Varonis DatAdvantage and IDU Classification Framework
November 01, 2013
$17,000 DatAdvantage, $9,000 IDU Classification Framework for 100 users
This is arguably the most automated of the tools we saw.
Policy setup is the core of this, as with most data classification tools. Once the rule set is established, the IDU Classification Framework takes over and performs a variety of services. Its results are presented in the DatAdvantage interface which offers a sophisticated user, group and data management console - addressing all from a single pane of glass. Should the system recommend a change in access or policy based on administrator adjustments, it can simulate the impact of the change on users.
Data collection is the key to the process. That means it must discover files and classify content based on rules. It also must discover users and groups and assign file permissions accordingly. When all is ready, the tool processes what it has found, including aggregation and normalization. It then can simulate the results of its efforts and, if all goes well, classifications and access permissions are embedded in persistent metadata.
Varonis is compatible with most Windows and Unix file servers, Linux, Exchange and SharePoint, as well as some types of network-attached storage devices. The price may seem a bit high, but when used with data leakage prevention (DLP), this becomes the first line of defense against loss of control of sensitive data. Even without DLP, DatAdvantage provides a strong source of classification and concurrent control of documents from most of the sources one is likely to need.
At a glance
Product Varonis DatAdvantage and IDU Classification Framework
Company Varonis Systems
Price $17,000 DatAdvantage, $9,000 IDU Classification Framework for 100 users.
What it does Provides data classification for human-generated files, such as documents and SharePoint files or any human-generated files that reside on file servers.
What we liked Smart functionality that can do things - such as find data that needs users - and then finds the users whose activity indicates they should have rights to the data.
SC Magazine Articles
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- Hacker purportedly selling over 650,000 stolen medical records on dark web marketplace
- WhatsApp in the spotlight after Turkey publishes messages of coup officers
- For the incoming federal CISO: Focus on the human side of cybersecurity
- Audit: FBI's threat prioritization process too subjective and sluggish
- 2.3 million 'Warframe,' 'Clash of Kings' accounts compromised
- MS-ISAC official: Ransomware top priority