The Authorization Problem

In one of my recent posts, I talked a little bit about how the levels of data protection—authentication, authorization and auditing (or accountability)—applied to unstructured and semi-structured data. By the title of the post I bet you can guess what I’m going to talk about today: authorization. If you recall, authorization refers to what someone…

Share Permissions

In one of our recent posts, What About Individual Users on ACL’s? I mentioned that some organizations have opted for using Windows share permissions instead of NTFS permissions for file shares. This approach goes against Microsoft’s recommendations, but it has one advantage: sharing permissions are applied more or less instantaneously, where NTFS permissions can take…

Steve Jobs – the Ultimate Data Owner

Those of us who have admired Steve Jobs throughout his career have spent the last week reading countless articles about his personal and professional life. Through Steve, Apple has rewarded both consumers and shareholders with incredible products and consistent profitability. So, what is the relationship between Steve Jobs and Varonis? Apple’s maniacal control of its…

Fix Windows Permissions

If you’re a Windows system administrator or involved in Windows security or permissions management in any way at your organization, I can pretty much guarantee you’ve had broken Windows permissions at one point or another. “Broken” can mean a lot of different things, of course, since there are a variety of ways NTFS permissions can…

Global and Regional Requirements for Data Governance

Last week I had the opportunity to present “Ensuring Your Organizations Digital Collaboration is Secure” at an IDC conference in Dubai.  The conference was attended by approximately 100 people from a variety of Middle Eastern countries and companies.  Although the event proved to be beneficial for the obvious reasons (market development and sales), it also…

The Dangers of Data Portability

I read some research recently by Dell KACE, showing that almost two-thirds of IT professionals are worried about security issues associated with the use of personal devices in the workplace. The research, which took in the responses of 750 key IT security professionals, shows that they are worried about the personal devices that seem to…