Attacks/Breaches
7/30/2009
11:30 AM
Connect Directly
LinkedIn
RSS
E-Mail
50%
50%

Rolling Review: Symantec's DLP-9

Symantec's DLP software provides robust leak prevention for endpoints and on the network.

InformationWeek Green - August 3, 2009 InformationWeek Green
Download the entire August 3 issue of InformationWeek, distributed in an all-digital format as part of our Green Initiative
(Registration required.)
We will plant a tree
for each of the first 5,000 downloads.

In the InformationWeek Labs, we take pride in exposing bugs, flaws and security holes in the products we test. Today, we bury our pride and tip our hats to Symantec for bringing to market almost everything we look for in a comprehensive data loss prevention suite via its DLP-9, formerly from Vontu.

We challenged vendors to submit products to satisfy a wide range of DLP needs for midsize and large organizations, including robust endpoint protection, agentless data discovery, quality reporting and alerting, threat detection, and mitigation, along with centralized management and policy distribution. Symantec DLP-9 delivers an impressive array of features in each category.

Starting At The End
Symantec DLP-9 has three core modules: Endpoint DLP, Network DLP, and Storage DLP. Policies can be defined, distributed, and reported on centrally via the Enforce Server, Symantec's Web-enabled management platform.

The DLP-9 Endpoint agent is a relatively small client, around 25 MB. When a user is off the corporate network but still online via a home or public Internet connection, or if you haven't deployed the network components of the DLP suite, the endpoint agent enforces policy so that users can't expose sensitive data through actions such as attaching a document with sensitive information to Web mail or copying and pasting protected content to a Web site.

The agent takes a different approach to enforcement compared with other products we've tested, and it's not necessarily better. Rather than wrapping policy around physical ports on an endpoint, policy is applied to the data you want to protect. For example, you can't shut down a USB port on a given endpoint completely, but you can prevent confidential data from being copied to removable media. This allows for greater flexibility for end users, because they can use their USB ports for legitimate business needs, while the policy engine stops unauthorized copying of sensitive information. However, this setup puts the onus on IT to identify and fingerprint sensitive files and documents and then ensure the appropriate polices are in place on all endpoints.

This is not a one-time operation and will require ongoing effort, particularly for large or distributed enterprises and those companies with a significant population of mobile workers. To help alleviate this issue, Symantec provides for broad policies to identify data types, such as Social Security numbers, that shouldn't be allowed to be copied to removable media.

DIG DEEPER
The Rise Of Data Loss Prevention
Our analysis of DLP tells you everything you need to know.
The endpoint agent is extremely configurable in terms of the amount of resources you can allocate to various tasks. For example, during an endpoint data discovery task, in which the agent scans the computer for sensitive information, you can set a bandwidth threshold in megabits per second. You can also throttle back the agent during periods of high CPU use or disk I/O, or low battery life.

The only weak link we see on the endpoint is that Symantec's ability to detect various peer-to-peer protocols is port based, so you'll need to rely on upstream security devices to detect and block P2P apps using a signature-based detection engine. We'd also like to see more physical-layer control, such as the ability to completely disable USB/Firewire ports and other removable media devices. Built-in encryption and robust application control capabilities would also be welcome. Those features can be had by licensing Symantec Endpoint Encryption separately, but we'd like to see them merged into the agent.

Our Take
SYMANTEC DLP-9
DLP-9 met every challenge in our Rolling Review of comprehensive data loss prevention suites
Symantec's componentized architecture lets IT shops license and deploy various DLP features on an à la carte basis.
Enterprises pick their own hardware, and the software maintains impressive scalability.
With a list price starting at $25,000, DLP-9 is aimed at midsize and large enterprises.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0985
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName parameter.

CVE-2014-0986
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter.

CVE-2014-0987
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName2 parameter.

CVE-2014-0988
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode parameter.

CVE-2014-0989
Published: 2014-09-20
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode2 parameter.

Best of the Web
Dark Reading Radio