Enterprise Transformation

I attended EMC World last week.  It was my first time at the conference, and I must say, to call the event grandiose would be a gross understatement.  The overall theme was “transform.”  Transform your business, transform IT, transform yourself.  The tagline struck me as somewhat vague as it wasn’t clear to me who was…

A new weekly newsletter about Big Data

Big Data Weekly is a newsletter that highlights the week’s top big data news, links, blog posts and more in a digest delivered to your inbox each week. I know what you’re thinking: “Not another email!”  Hear me out – this can actually save you time. Big Data Weekly is not some auto-aggregated feed generated…

Is Big Data IT’s Secret Weapon for Information Security?

When I talk to IT security pros today about how they manage and protect data, most describe grueling manual processes and makeshift solutions comprised of countless off-the-shelf products and fragile homegrown scripts. Fortunately, most of us understand the importance of using automation to help fight our battles, but the rapidly changing landscape of new technologies,…

Rage Against the Machine Data

In big data-land, all the talk lately seems to be about machine data.  There is a flood of machine data being spewed into log files and databases.  We’ve got web traffic logs, application event logs, OS logs, call center records, GPS coordinates, sensor data, and much more. Machine generated data is valuable, no doubt, but…

Data Classification Tips: Finding Credit Card Numbers

4 Useful Regular Expressions and Algorithm Combinations for Finding Credit Card Numbers Data classification is a critical piece of the data governance puzzle.  In order to be successful at governing data, you have to know—at all times—where your sensitive data is concentrated, unencrypted, and potentially overexposed. One of the standard ways to find sensitive data…

Fixing Access Control without Inciting a Riot

In a previous post, Fixing the Open Shares Problem, we talked about some of the challenges we face when trying to remediate access to open shares. One of the main problems is minimizing the impact these clean-up activities can have on the day to day activities of business users. Think about it: if a global…

Varonis Data Governance Awards 2012

Varonis is pleased to announce the Varonis Data Governance Awards 2012. The awards are designed to reward the innovation, determination and dedication that our customers apply, every day, to protecting and managing their data with our products. We want to showcase top-class performance and reward achievement, whatever its form. The awards are free to enter,…

Exchange Journaling and Diagnostics: How to

Journaling and Diagnostics Logging are services to monitor and audit activity on Microsoft Exchange servers. They provide basic auditing functionality for email activity (e.g. who sent which message to whom) and, if collected and analyzed, may help organizations answer basic questions about email, as well as comply with  policies and regulations. (Note: Varonis DatAdvantage for…

InfoSecurity 2012 Highlights

Last week I was fortunate to attend InfoSecurity 2012 in London. The energy level seemed much higher than in previous years, for both attendees and exhibitors.  Just under 13000 people were there, up  24% from last year, and those that stopped by our booth seemed to have a real sense of urgency about data protection, and…