Data leakage prevention (DLP)
WHAT: Provides classification for data, largely in a Microsoft environment.
PRICE: Starts at $89 per user.
VENDOR: Boldon James
WHAT: Allows users to apply relevant visual and metadata labels (protective markings) to messages.
PRICE: $15.20 per user for the combination of Email, Office and File Classifier at 5,000 users.
WHAT: This is a clean product with a well thought-out goal and a well-executed solution. It is part of the overall CA suite of access control products with which it integrates smoothly, and it offers dynamic classification and recognition.
PRICE: $20,000, plus 20 percent annual maintenance.
VENDOR: Identity Finder
WHAT: Sensitive Data Manager ties discovery to business issues making classification easier and more relevant.
PRICE: Starts at $25,000 for 100 seats.
VENDOR: Hexis Cyber Solutions
WHAT: A well-designed network access control solution that can be deployed in minutes.
VENDOR: Forum Systems
WHAT: A comprehensive application security appliance that allows users to set up robust security over a variety of different protocols and data formats.
PRICE: Starting at $25,000, plus support.
WHAT: A policy-based network access control product that allows for inventory, classification and regulation of endpoints and network devices. It is available in several different configurations allowing flexibility and scalability.
PRICE: $9,752 (software appliance); $13,995 (CT100/A hardware appliance).
WHAT: A software-based identity management product.
PRICE: Starts at $45 per user.
WHAT: SaaS-delivered secure collaboration application.
PRICE: $75 per user per year.
VENDOR: Varonis Systems
WHAT: Provides data classification for human-generated files, such as documents and SharePoint files or any human-generated files that reside on file servers.
PRICE: $17,000 DatAdvantage, $9,000 IDU Classification Framework for 100 users
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- Data at risk for 9,000 individuals following unauthorized access to SRI Inc. website
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure