This product does not deal with locking down ports or limiting functionality to protect against data leakage, but rather looks for sensitive information on the endpoint and provides ways to deal with that sensitive information to meet compliance standards. Administrators can use this product to remotely scan and search remote machines for personal information - such as Social Security and credit card numbers, passwords, PINs and birth dates, among many others. It then can remediate possible compliance violations by shredding, redacting, encrypting or quarantining the sensitive data.
Installation of this product consisted of installing up to three components. The first installed was the server itself. We found installation to be a simple but slightly long process. We also found that the server software relied on several prerequisites that must be met exactly or the installation will not move forward. For example, this product used a backend SQL server database, but the only database support was the most recent version of Microsoft SQL Server. If there was no instance of SQL Server 2008 or later in the environment a new installation had to be done before the installation of the server would continue. After the server was up and running, the two other components were the agents for both Windows and Mac. These agents were simple to deploy throughout our environment. There was also an option to deploy agents through an Active Directory Group Policy Object.
Once installation was complete, all further management was done through a management console, which we found to be well-organized and intuitive to navigate. The dashboard view within the console provided a fairly detailed overview of endpoint status and gave a good bird's-eye view of where possible problems were. We also found policy configuration to be easy and straightforward. Policies were customized according to already existing Active Directory groups, users or computers - giving full granular policy control to administrators.
Documentation included a couple of guides and manuals. The documentation was broken up into separate documents for both the console and endpoints. The console documentation featured installation and full user guides. We found that the installation guide offered a great amount of detail on the setup process and how to get the product up and running with an initial configuration. The user guide also was detailed, but did not go into as much depth as we would have expected. With that said, we found all documentation to be well-organized and easy-to-follow.
Identity Finder offers no-cost support to all customers in the form of an online knowledge base, user forum and access to online FAQs and product documentation, as well as eight-hours-a-day/five-days-a-week phone- and email-based technical support. Customers with subscription-based licenses also get 12/5 phone- and email-based technical assistance, along with dedicated support agents and remote troubleshooting aid.
With prices ranging from $5 to $20 per seat with prices varying for type and quantity, we find this product to be an excellent value for the money. This suite includes some great features for ensuring that sensitive information spread across endpoints is handled properly to meet compliance policies.
Copyright © SC Magazine, US edition
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @itnews.com.au to your white-listed senders.