August 23, 2013
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Safetica’s all-round uniform simplicity
- Weaknesses: Determining overall cost of the product
- Verdict: A good all-round product
Safetica manages and controls data security at the endpoint through its client-server architecture and three major components: Endpoint Client, Management Server and the Safetica Management Console.
It controls all application inputs and outputs via a rules-based sandbox mechanism. This makes Safetica effectively application-agnostic and enables it to monitor and encapsulate the data flow from an open set of applications. Consequently, it is not dependent on a specific service, IP range or individually defined protocol set. Safetica's data loss prevention function uses whitelist policies coupled with 'safe zones', helping to define where data can reside.
Endpoint Client controls both network and traffic originating from the individual computer from its endpoint position. It has two elements: the Safetica Client Service and the Endpoint Security Tools. The Client Service monitors endpoint activity and communicates with the database and the Safetica Management Service. Endpoint Security Tools include file and disk encryption, data shredding and password management, and are for day-to-day use at the individual endpoint computer.
The Management Console handles the policy development and reporting, central management of client systems and database management. Data leak prevention is one of the tool's strongest features.
Installation tools came on a DVD, while the installation and user documentation was downloaded from the company's website. Safetica also provides three graphics to help determine the method that best suits a customer's needs.
A standard installation environment has three major aspects: the first is for from 20 to more than 200 endpoint computers with the Safetica client-agent installed. These protected/monitored computers each have MS Windows XP SP3 or a newer operating system, 2GB of free disk space and 2GB of RAM memory. The second, Safetica Management Service, is installed on a server (application, dedicated or virtualised). Additional servers may be needed for better load balancing. The third aspect is a MS SQL Server installed on a shared or dedicated system with an optimum 500GB of free disk space. The server should run on MS Windows Server 2003 SP2 or more recent versions. The small installation places Safetica Management Service on a network without a domain so that it can run on a standard computer.
Our installation was fairly normal using a Windows 2008 R2 Server. The Management Service requires three databases for settings, records and categories. The components were installed on a dedicated system with Active Directory. Once installed, the configuration seemed a bit complicated when integrating client systems into the tree. That aside, everything worked as advertised. Alerting was easy to use and the system provided some basic SIEM integration.
Email support is eight-hours-a-day/five-days-a-week during the entire subscription period. According to Safetica, assistance is free at the moment. Phone support is available upon individual request.
This tool is a nice entry into endpoint security and we found that the value for money is good.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry