Varonis Webinar: Eliminating Data Security Threats

On last week’s North American webinar, Eliminating Data Security Threats, Brian Vecci talked about how unstructured data presents some unique challenges to IT organizations, when it comes to identifying who has access, who is accessing and who should have access to Windows, NAS and UNIX folders, SharePoint sites and Exchange mailboxes and public folders. And how […]

Continue Reading →

The Light Is Better Over Here

An analyst reminded me of a joke the other day where a man is looking for his lost keys under a street-light. A passerby asks the man if he is sure about where he dropped them, and the man replies, “I’m actually pretty sure I dropped them in the grass over there.” “Then why aren’t you […]

Continue Reading →

Data Connectors Chicago

I just got back from a fantastic Data Connectors event in Chicago where I had the opportunity to speak to a group of IT security professionals about how we think about unstructured data governance. The theme of the presentation was on Authentication, Authorization and Accountability, and how we need the right metadata and automation to […]

Continue Reading →

We Can’t Audit Our Lives But We Can Audit Our Data

Two weeks ago my fiancée came home from Christmas shopping. While she was unpacking, she realized she didn’t have her phone with her. She panicked! The idea of losing all her information: phone numbers, addresses, pictures, calendar, etc., was really scary and frustrating. Especially if we consider all the activities we use our phones for […]

Continue Reading →

Forensic Investigation of Trade Secret Theft

Imagine this: You’re working in Security Operations for a major chemical company and the General Counsel shows up at your desk and asks you to provide the following information about the company’s next generation space-aged polymer, commonly known as “transparent aluminum:” All documents accessed by a specific employee, “Allen Carey” Any documents that contain the […]

Continue Reading →

Why You Need An Audit Trail

Imagine if a representative from your bank called you, and said, “Sir/Ma’am, for the next three days our system to audit account activity will be down, and we will be unable to track activity on your bank account. There will be no information on withdrawals or deposits available. Tracking will resume in three days. Would […]

Continue Reading →

Why Do SharePoint Permissions Cause So Much Trouble?

SharePoint permissions can be the stuff of nightmares.  At Varonis, we get a chance to meet with a lot of SharePoint administrators and it’s rare that they’re not exhausted trying to manage user permissions. SharePoint’s a useful collaboration platform—and Microsoft’s fastest selling product ever—but helping to ensure proper permissions and access control is probably not […]

Continue Reading →

Identifying Active Directory Privilege Escalation

One common headache for IT managers is tracking privileged access, for instance: who granted someone privileged access? When did it happen? What did they do? These questions have ramifications for change control, audit and security—many organizations have sought technologies to help answer them quickly and easily. Varonis helps organizations see what administrators access and change […]

Continue Reading →

Case Study: Mercy Health and Aged Care

Data governance and protection is extremely important for healthcare organizations and Mercy Health and Aged Care (MHAC) is no exception.  MHAC must comply with numerous industry security regulations in the face of rapid data growth and expanding infrastructure. Read about the business benefits MHAC has been able to realize with Varonis DatAdvantage and DataPrivilege, including: […]

Continue Reading →