public-private cloud

Public Versus Private Cloud File Sharing: Pros and Cons

In 1994, TV journalists Bryant Gumbel and Katie Couric famously didn’t know the difference between a web and an email address. Twenty-one years later, many of us have the same beginner’s confusion about cloud computing services, or Enterprise File Sync and Share (EFSS). Public Cloud One reason why consumer file sharing services like Dropbox have…

Continue Reading


Three Mistakes Not to Make When Choosing an Enterprise File Sync and Share Product

In recent years the user experience of file sharing products has improved tremendously. It’s rare these days to see people and companies struggling with FTP and weird proprietary methods of trying to handle common tasks like sharing a file. But a simplified user experience comes at a price. It can cause people to underestimate the…

Continue Reading

US Healthcare and Pharmaceutical Companies Are Vulnerable

A recent survey conducted by the Ponemon Institute suggests that more than half of U.S. healthcare and pharmaceutical employees believe that their organizations do not place a high priority on the protection of sensitive data. Commissioned by Varonis, the Ponemon survey looked at internal security risks as seen by IT employees. When examining the results…

Continue Reading


How Varonis Helps with the FDA

Title 21 Code of Federal Regulations (CFR) Part 11 regulates the United States’ Food and Drug Administration’s electronic records and signatures by outlining the criteria required to be considered trustworthy and reliable. Often referred to as Part 11, this regulation applies to electronic records that are created, modified, maintained, archived, retrieved, or transmitted. To learn…

Continue Reading


How to Detect Dropbox on Your Network

The University of Liverpool recently found over 3,000 individual instances of Dropbox running on their network. These unmanaged file sharing points throughout their network were causing an ever growing list of increasingly serious complaints from their users: It was difficult to establish who owned which documents (an important issue when writing your dissertation). It was…

Continue Reading


Windows 10’s Security Reboot, Part II: More on Authentication

A good part of Windows 10’s security improvements center on basic changes to the way users and software prove their identities. No, that wasn’t a mistake in the last sentence. Software, like, people, also can have an identity and be required to show they’re the apps they say they are. The underlying technology is well…

Continue Reading


How Varonis Helps with NIST

In 2013 the President directed the National Institute of Standards and Technology (NIST) to develop a framework for reducing cyber risks to critical infrastructure.  And on February 12, 2014, NIST released the first version of the Framework for Improving Critical Infrastructure Cybersecurity. The prioritized, flexible, repeatable, and cost-effective approach of the Framework helps owners and…

Continue Reading


Windows 10’s Security Reboot, Part I: Authentication

There’s incredible excitement about the Windows 10 release. If you completely quantum leap over Windows 9, you’d expect big things. In December, I was talking with NYU-Poly’s Professor Justin Cappos. He’s a security expert and had nothing but high praise for Microsoft’s security group. But he added their cutting-edge research doesn’t necessarily make it into…

Continue Reading


Ponemon Study Shows Enterprise Data at Risk

What do over 2000 IT staff and end users have to say about internal security risks in their workplaces? A lot. For starters, over 75% say their organizations can’t track lost files or data, and 80% told us that a least-privilege model is not enforced! Find out the rest below in a Ponemon Study sponsored…

Continue Reading

How Varonis Helps With ITAR Compliance

International Traffic in Arms Regulations (ITAR) mandates that access to physical materials or technical data related to defense and military technologies is restricted to US citizens only. According to the US government, anything on the U.S. Munitions List falls under ITAR. Besides rocket launchers, torpedoes, and other military hardware, the list also restricts the plans, diagrams,…

Continue Reading