Using Varonis: Involving Data Owners (Part I)

(This one entry in a series of posts about the Varonis Operational Plan – a clear path to data governance.  You can find the whole series here.) Almost every organization is now data driven. With all the talk about data growth and big data analytics over the past couple of years, people have started to ask:…

Data Brokers: Too Much Information

I keep coming back to the FTC’s report on new consumer privacy guidelines issued early in the year. Not only do the guidelines give a sense of the agency’s view on online data protection, but it also suggests what new legislation may eventually look like. I bring up the FTC report yet again, because earlier…

A Sneak Peek at DatAnywhere: Enterprise-Class File Synchronization Has Arrived

Last week we showcased DatAnywhere to a hundred attendees on our monthly webinar.  We’re delighted in the interest so far, and proud that we are able to help enterprises share and synchronize data in a secure way without relying on third-party servers—in the cloud or otherwise. Want your in-house file servers to have all the…

More Security Wisdom From 2012’s Lesser Known Hacks

In my last post, I wrote about Verizon’s impressive annual Data Breach Investigations Report. The DBIR has enough eye-opening data analysis and stats to educate even the savviest IT security guru. While we’re waiting for the 2013 report to be released, a good source for real-time breach activity can be found at the Identity Theft…

DatAnywhere is now in the App Store

DatAnywhere is the easiest way to setup secure, private file sharing and syncing that runs on your organization’s existing servers.  There’s no need to move or re-permissions data – IT simply installs the DatAnywhere server software on your network and you’re set! Today, we’re happy to announce that DatAnywhere for iPhone and iPad is available…

The Biggest Hacks of 2012

With 2012 coming to a close, I decided to take a look back at some of the year’s more significant hacks. Two of the largest heists involved thefts of millions of records of personal data. In March, Global Payments, a credit card processor, revealed a breach in which at least 1.5 million credit card numbers…

Top 3 SharePoint Security Challenges

The rapid adoption of SharePoint has outpaced the ability of organizations to control its growth and enforce consistent policies for security and access control. The ease with which SharePoint sites can be created means that SharePoint use is decentralized and often outside the purview of IT departments, security personnel and even dedicated SharePoint administrators. So…

Cloud-based Big Data Also Requires Big Backup

Starting last January, more than a few blogs posts have been devoted to explaining the saga of Megaupload, the file sharing or “file locker” service whose web domain was seized by the US government. While the actual circumstances of this case are extreme—criminal asset seizure laws applied to copyright infringement—the effective results, a cloud-based service…

Using Varonis: Who Owns What?

(This one entry in a series of posts about the Varonis Operational Plan – a clear path to data governance.  You can find the whole series here.) All organizational data needs an owner. It’s that simple, right? I think most of us would be hard pressed to argue against that as a principle—the data itself is…

Oops, we lost a few terabytes! NBD!

Earlier this week, Swiss intelligence agency (NBD) warned US and UK counterparts that they might have lost terabytes of top secret data due to insider theft by a disgruntled IT admin.  Reminds me of this xckd:   We emphasize insider threats and the importance of zero trust all the time at Varonis.  Yes, it’s extremely…