Varonis DatAdvantage and IDU Classification Framework
November 01, 2013
$17,000 DatAdvantage, $9,000 IDU Classification Framework for 100 users
This is arguably the most automated of the tools we saw.
Policy setup is the core of this, as with most data classification tools. Once the rule set is established, the IDU Classification Framework takes over and performs a variety of services. Its results are presented in the DatAdvantage interface which offers a sophisticated user, group and data management console - addressing all from a single pane of glass. Should the system recommend a change in access or policy based on administrator adjustments, it can simulate the impact of the change on users.
Data collection is the key to the process. That means it must discover files and classify content based on rules. It also must discover users and groups and assign file permissions accordingly. When all is ready, the tool processes what it has found, including aggregation and normalization. It then can simulate the results of its efforts and, if all goes well, classifications and access permissions are embedded in persistent metadata.
Varonis is compatible with most Windows and Unix file servers, Linux, Exchange and SharePoint, as well as some types of network-attached storage devices. The price may seem a bit high, but when used with data leakage prevention (DLP), this becomes the first line of defense against loss of control of sensitive data. Even without DLP, DatAdvantage provides a strong source of classification and concurrent control of documents from most of the sources one is likely to need.
At a glance
Product Varonis DatAdvantage and IDU Classification Framework
Company Varonis Systems
Price $17,000 DatAdvantage, $9,000 IDU Classification Framework for 100 users.
What it does Provides data classification for human-generated files, such as documents and SharePoint files or any human-generated files that reside on file servers.
What we liked Smart functionality that can do things - such as find data that needs users - and then finds the users whose activity indicates they should have rights to the data.
Sign up to our newsletters
SC Magazine Articles
- Microsoft report explores dangers of running expired security software
- Survey: real-time SIEM solutions help orgs detect attacks within minutes
- Vulnerabilities identified in three Advantech products
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- State Department hack may be tied to White House network breach
- Operators disable firewall features to increase network performance, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Upping the ante: PCI Security Standard
- Study: Third of employees use company devices for social media and online shopping
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Swedish appeals court nixes Assange's plea
- Critical XSS vulnerability addressed in WordPress
- The Internet of Things (IoT) will fail if security has no context