21 Free Tools Every SysAdmin Should Know

Check out our favorite free sysadmin tools that we use to help us work faster and be more awesome. At Varonis we’re always looking for productivity hacks—whether it be keyboard shortcuts or meditation techniques.  Last week, a bunch of us got together and shared our favorite free sysadmin tools—ones we love and use all time….

Continue Reading

Varonis SysAdminDayContest Blog

Varonis #SysAdmin Day Twitter Photo Contest – Deadline Extended!

As a Sys Admin you’re your company’s IT hero – putting out fires day in and day out. Well here’s your chance to take a break, and maybe win something for your effort. Keep reading… In honor of the 15th Annual SysAdmin Day on July 25th Varonis invites you to tweet us your best photo,…

Continue Reading

sox compliance

How Varonis Helps with Sarbanes-Oxley (SOX)

If your company is publicly traded or if your company is private, but planning an initial public offer, SOX affects your company. Sarbanes-Oxley compliance projects can be slow and painstaking for IT departments.  Manually identifying sensitive information and building reports detailing data access can drain resources very quickly.  Luckily, Varonis can help streamline your SOX…

Continue Reading

Top Minds in Online Privacy

Top 8 Minds in Online Privacy

1. Alessandro Acquisti @ssnstudy Acquisti is a professor of computer science at Carnegie-Mellon University, and is also a researcher at Cylab, a data security research center at CMU. He’s best known for an experiment in which he photographed random students on the Mellon campus and used off-the-shelf facial recognition software to match against head shots…

Continue Reading


DatAnywhere Success Story: ATMI

ATMI, an Entegris company, is a leader in advanced materials and material delivery systems serving the exacting demands of the semiconductor and electronics industries. To allow employees to share large files and collaborate without moving large amounts of sensitive data from existing file servers onto a public cloud, the ATMI IT department turned to Varonis…

Continue Reading

8 Things You Didn’t Know About Security Regulations (#4 is Crazy!)

1. The HHS has a “Wall of Shame”.

In the US, the Health Insurance Portability and Accountability Act (HIPAA) requires hospitals, insurers, and other “covered entities” to take a few steps after a breach of protected health information (PHI). Many are familiar with the rule that you have to directly notify the patient when there’s been exposure of unprotected PHI.

Continue Reading

what you may have missed

What You May Have Missed

1. On Wednesday, the FTC published changes to COPPA guidelines for developers of kids apps. The changes focus on how developers and app stores can ensure that parents are aware of how their kids are using them.  The new rules allow developers to verify parental consent with a credit/debit card, even if the app is…

Continue Reading


5 Things Privacy Experts Want You to Know About Wearables

There’s been a lot of news lately in the health and fitness wearables space. Apple just announced they’re releasing an app, called “Health,” as well as a cloud-based platform “Health Kit”. Somewhat related, Nike recently pulled the plug on its activity tracking Fuelband. The conventional wisdom is that fitness trackers are on the decline, while…

Continue Reading

4 Things You Need to Know About the Future of File Sharing

Have you been in this movie? You’ve been working for two months on a big project to analyze widgets — sales, marketing effectiveness, whatever. The first real deliverable is a presentation. A few versions are in your team’s shared folder, a few copies have been sent via email, one is in your home folder, your designer…

Continue Reading

NTLM warning

A Closer Look at Pass the Hash, Part III: How NTLM will get you hacked (and what you should do about it)

I was about ready to wrap up this series of posts (part 1, part 2 ) on PtH and make my larger point, which is that you should assume hackers will break into your system. And then I learned new information about credential stealing that amplifies this warning by a factor of 10. The most…

Continue Reading