Tips From the Pros: 30TB, 1300 Users, and 400 SMB Shares

Q: How many users do you have and how much data are you managing?

A: We have about 1300 users and about 30TB of human generated data on file shares and SharePoint.

Continue Reading


Top 10 Active Directory Tutorials on the Web

We’ve all heard of the many benefits of Active Directory (AD) for IT admins– it makes your job simpler because there’s a central vault of user information, and it’s scalable, supporting millions of objects in a single domain. However, it can be a pain in the ACLs to implement and maintain—a cluttered, misconfigured AD can…

Continue Reading

Podcast: Wi-Fi Security, Firesheep, and Pineapples with Troy Hunt

I recently had the pleasure of interviewing Troy Hunt, security researcher and Microsoft MVP.  If you haven’t read Troy’s blog or heard him speak, definitely check him out.  He’s truly one of the most prolific people in the security space these days. Troy and I chatted about: The exploitability of public Wi-Fi networks Cookie hijacking…

Continue Reading


Enterprise Search: Big Data Meets the Big Boss

Like many others, I think of Big Data as enormous data sets that are worthy of distributed processing, say in the multi-petabyte range. A petabyte for those who need a quick refresher is over 1 million gigabytes—a warehouse full of thumb drives. Typically, organizations enter the Big Data zone by collecting transactional data from tens…

Continue Reading


One Question I Wish all Breach Notification Letters Would Address

Recently, on two separate occasions, I received a new credit card and debit card, along with an ambiguous letter about why a new card was sent. My initial interpretation of the letter was that there had been a security breach.  However, calls to my credit card company and bank inquiring for more detailed information about…

Continue Reading

nutrition label

Gigaom Structure 2014: Big Data Needs Nutritional Information

Gigaom Structure, the Big Data conference that swept into town this week, proved yet again that this fuzzy name can mean a lot of different things to people.  Here’s a few things we learned from the speakers. For Formula 1 car makers, it’s the data collected from race drivers to fine tune their cars’ engines,…

Continue Reading

data breach timeline

An Interactive Timeline of a Data Breach

With major data breaches in the news, we thought it would make sense to give Metadata Era readers a big picture view of a hypothetical incident—from start to finish. And what better way to do this than through a highly interactive timeline. The actual details of this fictional breach involving a company we call AEM…

Continue Reading


Four Step Approach to Taming File Sharing Access

How many users and groups are in your Active Directory? Hundreds, thousands, tens of thousands?  Managing permissions to networked file shares at scale is complicated.   I don’t mean to alarm you, but: 1 TB of data usually contains about 50,000 folders About 5% of folders have unique permissions—that’s 2,500 ACLs Each ACL has an average of 4 groups Throw in multiple platforms with different permission schemes,…

Continue Reading

ing direct

Varonis DatAdvantage Delivers Vital Intelligence to Keep ING DIRECT Secure

Responsible for over 1.4 million customers, ING DIRECT chose Varonis to ensure its systems are secure and that customers’ interests are protected at all times. With Varonis DatAdvantage, the bank is now able to monitor who is accessing and changing records to guarantee that all actions are authorized. It also allows ING DIRECT to visualize…

Continue Reading