Protect Your Data: Top Ten “Need to Know” Tips

With breaches happening on an almost daily basis, it’s critical to establish rules and processes to keep your data safe and secure.  The following tips, designed to help you start on the path towards data security, were inspired by the FTC‘s great security advice to businesses. Don’t Make Security an Afterthought Think before you collect. …

Continue Reading

What is User Behavior Analytics?

There’s nothing new in using analytics in data protection or breach prevention. Firewalls, for example, analyze packet contents and other metadata, such as IP addresses, to detect and block attackers from gaining entry. And anti-virus software is constantly scanning file systems for malware by looking for bits of code and other signs that a file…

Continue Reading


Varonis Now Available on U.S. Department of Homeland Security Cybersecurity Contract

Today we’re pleased to report that with the help of Technica Corporation, one of our solutions partners in the federal government space, Varonis software has been added to the U.S. Department of Homeland Security and GSA’s Continuous Diagnostics and Mitigation (CDM) and Continuous Monitoring as a Service (CMaaS) Blanket Purchase Agreement (BPA). The DHS/GSA CDM-CMaaS BPA…

Continue Reading

IT Security Pros Aren’t Surprised End Users Have Access to More Company Data Than Necessary

We recently surveyed IT professionals at Infosecurity Europe in London and RSA Conference in San Francisco to get their thoughts on the findings of a Ponemon Institute study about internal data security risks in the workplace. You might be surprised that employees regularly have access to data that they shouldn’t have and for companies to…

Continue Reading


Point of View: User Behavior Analytics and Varonis [White Paper]

User Behavior Analytics, or UBA, has suddenly entered the security conversation. Security folks are talking about it. Analysts are talking about it. It’s in the news. It’s a good conversation to have, and at Varonis, we’re glad it’s finally receiving the attention it deserves. We knew ten years ago that to really understand and govern…

Continue Reading


DatAnywhere 2.5 is here

While we’ve been collecting interesting use cases for DatAnywhere, we’ve been busy behind the scenes making improvements and updates to your favorite enterprise file sync and share solution. We’re changing the way you use DatAnywhere –making it more intuitive to use whether you’re on mobile, desktop, or web.  Over the past few months we’ve released…

Continue Reading


Group Policy and DatAdvantage for Directory Services

Customers have been requesting more events in DatAdvantage for Directory Services: they want to learn more about who’s logging in when, report on failed logon attempts, GPO setting changes, password policy changes, enhancements to alerts, and more. So we made sure that one of the big features in our 6.1.30 beta release does just that: by improving…

Continue Reading

Six Ways to Protect Your Organization Inside and Out

Does anyone know how to prevent data breaches from happening? Many ideas have been suggested, from junking the current system to encrypting everything, but unfortunately they aren’t practical or realistic. Here’s the reality of what we know about data breaches. The latest Verizon Data Breach Investigation Report revealed that it takes organizations months to discover…

Continue Reading

The Street Finds Its Own Uses For DatAnywhere

William Gibson, science fiction author of many a cyberpunk classic, wrote that “the street finds its own uses for things” – and while we’ve yet to hear of anyone using DatAnywhere to transfer files to an Artificial Intelligence in orbit, we’ve been collecting a new batch of interesting use cases of DatAnywhere to present to…

Continue Reading


Data in the Cloud – What You Need to Know

Everyone’s talking about the cloud – but what exactly is it?  Should you move your data to the cloud? How do you take advantage of the agility that the cloud offers, without putting your data at risk? Make sure you understand the basics of migrating and storing your data in the cloud:  the risks, rewards,…

Continue Reading