Six Ways to Protect Your Organization Inside and Out

Sony, OPM, and most recently MLB. Does anyone know how to prevent data breaches from happening? Many ideas have been suggested, from junking the current system to encrypting everything, but unfortunately they aren’t practical or realistic. Here’s the reality of what we know about data breaches. The latest Verizon Data Breach Investigation Report revealed that…

Continue Reading

The Street Finds Its Own Uses For DatAnywhere

William Gibson, science fiction author of many a cyberpunk classic, wrote that “the street finds its own uses for things” – and while we’ve yet to hear of anyone using DatAnywhere to transfer files to an Artificial Intelligence in orbit, we’ve been collecting a new batch of interesting use cases of DatAnywhere to present to…

Continue Reading

cloud_img

Data in the Cloud – What You Need to Know

Everyone’s talking about the cloud – but what exactly is it?  Should you move your data to the cloud? How do you take advantage of the agility that the cloud offers, without putting your data at risk? Make sure you understand the basics of migrating and storing your data in the cloud:  the risks, rewards,…

Continue Reading

pci

How Varonis Helps with PCI DSS 3.1

The Payment Card Industry Data Security Standard (PCI-DSS) 3.1 is a set of regulations that govern how organizations manage credit card and other cardholder data. Many security professionals advocate that DSS is not only about passing an annual compliance audit, but also having programs in place for continual assessments, remediation, and monitoring. To learn how…

Continue Reading

The Difference Between Organizational Units and Active Directory Groups

Active Directory loves hierarchy. Domains, Organizational Units (OUs), groups, users, and so forth. Sometimes it can be confusing—how do I best structure my AD? We’ve written a bit about domains (How do I name my domain? What happens if I rename my domain?), but today our focus will be on the difference between OUs and groups….

Continue Reading

hello hacker

Lessons from OPM: Turning Security Inside Out With User Behavior Analytics

The US Office of Personnel Management (OPM) suffered a massive breach in early June. They publicly announced that the personally identifiable information or PII of over 4 million current and former government workers had likely been scooped up by hackers. Who done it? At this point, there’s some interesting speculation about the source of the…

Continue Reading

enterprise knowledge

Enterprise Search: Our White Paper Looks Into the Future of Business Knowledge

As enterprise search catches on — thanks to our own DatAnswers — corporate users may be wondering where this technology is leading. In our newest white paper, Enterprise Knowledge: Unlocking Hidden Knowledge in Unstructured Data, we provide a roadmap for the next few miles. Enterprise search can speedily find file content matching the right keywords. And…

Continue Reading

800px-0618-mostnasoci

Light at End of Tunnel for EU Data Regulations

We’ve been posting about the EU’s new regulations for over two years, watching this slow train move in fits and starts. But the long strange journey may soon come to an end.  It’s now likely that the Data Protection Regulation (DPR) will be approved by the end of 2015 or early next year. Of course,…

Continue Reading

gmp

How Varonis Helps with UK’s Good Manufacturing Practice (GMP) Data Integrity Expectations

In 2015, the Medicines & Healthcare Regulatory Agency published a Good Manufacturing Practice (GMP) Data Integrity Expectations for the pharmaceutical industry. This guide is designed to emphasize the importance of data governance and to help ensure that medicine produced are of safe quality. To learn how Varonis solutions can help the pharmaceutical industry with data…

Continue Reading

Winner of Our Insider Threat Data Analysis Contest

Once again our readers have proven themselves up to the challenge of imaginatively solving Metadata Era contest problems. In our last go-around, we asked you to take some basic data points about file access in a hypothetical company and decide whether insiders were lurking. To refresh memories, the problem states there are 100 employees with…

Continue Reading