Replace Enterprise Applications with DatAnywhere

When I was in elementary school, Ms. Brownfield taught us that one of the big things separating humans and animals was that humans were tool-users. Since that time, innumerable YouTube videos of crows using sticks to crack nuts have surfaced and taught us two things: What really distinguishes us from animals isn’t the use of…

Continue Reading

varonis-office-365

Migrating Your Data to Office 365

What do I need to know before moving to Office 365? Moving your company’s data to cloud-based storage is a big job, and we want to make sure you understand what it takes to ensure that your Office 365 data is managed, protected, and accessible. Click here to sign up for a free assessment, where…

Continue Reading

Ponemon Institute

Corporate Data: A Protected Asset or a Ticking Time Bomb?

How many days pass between big, publicized security breaches now? Not many. You’ve probably been worried about the state of data security, but you’re going to be surprised at just how out of control things really are. We asked the Ponemon Institute to survey employees and IT people from organizations large and small. Their eye-opening…

Continue Reading

12 Days of IT Security Presents

At the Metadata Era, we decided to start our holiday celebration early. We’ve put together 12 content gift packages that will point you to interesting blog posts, whitepapers, research reports, webinars, and even a few of our favorite tweets from the last year.  So pour an eggnog, sit by your laptop, and enjoy opening our…

Continue Reading

Varonis Perspective on the Sony Breach

While we have few details on the Sony Pictures attack itself, this very public breach (or pwning in hacker slang) has shown the extent of the actual exposure—it is massive. The always informative Krebs knows, at this point at least, as much as the rest of us—possible North Korean connection and perhaps the use of destructive erase-all malware….

Continue Reading

800px-Ancient_warded_lock_key_transparent

Crypto’s Fatal Flaw: Stealing the Master Key

At the beginning of the year, Cindy and I attended a crypto workshop held at a local college in NYC. We heard experts talk about a fact of life well known in the security world, less so in the IT space: crypto is not very healthy. The prime culprits are a slew of advanced persistent…

Continue Reading

636px-Cartomante

Six Enterprise IT Predictions for 2015

1. Massive breaches will be caused by negligent employees and needlessly excessive data access privileges.  Much attention is paid to the role of cyber criminals but the far more common threat begins with well-intentioned employees. Next week Varonis will announce the findings of a survey we recently conducted with the Ponemon Institute in which 2,000…

Continue Reading

varonis-office-365

Varonis + Office 365

What is Office 365? Cloud-based Office 365 for Business and Enterprise allows subscribers to access Microsoft-hosted versions of Exchange, SharePoint, and file sharing services (OneDrive).  This means customers don’t host the infrastructure themselves, and employees can access Office 365 applications and data from anywhere, and from most devices (Mac/PC, tablets, iPad, and smart phones). Are…

Continue Reading

2003-donothing-migrate-and-upgrade

Windows Server 2003 End of Life is Approaching

The support for Windows Server 2003 is slated to end July 14, 2015, so it’s time to start thinking about migrating if you haven’t already. According to one TechNet blogger, the average Windows Server migration takes 200 days! The good news is that you aren’t the only IT department facing this reality. It’s anticipated that…

Continue Reading

A Sysadmins Guide to Thanksgiving

Continue Reading