800px-Moscone_Center,_San_Francisco_(2013)

The ‘Varonis Track’ at RSA Conference 2015

What do Doris Kearns Goodwin, Diana Nyad, and Alec Baldwin have in common? No, they weren’t all past guests on Stephen Colbert, but they will be speaking at this year’s upcoming RSA Conference! The Varonis team will also be there (North Expo #N3141) to talk security and data governance, as well as to showcase our…

Continue Reading

The Short List: Tips and Tools for Data Security Beginners

Lately we’ve been focusing on free resources that are available to help bring IT admins up to speed on security matters. Along these lines, I put together a short list of essential tips and tools to let you hit the ground running — actionable ideas and software that will make you productive on Day 1….

Continue Reading

loyolaMDlogo

Loyola University Maryland Masters Data Security with Varonis

Loyola University Maryland, a leading private, Jesuit university, feared the possibility of falling victim to a fate that other major universities around them had experienced: a major data breach. In the months following the early 2014 attack on a major university nearby, Loyola’s CIO, Louise Finn, proactively explored various solutions that could mitigate risk in…

Continue Reading

Resources for a Junior Sysadmin Straight Out of College

Graduation is just a few months away! To prepare for your first job as a Junior Sysadmin, we have a few tips that will make you stand out: Before you graduate, take advantage of these free tools for students: Microsoft Student Developer Program GitHub Student Developer Pack All sysadmins should be equipped with basic security…

Continue Reading

cait blog post image.001

Explaining Cards Against IT

In an effort to disrupt the smooth running systems of our customers, we recently launched our Cards Against IT project. Specifically designed to sap the productivity of IT staff and pit them against one another – the game has been a smashing success. However, efforts beyond the walls of IT have not fared so well….

Continue Reading

Women in Data Security, Compliance, and Privacy You Should Follow on Twitter

There are many articles lately lamenting the lack of women in technology. I’m happy we’re having this discussion and that groups are working towards fixing the problem, but I’d like to shift the focus to the women that are in technology. The good news is that female technologists in data security, compliance, and privacy do…

Continue Reading

Start with Classification

Enterprise Search: Connecting File Data and Knowledge, Part III

In the last post in this series, I’ll now take on the topic of finding knowledge directly in the content. We’ve discussed how keyword queries can be made a lot smarter with schemas, which can fill in some of the conceptual background. Obviously, this is a great help in fine- tuning the keyword queries through…

Continue Reading

Privacy-Practices-2

Privacy by Design Cheat Sheet

Privacy by Design (PbD) has been coming up more and more in data security discussions. Alexandra Ross, the Privacy Guru, often brings it up in her consultations with her high tech clients. Its several core principles have been adopted by U.S. government agencies and others as de facto best practices polices. PbD is about 20…

Continue Reading

Top 10 Chief Data Officers to Follow on Twitter

Will 2015 be the year of the Chief Data Officer (CDO)? It’s a question that’s coming up more and more often. Whether the CIOs are becoming overwhelmed with IT demands, or organizations are recognizing the value in their data, CDOs have a key role to play in data governance initiatives. A CDO’s mission is “to bring order…

Continue Reading

SOFTWARE PRODUCT OF THE YEAR

Varonis Metadata Framework Voted 2015 Software Product of the Year

Today Varonis is thrilled to report that our Metadata Framework was voted “Software Product of the Year” for 2015 by the UK’s Network Computing magazine, which is the UK’s longest established magazine dedicated to network management. In its ninth year, the winners of its award program are determined by online voting open to the public – such…

Continue Reading