Upcoming Events

A Network Computing Webcast:
SSDs and New Storage Options in the Data Center

March 13, 2013
11:00 AM PT / 2:00 PM ET

Solid state is showing up at every level of the storage stack -- as a memory cache, an auxiliary storage tier for hot data that's automatically shuttled between flash and mechanical disk, even as dedicated primary storage, so-called Tier 0. But if funds are limited, where should you use solid state to get the best bang for the buck? In this Network Computing webcast, we'll discuss various deployment options.

Register Now!


Interop Las Vegas 2013
May 6-10, 2013
Mandalay Bay Conference Center
Las Vegas

Attend Interop Las Vegas 2013 and get access to 125+ workshops and conference classes, 350+ exhibiting companies and the latest tech.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

DLP Rolling Review: TrendMicro Leakproof

Rolling Review
Data Loss Prevention
Data-Loss Prevention Rolling Review Kick-Off

Vendors offer more options for protecting data throughout its travels. We'll put their claims to the test.
Reviewed so far:

DLP Rolling Review: RSA Takes Classification Up A Notch
The RSA Data Loss Prevention Suite sports a stellar user interface and an uncanny ability to sniff out sensitive data wherever it resides.

DLP Rolling Review: Safend Safeguards At The Endpoint
Safend estimates that 60% of corporate data resides on endpoints, and that's where Safend Protector Endpoint aims its DLP resources.

DLP Rolling Review: Code Green's DLP Appliance
The CI 1500 performed well in many areas and not so well in others.

DLP Rolling Review: Symantec's DLP-9
We tip our hats toSymantec for bringing to market almost everything we look for in a comprehensive data loss prevention suite via its DLP-9, formerly from Vontu.

DLP Rolling Review: TrendMicro Leakproof
Trend seems to have fully integrated Provilla's DLP technology into its core offerings.

DLP Rolling Review: Sophos Endpoint Security
Sophos has made strategic acquisitions in an attempt to round out its range of endpoint security capabilities.
DLP Rolling Review Wrap-Up
We've got interesting results and observations that will help you decide if DLP fits your risk management strategy, and if so, which vendors you should be talking to.
Trend jumped into the DLP space through its acquisition of Provilla back in October 2007.  As was the case with Mcafee and Symantec, Trend followed the crowd and scooped up a content aware security solution in order to fill in some feature gaps in their endpoint product offering. Almost two years later, Trend seems to have fully integrated Provilla's DLP technology into its core offerings.  In the 250 to 500 seat count range, pricing for LeakProof DLP starts at around $47/seat. The sixty-four thousand dollar question is, does it work?

The LeakProof DLP management server was delivered to the InformationWeek labs as a bootable Linux based ISO image.  Deploying in our test environment was a snap, you won't need professional services.  A wizard driven installation routine worked us through various standard system and network interface configuration tasks.   After completion, we were able to hit the web enabled management interface right away and got right to work trying to break LeakProof 5.0.  

Because LeakProof is primarily an endpoint solution, testing various data in motion leakage scenarios was not applicable here. We concentrated our efforts on the features that LeakProof does focuses on such as data discovery, endpoint device control, and the enforcement of compliance policy through various out of the box and customizable data description and pattern matching rules.

LeakProof uses data using data patterns, keywords, file attributes and digital fingerprinting to find sensitive data before it is transmitted.  Trend managed to get a patent for its "DataDNA" method of digital fingerprinting.  Trend claims that it can uniquely detect with nearly zero false positives any attempt to alter, copy/paste, or otherwise manipulate in any way a data source or file that's been run through the DataDNA process.  DataDNA comes packaged with LeakProof's "Advanced" management server, but DataDNA was unavailable with the standard version sent in for testing.  LeakProof sported compliance templates for PCI, HIPAA, GLBA, along with a couple others structured to find Personally Identfiable Information (PII).

trend-ourtake.png


Page:  1 | 2  | Next Page »


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
IaaS Providers
Cloud Computing Comparison
With 17 top vendors and features matrixes covering more than 60 decision points, this is your one-stop shop for an IaaS shortlist.
IaaS Providers

Research and Reports

The Virtual Network
February 2013

Network Computing: February 2013

Upcoming Events



TechWeb Careers