DLP Rolling Review: TrendMicro Leakproof
Posted by
Randy George and InformationWeek
October 02, 2009
Vendors offer more options for protecting data throughout its travels. We'll put their claims to the test.
DLP Rolling Review: RSA Takes Classification Up A Notch
The RSA Data Loss Prevention Suite sports a stellar user interface and an uncanny ability to sniff out sensitive data wherever it resides.
DLP Rolling Review: Safend Safeguards At The Endpoint
Safend estimates that 60% of corporate data resides on endpoints, and that's where Safend Protector Endpoint aims its DLP resources.
DLP Rolling Review: Code Green's DLP Appliance
The CI 1500 performed well in many areas and not so well in others.
DLP Rolling Review: Symantec's DLP-9
We tip our hats toSymantec for bringing to market almost everything we look for in a comprehensive data loss prevention suite via its DLP-9, formerly from Vontu.
DLP Rolling Review: TrendMicro Leakproof
Trend seems to have fully integrated Provilla's DLP technology into its core offerings.
DLP Rolling Review: Sophos Endpoint Security
Sophos has made strategic acquisitions in an attempt to round out its range of endpoint security capabilities.
We've got interesting results and observations that will help you decide if DLP fits your risk management strategy, and if so, which vendors you should be talking to.
The LeakProof DLP management server was delivered to the InformationWeek labs as a bootable Linux based ISO image. Deploying in our test environment was a snap, you won't need professional services. A wizard driven installation routine worked us through various standard system and network interface configuration tasks. After completion, we were able to hit the web enabled management interface right away and got right to work trying to break LeakProof 5.0.
Because LeakProof is primarily an endpoint solution, testing various data in motion leakage scenarios was not applicable here. We concentrated our efforts on the features that LeakProof does focuses on such as data discovery, endpoint device control, and the enforcement of compliance policy through various out of the box and customizable data description and pattern matching rules.
LeakProof uses data using data patterns, keywords, file attributes and digital fingerprinting to find sensitive data before it is transmitted. Trend managed to get a patent for its "DataDNA" method of digital fingerprinting. Trend claims that it can uniquely detect with nearly zero false positives any attempt to alter, copy/paste, or otherwise manipulate in any way a data source or file that's been run through the DataDNA process. DataDNA comes packaged with LeakProof's "Advanced" management server, but DataDNA was unavailable with the standard version sent in for testing. LeakProof sported compliance templates for PCI, HIPAA, GLBA, along with a couple others structured to find Personally Identfiable Information (PII).

Page: 1 | 2 | Next Page »










