Somansa Privacy-i SaaS Endpoint DLP
August 22, 2016
£2,719 for 100 users.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Simple to deploy and manage. Good price point and excellent documentation.
- Weaknesses: No support portal that we could find on the website.
- Verdict: Good pure-play DLP with the added advantage of being a SaaS offering (there is an on-premises offering as well, but that is a different product). This is well worth looking at.
This is a cloud-based SaaS product with agents at the endpoints. It is unabashedly a DLP tool and it does that quite well. Management is done through a web-based management console. The upshot is that no hardware is necessary to run a management server.
Normally, our first task would have been to download the agents, but they were provided in our review package. The agent is downloaded from the machine to be protected. However, we could have pushed out our agents to an enterprise had we wished to. We then went to the management console - which Somansa calls the DLPCentre - and started browsing through it. Our first stop was policies.
Privacy-I performs discovery and detection according to policies. Once you have registered a user and the user's endpoint through the agent, the tool will scan through the device to discover whatever your policies determine needs to be protected. In addition to the usual credit card numbers and Social Security numbers - the expected starting point for sensitive data - you will find all sorts of possibilities, such as customer data, financial information, employee data and design information.
We picked a policy that we thought would be tough to enforce: source code. There are a lot of coding formats that developers use, so our question was: How will the agent know that there is source code on the computer? The answer is that you create a set attributed for detection and the agent - with the help of the system in the cloud - learns what to look for. There is a bit more to it than that but you have a large collection of customisable detection rules, patterns, formats, attributes and applications that you can define very simply.
Once you have everything that needs to be discovered defined, you can run discover policies and pinpoint sensitive documents that meet your specifications. Next, we looked at the policies for managing the functionality of the endpoint itself. You can block or allow copying, printing, applications running and how removable media is handled. These policies all can be applied to the devices in the network as you wish.
The system has a good approach to managing incidents. Not only can you as the administrator make decisions about a violation, you can delegate so the result is a workflow for handling incidents. For example, you might delegate HR-related incidents to the director of HR.
There are a lot of initial policy settings and discoveries that are necessary. However, the documentation is excellent in this regard. The quick-installation guide is profusely illustrated with annotated screen shots, and the layout is a formal set of defined tasks in the order you need to get them rolling.
Reporting is excellent and, this being pretty much a pure-play DLP product, we were quite pleased to see the flexibility that the administrator has - both in deployment and ongoing management and incident response. We especially liked the PC Discover Dashboard, an at-a-glance view of what is happening now and what the historical trends are. It is very clear and after looking at its flashing lights of green, yellow, orange or red, there are no questions about your system's status.
Support is included and is offered on an eight-hours-a-day/five-days-a-week basis. It consists of email and phone support. The website is a marketing site and there is no obvious support portal - which we found disappointing. The management console is well laid-out and the functionality is exactly what we would expect from a competent DLP product.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry