Identity Finder DLP Suite

Powered by SC Magazine
 

The Identity Finder DLP Suite takes an interesting look at securing the endpoint.

 

This product does not deal with locking down ports or limiting functionality to protect against data leakage, but rather looks for sensitive information on the endpoint and provides ways to deal with that sensitive information to meet compliance standards. Administrators can use this product to remotely scan and search remote machines for personal information - such as Social Security and credit card numbers, passwords, PINs and birth dates, among many others. It then can remediate possible compliance violations by shredding, redacting, encrypting or quarantining the sensitive data.

Installation of this product consisted of installing up to three components. The first installed was the server itself. We found installation to be a simple but slightly long process. We also found that the server software relied on several prerequisites that must be met exactly or the installation will not move forward. For example, this product used a backend SQL server database, but the only database support was the most recent version of Microsoft SQL Server. If there was no instance of SQL Server 2008 or later in the environment a new installation had to be done before the installation of the server would continue. After the server was up and running, the two other components were the agents for both Windows and Mac. These agents were simple to deploy throughout our environment. There was also an option to deploy agents through an Active Directory Group Policy Object.

Once installation was complete, all further management was done through a management console, which we found to be well-organized and intuitive to navigate. The dashboard view within the console provided a fairly detailed overview of endpoint status and gave a good bird's-eye view of where possible problems were. We also found policy configuration to be easy and straightforward. Policies were customized according to already existing Active Directory groups, users or computers - giving full granular policy control to administrators.

Documentation included a couple of guides and manuals. The documentation was broken up into separate documents for both the console and endpoints. The console documentation featured installation and full user guides. We found that the installation guide offered a great amount of detail on the setup process and how to get the product up and running with an initial configuration. The user guide also was detailed, but did not go into as much depth as we would have expected. With that said, we found all documentation to be well-organized and easy-to-follow.

Identity Finder offers no-cost support to all customers in the form of an online knowledge base, user forum and access to online FAQs and product documentation, as well as eight-hours-a-day/five-days-a-week phone- and email-based technical support. Customers with subscription-based licenses also get 12/5 phone- and email-based technical assistance, along with dedicated support agents and remote troubleshooting aid. 

With prices ranging from $5 to $20 per seat with prices varying for type and quantity, we find this product to be an excellent value for the money. This suite includes some great features for ensuring that sensitive information spread across endpoints is handled properly to meet compliance policies.

Copyright © SC Magazine, US edition


Identity Finder DLP Suite
 
:
Overall Rating
Verdict:
Feature rich with excellent performance base or forum.
Product Info
Supplier:
 
 
 
 
Top Stories
Earning the right to innovate
Breaking down the barriers to innovation is a long, but rewarding process, says Bank of Queensland Group CIO, Julie Bale.
 
A call for timely reporting
[Blog post] Businesses need incentives to keep customer data secure.
 
Doubts cast on Queensland's ICT Dashboard
Opposition, former Govt CIO say it can't be trusted.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  26%
 
Application integration concerns
  3%
 
Security and compliance concerns
  29%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  23%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  5%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 827

Vote