Announcing DatAnywhere 2.0

We’re pleased to announce that version 2.0 of Varonis DatAnywhere is now generally available. Our engineering team continues to add new features at a rapid pace! What’s new in 2.0? Stub files. Stub files make files appear and behave as if they’re stored locally on the client, but they remain safely on your file shares…

Continue Reading

what you may have missed

What You May Have Missed

1. If you haven’t already heard, this season NFL players will wear RFID chips—the same chips used to tag store merchandise. Reason? RFID will allow coaches to better track how players move on the field.  By the way, the NBA started tracking their players years ago with a technology called SportVU. It gave the back…

Continue Reading

hipaa

How Varonis Helps with Health Insurance Portability and Accountability Act (HIPAA)

If you are a health care provider, health plan, health care clearinghouse that stores and/or transmits health information electronically, you are required to be HIPAA compliant. These entities must protect health information that 1) identifies an individual and 2) is maintained or exchanged electronically. Solutions from Varonis help covered entities with HIPAA compliance efforts. Read…

Continue Reading

exponential

Memory Technology Keeps Pace With the Big Data Explosion

Steve Fingerhut is a VP of Marketing at SanDisk.  In his inaugural guest blog post for the Metadata Era, Steve discusses how enhancing existing server investments with solid-state memory can speed up Big Data analytics while keeping costs in check.

Continue Reading

DisneyTicketBook_wbelf

Authentication Lessons From the Magic Kingdom: A Closer Look at Kerberos, Part II

Let’s continue our journey into the Magic Kingdom as a way to explore Kerberos. Sure the comparison doesn’t completely track, but it’s close and easy enough to grasp that I think you won’t mind missing—trust me on this—the standard Kerberos protocol diagrams. Back to Disney World: you’re now in the park with your passport booklet…

Continue Reading

800px-Syringe_and_hypodermic

Top Five Most Dangerous Software Errors

Over the years, Mitre, the MIT research group, has been analyzing software bugs and missteps that hackers have been able to exploit. Their Common Vulnerabilities and Exposures (CVE) classifications are something of a de-facto standard used for describing the root software causes in an attack.  Working with SANS, the Mitre CVE team has come up…

Continue Reading

Billion User Breach PSA

The latest story which has the security world in tizzy is the New York Times report that Russian hackers have amassed more than a billion Internet passwords. Bruce Schneier wrote in interesting post yesterday calling into question the validity of this report. He points out that Hold Security, the company that is hyping this breach, is not only…

Continue Reading

big-data-vs-fourth

How Big Data Challenges the Fourth Amendment

I came across an article recently about how the Santa Cruz Police Department was experimenting with big data analytics to help fight crime. They were experiencing a perfect storm– 30% increase in crime and a 20% decrease in police staff.  But they responded in an interesting way: by using predictive-analytics software to estimate where home,…

Continue Reading

Magic_Kingdom_2

Authentication Lessons from the Magic Kingdom: A Closer Look at Kerberos, Part I

The flaws in NTLM I’ve been writing about might lead you to believe that highly-secure authentication in a distributed environment is beyond the reach of mankind. Thankfully, resistance against hackers is not futile. An advanced civilization, MIT researchers in the 1980s to be exact, developed open-source Kerberos authentication software, which has stood the test of…

Continue Reading

hidden - keys-partial

Deadly credential vulnerabilities found in mobile apps

I’m beginning to be known around here as the bearer of bad news on authentication hacks. Unfortunately, I have more to share. In June, researchers at Columbia University announced they discovered secret login keys hidden in thousands of Google Play apps. Left by developers to access their own cloud-based accounts—on Facebook, AWS, Twitter, and other…

Continue Reading