The Differences Between DLP, IAM, SIEM, and Varonis Solutions

varonis-dlp-siem-iam-feature-image

You can’t always do it all alone and sometimes you need help from your friends. It’s good life advice, and as it turns out, good advice for a security solution. A multi-pronged security program that uses a mix of technologies and approaches is the best way to reduce risk and to protect you organization’s most […]

Continue Reading →

Using Varonis: “Fast Track” Recommendations

(This is one entry in a series of posts about the Varonis Operational Plan – a clear path to data governance.  You can find the whole series here.) Over time, a user’s access to systems and data in an organization tends to grow, regardless of their role or responsibilities. From an IT perspective, it’s much more […]

Continue Reading →

Using Varonis: Implementing Automatic Rules

(This is one entry in a series of posts about the Varonis Operational Plan – a clear path to data governance.  You can find the whole series here.) What good are rules if nobody follows them, right? If we put a business policy in place which dictates that only a select few users should ever have […]

Continue Reading →

Using Varonis: Involving Data Owners – Part II

(This is one entry in a series of posts about the Varonis Operational Plan – a clear path to data governance.  You can find the whole series here.) If your doctor said “Your blood pressure is 120/95” would that mean anything to you?  Even if you could interpret that data as symptomatic of stage 1 high […]

Continue Reading →

Using Varonis: Involving Data Owners (Part I)

(This one entry in a series of posts about the Varonis Operational Plan – a clear path to data governance.  You can find the whole series here.) Almost every organization is now data driven. With all the talk about data growth and big data analytics over the past couple of years, people have started to ask: […]

Continue Reading →

Top 3 SharePoint Security Challenges

The rapid adoption of SharePoint has outpaced the ability of organizations to control its growth and enforce consistent policies for security and access control. The ease with which SharePoint sites can be created means that SharePoint use is decentralized and often outside the purview of IT departments, security personnel and even dedicated SharePoint administrators. So […]

Continue Reading →

Using Varonis: Who Owns What?

(This one entry in a series of posts about the Varonis Operational Plan – a clear path to data governance.  You can find the whole series here.) All organizational data needs an owner. It’s that simple, right? I think most of us would be hard pressed to argue against that as a principle—the data itself is […]

Continue Reading →

Using Varonis: Which Data Needs Owners?

(This one entry in a series of posts about the Varonis Operational Plan – a clear path to data governance.  You can find the whole series here.) In a single terabyte of data there are typically around 50,000 folders or containers, about 5% of which have unique permissions. If IT were to set a goal of […]

Continue Reading →

Top 5 Things IT Should Be Doing, But Isn’t

A clear path to effective information governance. 1. Audit Data Access Effective management of any data set is impossible without a record of access. Unless one can reliably observe data use, one cannot observe its non-use, misuse, or abuse. Without a record of data usage, one cannot answer critical questions—from the most basic ones, like “who […]

Continue Reading →

Using Varonis: Why Data Owners?

(This one entry in a series of posts about the Varonis Operational Plan – a clear path to data governance.  You can find the whole series here.) One of my first jobs in IT was on the help desk for a medium-sized company. A big part of my job was provisioning access. If your company has […]

Continue Reading →