Varonis DatAdvantage and IDU Classification Framework
November 01, 2013
$17,000 DatAdvantage, $9,000 IDU Classification Framework for 100 users
This is arguably the most automated of the tools we saw.
Policy setup is the core of this, as with most data classification tools. Once the rule set is established, the IDU Classification Framework takes over and performs a variety of services. Its results are presented in the DatAdvantage interface which offers a sophisticated user, group and data management console - addressing all from a single pane of glass. Should the system recommend a change in access or policy based on administrator adjustments, it can simulate the impact of the change on users.
Data collection is the key to the process. That means it must discover files and classify content based on rules. It also must discover users and groups and assign file permissions accordingly. When all is ready, the tool processes what it has found, including aggregation and normalization. It then can simulate the results of its efforts and, if all goes well, classifications and access permissions are embedded in persistent metadata.
Varonis is compatible with most Windows and Unix file servers, Linux, Exchange and SharePoint, as well as some types of network-attached storage devices. The price may seem a bit high, but when used with data leakage prevention (DLP), this becomes the first line of defense against loss of control of sensitive data. Even without DLP, DatAdvantage provides a strong source of classification and concurrent control of documents from most of the sources one is likely to need.
At a glance
Product Varonis DatAdvantage and IDU Classification Framework
Company Varonis Systems
Price $17,000 DatAdvantage, $9,000 IDU Classification Framework for 100 users.
What it does Provides data classification for human-generated files, such as documents and SharePoint files or any human-generated files that reside on file servers.
What we liked Smart functionality that can do things - such as find data that needs users - and then finds the users whose activity indicates they should have rights to the data.
Sign up to our newsletters
SC Magazine Articles
- Long list of devices believed to be affected by NetUSB vulnerability
- Website observed serving 83 executable files, more than 50 percent malware
- Scammers target oil companies with sneaky attack
- TeslaCrypt used to extort over $76K in recent months
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- FTC gives thumbs up to companies that cooperate during breach probes
- Researchers publish developer guidance for medical device security
- Senate gears up for Saturday USA Freedom Act vote; House breaks for recess
- Researchers observe SVG files being used to distribute ransomware
- Federal prosecutors charge Chinese nationals with trade secret theft