Over 30% of Our Customers Detected Insider Activity or Malware in Advance of Security Threats [SURVEY]

In our most recent customer survey*, we learned that over 30% have proactively detected one or more instances of suspicious user activity or malware, thanks to Varonis. These instances include: Detecting malware on the day it began Identifying actions taken by a departing employee Finding CryptoLocker ransomware Varonis solutions perform User Behavior Analytics (UBA) to…

446px-Elizabeth_I_in_coronation_robes

Her Majesty’s Five Essential Security Controls

The United Kingdom’s GCHQ, their NSA-like organization, has its 10 Steps to Cyber Security. We hear from our friends across the pond that it’s proven to be very popular. These tips from her Majesty’s security service point out general areas where organizations need to focus their security efforts. Are you now asking yourself whether there…

marketing-board-strategy-large

Protect Your Data: Top Ten “Need to Know” Tips

With breaches happening on an almost daily basis, it’s critical to establish rules and processes to keep your data safe and secure.  The following tips, designed to help you start on the path towards data security, were inspired by the FTC‘s great security advice to businesses. Don’t Make Security an Afterthought Think before you collect. …

u125

DatAnywhere 2.5 is here

While we’ve been collecting interesting use cases for DatAnywhere, we’ve been busy behind the scenes making improvements and updates to your favorite enterprise file sync and share solution. We’re changing the way you use DatAnywhere –making it more intuitive to use whether you’re on mobile, desktop, or web.  Over the past few months we’ve released…

The Street Finds Its Own Uses For DatAnywhere

William Gibson, science fiction author of many a cyberpunk classic, wrote that “the street finds its own uses for things” – and while we’ve yet to hear of anyone using DatAnywhere to transfer files to an Artificial Intelligence in orbit, we’ve been collecting a new batch of interesting use cases of DatAnywhere to present to…

cloud_img

Data in the Cloud – What You Need to Know

Everyone’s talking about the cloud – but what exactly is it?  Should you move your data to the cloud? How do you take advantage of the agility that the cloud offers, without putting your data at risk? Make sure you understand the basics of migrating and storing your data in the cloud:  the risks, rewards,…

hello hacker

Lessons from OPM: Turning Security Inside Out With User Behavior Analytics

The US Office of Personnel Management (OPM) suffered a massive breach in early June. They publicly announced that the personally identifiable information or PII of over 4 million current and former government workers had likely been scooped up by hackers. Who done it? At this point, there’s some interesting speculation about the source of the…

800px-0618-mostnasoci

Light at End of Tunnel for EU Data Regulations

We’ve been posting about the EU’s new regulations for over two years, watching this slow train move in fits and starts. But the long strange journey may soon come to an end.  It’s now likely that the Data Protection Regulation (DPR) will be approved by the end of 2015 or early next year. Of course,…

ESG Cites Varonis DatAnywhere in New “Secure Enterprise Collaboration and File Sharing” Brief

Today the renowned IT research firm Enterprise Strategy Group (ESG) published a brief detailing how Varonis DatAnywhere is removing the tension between employee mobility and heightened security risks – two of the most important and often conflicting challenges faced by IT executives. You can download a copy of the ESG brief for free here. If…

cait blog post image.001

Explaining Cards Against IT

In an effort to disrupt the smooth running systems of our customers, we recently launched our Cards Against IT project. Specifically designed to sap the productivity of IT staff and pit them against one another – the game has been a smashing success. However, efforts beyond the walls of IT have not fared so well….