Good day to all! In the article I will tell you how 5 systems were tested, what was liked and what was not in them. The opinion is subjective, but in practice, and this is not enough on the network ( anti-malware compares and emphasizes that it was basic + on Habré wrote about it , but it turned out a comparative table that someone has / no). We tried the functionality and measured it for ourselves, spent almost half a year and can share our experience. I apologize in advance to the developers - I'll take a look at the minuses of the products as they are (they themselves also speak well of the advantages).
For those who do not want to read the full article - conclusions and tips for choosing DLP immediately:
Always check the declared functionality. We had a bunch of pretty stupid situations when the product didn't fit the official description.
Prepare a detailed TK and give it to the vendor to fill. But even in this case, check the result. The developer always actively speaks only about strengths, there are no problems.
Use during the test the proposed software features to the maximum, and not just those that are planning to purchase. For example, we expanded the list of requirements in the TK when we saw the functionality that we liked.
Keep the statistics yourself, like the final report. Be sure to include items in the criteria: performance over a period of time, stability of server, client and agent parts, conflicts with other systems and quality of support, because This important data, even strongly averaged, you will not find anywhere else.
Pay attention to the security of the DLP itself. After all, there will be such an archive there that any database with personal data in comparison with it fades.
Big point
So, to the point - let's start the review.
Install and configure the system can even a child. The question of a couple of hours - independently and without manual! And it does not matter if components are put on one OS or distributed - in both cases everything is quite obvious.
With the settings, too, everything is good, at first even the eyes run. For example, the fact that in other DLP is simply called “control of the Internet” is divided into a bunch of groups, and each can be assigned its own rules.
There are many models of work - full interception, auditing, blocking.
In general, the coverage of transmission channels from Zekurion is quite extensive, it was noted by all colleagues. But when it came to working with information - jambs got into it.
What you liked:
What did not like:
Illogical modularity .
If the presence of several server parts is perceived positively, then the presence of TWO agents is perceived, to put it mildly, strange. It is difficult to say what logic it serves, I personally did not like this decision - both agents fulfill, in fact, the same role.
Work with the archive.
When the hands reached the work with intercepted information, the opinion about Zekurion changed dramatically. The interface is made using MMC technology, and I think all the problems of such a solution are clear. It is very difficult to work with the archive - it is inconvenient to view data samples and violations found. In many places, the work goes not even with samples from the database, but with filtering of logs, and all the problems arising from this are obvious.
Total:
The unfinished tools for working with the archive were upset, and the archive there is accumulated very considerable - the database is growing at a fantastic speed! Yes, there are sampling tools, there is data compression, there are various filtering options - but this does not solve the problem of an outdated interface. What is done in 2 actions in other systems may require 10 and 20 operations here.
We were given the 5th version for the test. The system controls the basic list of channels (mail, Internet, instant messengers, storage devices, printing) and has a number of predefined analytical functions. The whole system logic is based on them.
Even before the first use, it became clear that the system is not so simple. The fact is that the solution uses several products and platforms that are independent of each other at once. Part of the functionality is in one product, part in another. It is absolutely incomprehensible why the system is so complicated. In general, it would be possible to come to terms with this misfortune, but problems of an architectural plan arise - out of three solutions, the analysis works only for one. For example, for mail analysis works fine, for skype questionable (depending on which agent is installed), for vibeers it doesn't work at all.
What you liked:
What did not like:
Agents.
Suffice it to say that there are several of them. Skype is controlled by one agent, Viber - another. And this is not about the different “modules” of one solution - these are absolutely unrelated solutions.
Products are fragmented - there is a Traffic Monitor, there is a Device Monitor. As I said, they are on different platforms, but in fact it is the same system. And there is also Endpoint Security and Personal Monitor - seemingly related tasks, but this is a completely different solution, not compatible with the first two. Why is it so - again, it is not clear, because the same “working time” would be useful in DLP. Thoughts are sneaking in that this division has been made in order to push several more products along with DLP and increase the total bill.
In the process, there is a problem - you need to climb into different systems, you can not just click on the event twice and see all the details, as is done in ALL other solutions.
Total:
My colleagues and the management agreed that the price offered was unreasonably high for the proposed solution, given that it was a kind of “hodgepodge” of heterogeneous software that was not connected in any way.
