Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

DLP Rolling Review: TrendMicro Leakproof

Rolling Review
Data Loss Prevention
Data-Loss Prevention Rolling Review Kick-Off

Vendors offer more options for protecting data throughout its travels. We'll put their claims to the test.
Reviewed so far:

DLP Rolling Review: RSA Takes Classification Up A Notch
The RSA Data Loss Prevention Suite sports a stellar user interface and an uncanny ability to sniff out sensitive data wherever it resides.

DLP Rolling Review: Safend Safeguards At The Endpoint
Safend estimates that 60% of corporate data resides on endpoints, and that's where Safend Protector Endpoint aims its DLP resources.

DLP Rolling Review: Code Green's DLP Appliance
The CI 1500 performed well in many areas and not so well in others.

DLP Rolling Review: Symantec's DLP-9
We tip our hats toSymantec for bringing to market almost everything we look for in a comprehensive data loss prevention suite via its DLP-9, formerly from Vontu.

DLP Rolling Review: TrendMicro Leakproof
Trend seems to have fully integrated Provilla's DLP technology into its core offerings.

DLP Rolling Review: Sophos Endpoint Security
Sophos has made strategic acquisitions in an attempt to round out its range of endpoint security capabilities.
DLP Rolling Review Wrap-Up
We've got interesting results and observations that will help you decide if DLP fits your risk management strategy, and if so, which vendors you should be talking to.
Trend jumped into the DLP space through its acquisition of Provilla back in October 2007.  As was the case with Mcafee and Symantec, Trend followed the crowd and scooped up a content aware security solution in order to fill in some feature gaps in their endpoint product offering. Almost two years later, Trend seems to have fully integrated Provilla's DLP technology into its core offerings.  In the 250 to 500 seat count range, pricing for LeakProof DLP starts at around $47/seat. The sixty-four thousand dollar question is, does it work?

The LeakProof DLP management server was delivered to the InformationWeek labs as a bootable Linux based ISO image.  Deploying in our test environment was a snap, you won't need professional services.  A wizard driven installation routine worked us through various standard system and network interface configuration tasks.   After completion, we were able to hit the web enabled management interface right away and got right to work trying to break LeakProof 5.0.  

Because LeakProof is primarily an endpoint solution, testing various data in motion leakage scenarios was not applicable here. We concentrated our efforts on the features that LeakProof does focuses on such as data discovery, endpoint device control, and the enforcement of compliance policy through various out of the box and customizable data description and pattern matching rules.

LeakProof uses data using data patterns, keywords, file attributes and digital fingerprinting to find sensitive data before it is transmitted.  Trend managed to get a patent for its "DataDNA" method of digital fingerprinting.  Trend claims that it can uniquely detect with nearly zero false positives any attempt to alter, copy/paste, or otherwise manipulate in any way a data source or file that's been run through the DataDNA process.  DataDNA comes packaged with LeakProof's "Advanced" management server, but DataDNA was unavailable with the standard version sent in for testing.  LeakProof sported compliance templates for PCI, HIPAA, GLBA, along with a couple others structured to find Personally Identfiable Information (PII).

trend-ourtake.png


Page:  1 | 2  | Next Page »


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers