Varonis DatAdvantage and IDU Classification Framework
November 01, 2013
$17,000 DatAdvantage, $9,000 IDU Classification Framework for 100 users
This is arguably the most automated of the tools we saw.
Policy setup is the core of this, as with most data classification tools. Once the rule set is established, the IDU Classification Framework takes over and performs a variety of services. Its results are presented in the DatAdvantage interface which offers a sophisticated user, group and data management console - addressing all from a single pane of glass. Should the system recommend a change in access or policy based on administrator adjustments, it can simulate the impact of the change on users.
Data collection is the key to the process. That means it must discover files and classify content based on rules. It also must discover users and groups and assign file permissions accordingly. When all is ready, the tool processes what it has found, including aggregation and normalization. It then can simulate the results of its efforts and, if all goes well, classifications and access permissions are embedded in persistent metadata.
Varonis is compatible with most Windows and Unix file servers, Linux, Exchange and SharePoint, as well as some types of network-attached storage devices. The price may seem a bit high, but when used with data leakage prevention (DLP), this becomes the first line of defense against loss of control of sensitive data. Even without DLP, DatAdvantage provides a strong source of classification and concurrent control of documents from most of the sources one is likely to need.
At a glance
Product Varonis DatAdvantage and IDU Classification Framework
Company Varonis Systems
Price $17,000 DatAdvantage, $9,000 IDU Classification Framework for 100 users.
What it does Provides data classification for human-generated files, such as documents and SharePoint files or any human-generated files that reside on file servers.
What we liked Smart functionality that can do things - such as find data that needs users - and then finds the users whose activity indicates they should have rights to the data.
SC Magazine Articles
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- Federal court bucks trend, rules general liability insurance covers data breach
- Is Microsoft exposing the supply chain by hardening the enterprise Edge?
- Linux.Mirai Trojan causing mayhem with DDoS attacks
- Vendetta Brothers scalable POS campaign revealed
- Yahoo! data breach likely exceeds 500 million records
- Boards taking more cyber seriously, driven by regulatory requirements, report finds