Big Data Management On Your NAS Made Easy

Got data? Got a lot of it? Most companies with NAS devices are struggling with how to manage permissions and understand usage patterns, find data owners, and identify and lock down sensitive information. If any of that sounds familiar, we’ve got the webinar for you. As part of our new partnership with HP, Varonis is…

Thoughts on the 2011 Data Breach Investigations Report

While reading through the 2011 Data Breach Investigations Report, there were two things that caught my attention: The first one is that approximately 83% of the data breach attacks are considered “opportunistic.” According to the report, “the victim was identified because they exhibited a weakness or vulnerability that the attacker could exploit.” In other words,…

File system audit data taking up too much space? Read on…

I had the privilege of speaking about eliminating data security threats at Data Connectors in Houston a couple weeks ago, and I was asked by several people about how much space “all that audit log data” would take up, and how long you could realistically keep it while still being able to report on it. …

Using Varonis: Start With Classification

(This one entry in a series of posts about the Varonis Operational Plan – a clear path to data governance.  You can find the whole series here.) We spend a lot of time talking here and elsewhere about the many and varied problems IT faces when it comes to access control. What I’ve found, though,…

Forensic Investigation of Trade Secret Theft (Part 2)

In our recent blog post, we discussed a hypothetical situation where the General Counsel of “Alpha Chemicals” approached you and requested a whole bunch of information about “Allen Carey,” including documents he accessed and email messages he read related to the company’s blockbuster product, “Transparent Aluminum”, and a list of permissions that “Allen” had to…

Accelerate Data Protection with Context Awareness

I’ve been reading a lot about DLP technology lately.  Almost every article, discussion, and whitepaper I’ve stumbled upon focuses on content awareness — scan my files, find sensitive data, and ensure that it doesn’t escape. This is a great place to start–locating critically sensitive files is a terrific first step–but a massive list with hundreds…

Data Protection: It’s Just the Right Thing To Do

A couple of weeks ago, 37signals, makers of the popular project management app Basecamp, wrote a blog post about the 100 millionth file upload.  In the post, the author made an ostensibly innocent comment about the filename: cat.jpg. Funny, right?  37signals co-founder David Heinemeier Hansson was not laughing. So, what’s the big deal?  As David…

How to Share Your Mailbox or Calendar in Outlook: It’s Easy

It’s so easy, in fact, that just about everyone figures it out the first time. Most end users have realized by now that right-clicking on something in Windows does magical things, and it’s not a long leap from there to select properties and permissions when you want to grant access to something. (If you really…