When implementing a tool like Vontu 6.0, the number of technical considerations is almost matched by the quantity of philosophical and policy decisions that must be made.
The Vontu application, from the company of the same name, monitors and manages data in motion and at rest with four different components: Monitor, Prevent, Discover and Protect. During my early tests, Vontu 6.0 demonstrated tight control over sensitive data sent inside and outside the network.
By monitoring a wide sweep of common network protocols and messaging systems, along with file shares, Vontu 6.0 alerted me when test users attempted to send protected data. The product either blocked or logged the transmission of data based on our policies.
But before implementing a data-protection tool like Vontu, IT managers should work closely with legal and auditing professionals to identify what information must be tracked. The second step is to find out where this data is stored—across databases, file shares, files stored on laptops and other mobile devices, and so on.
During my tests, I couldnt help but think of “Star Wars.” If Darth Vader had access to a Vontu system installed on an Empire network, he would have known how the Death Star plans had been transferred to the rebel ship. We would have missed out on an epic tale, but its food for thought for earthbound IT managers.
Check out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.