Identity Finder DLP Suite

Powered by SC Magazine
 

The Identity Finder DLP Suite takes an interesting look at securing the endpoint.

 

This product does not deal with locking down ports or limiting functionality to protect against data leakage, but rather looks for sensitive information on the endpoint and provides ways to deal with that sensitive information to meet compliance standards. Administrators can use this product to remotely scan and search remote machines for personal information - such as Social Security and credit card numbers, passwords, PINs and birth dates, among many others. It then can remediate possible compliance violations by shredding, redacting, encrypting or quarantining the sensitive data.

Installation of this product consisted of installing up to three components. The first installed was the server itself. We found installation to be a simple but slightly long process. We also found that the server software relied on several prerequisites that must be met exactly or the installation will not move forward. For example, this product used a backend SQL server database, but the only database support was the most recent version of Microsoft SQL Server. If there was no instance of SQL Server 2008 or later in the environment a new installation had to be done before the installation of the server would continue. After the server was up and running, the two other components were the agents for both Windows and Mac. These agents were simple to deploy throughout our environment. There was also an option to deploy agents through an Active Directory Group Policy Object.

Once installation was complete, all further management was done through a management console, which we found to be well-organized and intuitive to navigate. The dashboard view within the console provided a fairly detailed overview of endpoint status and gave a good bird's-eye view of where possible problems were. We also found policy configuration to be easy and straightforward. Policies were customized according to already existing Active Directory groups, users or computers - giving full granular policy control to administrators.

Documentation included a couple of guides and manuals. The documentation was broken up into separate documents for both the console and endpoints. The console documentation featured installation and full user guides. We found that the installation guide offered a great amount of detail on the setup process and how to get the product up and running with an initial configuration. The user guide also was detailed, but did not go into as much depth as we would have expected. With that said, we found all documentation to be well-organized and easy-to-follow.

Identity Finder offers no-cost support to all customers in the form of an online knowledge base, user forum and access to online FAQs and product documentation, as well as eight-hours-a-day/five-days-a-week phone- and email-based technical support. Customers with subscription-based licenses also get 12/5 phone- and email-based technical assistance, along with dedicated support agents and remote troubleshooting aid. 

With prices ranging from $5 to $20 per seat with prices varying for type and quantity, we find this product to be an excellent value for the money. This suite includes some great features for ensuring that sensitive information spread across endpoints is handled properly to meet compliance policies.

Copyright © SC Magazine, US edition


Identity Finder DLP Suite
 
:
Overall Rating
Verdict:
Feature rich with excellent performance base or forum.
Product Info
Supplier:
 
 
 
 
Top Stories
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Photos: Unboxing the Magnus supercomputer
Pawsey's biggest beast slots into place.
 
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1074

Vote