Digital Guardian takes an inventive angle to protecting the lifeblood of public missions: the data and intellectual property that drives decisions, informs policy, and defines our future.

Our threat-aware data protection software focuses on defending every moment in the life of government data - no matter how it's structured, where it lives, or how it's used. This data-centric platform for data integrity, insider and outsider threat protection, and user activity monitoring is an ideal match for today's boundary-less networks that span agencies, contractors and programs.

By working with Digital Guardian to place the focus on data, public-sector IT and security professionals can accelerate their time to mandate compliance; extend the value of existing IT security assets; move more operations ahead of the threat and beyond the complexity; and keep their promise to protect the people's trust.



GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021


Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021


Contract Number: UVA1482501 Contract Term: May 2, 2014– December 19, 2021


Archived Events


With the rising value and volume of digital assets within agencies, there’s greater risk of insiders stealing sensitive data. Once you grant insider access to your network, perimeter security offers no defense. Bad actors enjoy the latitude that comes with trusted access, and can easily compro...

Public-sector security pros must be ready to sense, locate and stop threats of any size at any time, across every kind of data. But more of these threats are coming from unfamiliar vectors and unexpected actors – including employees and contractor insiders.Digital Guardian helps government res...

Traditional federal security solutions tend to focus on infrastructure, but overlook the employee or contractor. This can create a blind spot for your agency, preventing you from knowing what data users are accessing and what they’re doing with it. This security void, combined with increasin...

The Digital Guardian App for Splunk Enterprise includes a Technology Add-on (TA) that collects data from the Digital Guardian Management Console and normalizes it to the Common Information Model (CIM) so it can be used in the Splunk Enterprise Security App and other CIM compliant Apps. Learn more a...

Public agencies face a growing number of cyber threats from outside sources, from hacktivists and criminal syndicates to state-sponsored actors and rogue “lone wolfs”. These criminals use multiple forms of attack to target and extract critical data – requiring government to continuously g...

“On May 18, 2016, the Department of Defense published Change 2 to DoD 5220.22-M, ‘National Industrial Security Operating Manual (NISPOM).’ NISPOM Change 2 requires contractors to establish and maintain an insider threat program to detect, deter and mitigate insider threats. Contractors mus...

Almost all federal agencies are impacted by compliance mandates designed to protect the integrity of critical government records against accidental and malicious threats. To achieve compliance with these mandates, agencies must be able to identify critical data throughout their organization, clas...