The system consists of many applications, both client and server. After installation, so many icons appear on the desktop that at first you experience a state close to shock. Then the situation is smoothed out: in fact, the necessary components are 3-4, the rest is run once and after the configuration is not used. All components are exclusively for Windows applications, no multiplatform is provided. There is some web access, but it works only for graphical reports.
As for the control of channels, then everything is very good - almost all ways are closed. You can log changes to the file system, and changes in the configurations of machines, in short, up to the recording of video user actions. Not everything can be blocked in the system, but there is no problem with evidence.
What you liked:
What did not like:
Channel lock.
You can block not all intercepted channels. And there are no content blocking rules, all solely by attributes.
Complex interface.
Not everyone can start working with the system: there are a lot of consoles and each has a tangled interface that you still need to get over your head to figure out. Or read the manual that no other system is required.
Total:
In terms of working with the archive CIB is really strong. Upset weak content blocking functionality and tightened the console.
TP work is worth mentioning separately. The resulting shoals and wishes were resolved during the pilot, when we had not paid a penny. Perhaps our monetary character played a role, but the fact remains: we worked well with us.
To say that the system unfolds simply is not enough, you rarely will see such an easy-to-install product. The developer claims that a full deployment takes a few hours - in fact it takes minutes! At first, it seems that the product is very simple and in administration - all basic actions are carried out logically and as something taken for granted.
The number of monitored channels is quite extensive - in addition to the basic ones, there are features such as recording sound from a microphone, online connections and other specific channels, the list can be found in any review, so I will not dwell on it.
What you liked:
What did not like:
Data processing.
The big delay in data acquisition connected with features of processing, (indexing) - can be measured by hours.
Reports.
Stupid reports: there are some worked out with which you can deal with and give to the authorities, but the bulk of the reports are absolutely useless.
Glitches.
While testing some other systems, users suffered from problems with agents, then we ourselves were in their place, because server glitches have also been added to the agent - a policy that checks may well hang, dragging the console along with it. Moreover, the situation is not always solved by restarting.
The user can access the blocking rules wizard, in which all parameters are manually selected. For example, if you want to block Gmail attachments - please, the system allows it, get into Shark and watch the traffic when you understand what part of the URI to block - the wizard is at your service. Would you like to send a dropbox? - there is nothing simpler: fill in the test dock, looking at traffic along the way, look for the necessary piece, add it to the rule, check the whole business! Do not forget to play all the download methods. And this needs to be done for all tasks. And there are no locks based on the content.
Total:
The system has powerful capabilities for collecting various data, but apart from viewing the archive, it does not allow you to do anything with them. That is, a possible reaction to the incident is to notify the admin. Locks are declared, but they work specifically. And in general, everything works specifically - it may of course be unlucky for us, but to call it a glitch-free language does not turn.
The test came hard - we obviously knew that there was no functionality we needed, because the system works only on agents, which in our case is not always possible. Anyway, we decided to test it, as the developer assured that we did not see much functionality.
The system is set up very simply, the client-server architecture inherent in DLP solutions is very conditional here. Agents in general can work without communication with the server, so the installation takes place in fact, like a normal program. Everything unfolds extremely quickly, there are special tools for administering the settings - this is quite convenient. Working with the system itself does not cause much difficulty, everything is very clear.
What you liked:
What did not like:
Work exclusively on agents.
There is no possibility to control the network, there is no possibility to block on the proxy, there is almost no integration with corporate systems (post offices, etc.)
There is a text search tool in the archive, but it is supplied separately, and the search capabilities themselves cannot be compared with the same Surcham and Falcon.
Analytics.
All analytics work in real time, and, sort of like, this is a positive moment. But in fact this is not always the case. Regular expressions and search with morphology are available, well, various attribute rules. This is only enough for very simple locks, which does not always allow solving applied problems.
Total:
The system is fundamentally different from the analogs - it is made for “work in the moment”. Interaction with the archive, investigation, data retrieval is all worked out badly. Well, the work is only on agents: you can’t put them on phones and tablets, even if they are corporate - all others do this through a proxy.
I will not draw any global conclusions - for each organization they will have their own, because everyone has different requirements for technology and functionality. I hope only that my review will be useful to someone in the difficult task of choosing a DLP system.
Source: https://habr.com/ru/post/318324/
All Articles