro) service guides businesses through the PCI Data Security Standards (DSS) requirements maze with security expertise and personalized recommendations to achieve compliance.
    • Frontline Pen Test offers a conveniently packaged sequence of periodic (and scheduled) pen tests into an annual subscription.
  • Platform
    • Platform


    • Frontline RNA™
    • Frontline VM™
    • Frontline Reconnaissance Network Appliance (RNA) is a preconfigured network based device used to perform network security assessments without requiring onsite staff.
    • Frontline Vulnerability Manager (VM) is the industry’s most comprehensive, accurate, and easy to use VM platform – bar none.
  • Technologies
    • Technologies


    • DDI NIRV™
    • DDI VRT™
    • DDI DNA™
    • DDI NIRV – the technology core of Frontline RNA™ – works on the principle of real-time event-based tuning. As it learns more about hosts and the network, NIRV adjusts its plugin sets and auditing mechanisms in real time – leading to far more accurate and complete scanning data.
    • While Digital Defense has achieved public acclaim for its superior vulnerability scanning, vulnerability management, and best practice consultative services, we are also actively involved in security threat research.
    • Digital Node Attribution (DNA) is the core technology within Frontline VM that eliminates network drift. As point in time scans from RNA are fed into Frontline Vulnerability Manager™,
  • Professional Services
    • Professional Services


    • Frontline Pen Test Project™
    • Frontline Social Test™
    • SecurED™ Training
    • Understanding and addressing network and host vulnerabilities is, of course, an essential element to strong information security.
    • Social engineering is a popular technique attackers use to gain access to your network and, ultimately, valuable information held by your organization.
    • SecurED, an entertaining awareness training designed to optimize employee retention of serious security intelligence and best practices.
    • TEAM™
    • Consultative Services
    • As your organization grows in size and complexity, determining exposure to information asset risks becomes more challenging, as does your ability to identify threats and implement effective plans to address them.
    • As your organization grows in size and complexity, determining exposure to information asset risks becomes more challenging, as does your ability to identify threats and implement effective plans to address them.
  • Get a Quote

SAN ANTONIO–(BUSINESS WIRE)–Digital Defense, Inc., (DDI) a leading provider in information security risk assessments, announced the publication of the 3rd annual report: 2015 Study of the Legal Industry’s Information Security Assessment Practices.

The study was developed by DDI in collaboration with the International Legal Technology Association (ILTA) LegalSEC Steering Committee and will be disseminated at ILTACON 2015, the association’s annual conference being held in Las Vegas August 30ththrough September 3rd. The objective of the study is to provide relevant intelligence about current and future information security practices specific to legal organizations in North America. The research is meant to answer persistent and difficult questions that most organizations have regarding security practices.

High profile breaches in 2015 that spotlighted the desire for hackers to obtain intellectual property underscore the importance of identifying the weaknesses that could potentially leave organizations exposed. Law firms around the globe are anxious to determine the overall effectiveness of their information security programs and to understand if their practices are aligned with industry peers.

“DDI has seen significant growth in the number of legal firms that we serve. The importance of protecting firm assets and client information is imperative to the reputation of law firms. We are pleased to offer a complimentary study that provides key insight around programs and practices to help organizations refine and enhance their information security programs,” stated Mark Bell, DDI’s Executive Vice President of Operations.

“We are pleased to offer this report to ILTA members each year as they evaluate their information security programs. It is beneficial to illustrate trends from the prior year which are highlighted in the study. The data is provided with the intent to offer a valuable perspective that will assist legal organizations in making positive and informed security decisions to bolster the security posture of their firms and clients,” stated Peggy Wechsler, Program Director for International Legal Technology Association.

The responses were gathered from a questionnaire specifically developed to capture general information about the participants (150+ in the study sample), as well as data specific to their Information Security program and practices. The findings are presented in aggregate with participants anonymous.

A free copy of 2015 Study of the Legal Industry’s Information Security Assessment Practices is available for those not attending the conference.

Share This