Why It Matters: Varonis Data Governance Suite

One of my favorite things about working for Varonis is that we let our products do the talking.  All of our products are free to try.  We want people to get real, quantifiable value before they pull out their wallet and spend a dollar with us. On rare occasion, for one reason or another, an…

Continue Reading

Automate Exchange Distribution List Management

From a business perspective, distribution lists (DLs) for email communications are a powerful and well-understood concept in IT. And they are popular: Exchange admins have voted with their right-clicks, creating lots of these Active Directory objects in their corporate domains. DLs speed up overall collaboration and leverage the power of groups to answer questions, share…

Continue Reading


View From Germany: EU Data Protection Reform Is on a Slow Train

Based out of Frankfurt, Cyril Simonnet is Varonis’ Sales Director for Germany, Austria, Nordic countries, and emerging markets. Simonnet has been watching the shifting fortunes of the EU’s proposed changes to its overarching data security rules, the Data Protection Directive or DPD. These regulatory reforms have seen their share of obstacles as they slowly progress…

Continue Reading


Varonis Shines in Bloor Research’s Data Governance Market Update

Bloor Research published its market update for data governance.  Included were a bevy of vendors in the structured data governance space, with stalwarts like IBM and SAP featured prominently. In the burgeoning unstructured data governance market, where arguably the greatest technical challenges lie, Varonis was the only vendor featured. In the unstructured space we have…

Continue Reading


Anatomy of a Phish: New Varonis eBook Connects Social Attacks and APTs to Human-Generated Data

Security analysts have been telling us that phishing incidents have been on the rise, and the threat will get worse in the coming years. Sure phishing and other social attacks are insanely clever, tricking victims into effectively inviting hackers in through the front door. But when cyber thieves also use advanced persistent threats or APTs—embedding…

Continue Reading


The ‘Varonis Track’ at RSA 2014

The tagline for the RSA Conference to be held later this month (2/24 – 2/28) at San Francisco’s Moscone Center is “where the world talks security.”  The Varonis team will also be there (South Expo #2309) to talk security.  At the Metadata Era, we’ve been lately focusing on new threats based on a combination of…

Continue Reading

The Difference between CIFS and SMB

I’ve received quite a few questions from both new and experienced sysadmins, about networked filesystems and file sharing protocols.  One question that comes up frequently is, “What is the difference between CIFS and SMB?” There are many idiosyncrasies, and the terminology can be confusing, so I’m going to boil down the essentials in an easy-to-follow…

Continue Reading


A National US Breach Notification Law May Be on the Way

Last month when I was prognosticating about the year ahead in data regulations, I held out some vague hope that there might come to pass a law on the national level with minimal standards for PII protection. There have been a few proposals that have been kicking around Congress over the years, any one of…

Continue Reading


Secrets to Preventing POS-based Attacks in Retail

There’s still much mystery surrounding the recent cyber heist in which tens of millions of credit card numbers were removed from a major retailer’s POS system, though we learn more almost every day. The always indispensable Krebs is a good starting point for background information and very informed speculation.  There are good reasons—based on FBI…

Continue Reading