Category Archives: Varonis News

It’s Not Just Waymo: IP Most at Risk According to Our RSA Survey

It’s Not Just Waymo: IP Most at Risk According to Our RSA Survey

This year, the RSA Conference boasted over 43,000 attendees and 557 exhibitors spread across two enormous and cacophonous halls. Even in the quiet of the hotel room, my ears rang with echoes of the discordant noise about new potential threats. Let’s just say I’ll be eyeing every public outlet from which I charge my phone with suspicion.

Tom Foremski, ex-Financial Times journalist and editor/publisher of Silicon Valley Watcher, summed up the experience nicely via ZDNet:

[G]oing to RSA show will likely cause your mind to race in panic at all the vectors of malice that the security vendors will happily tell you about.

Foremski and those he interviewed discussed the implications of a widening security pit: how we could buy every tool on the market and still not be 100% secure. Forrester Consulting has coined this “expense in depth” in a recently released study, writing:

The reality is that companies have spent a lot of money on individual technology — instead of a unified data security strategy — and are judging their maturity based on money spent.

Or in other terms, companies are focused on threats (as the RSA newsfeeds testified) rather than the data – customer, employee, intellectual property and financial data – any of which would be toxic if stolen or made public (e.g., Waymo IP theft – keep reading).

The RSA Data Security Results

We surveyed security professionals who stopped by our booths at RSA about how their companies identify, classify, protect and monitor data.  The results are in and echo the Forrester study:

  • 72% use 3 or more data security tools (and over 50% use 5 or more).
  • Respondents are not confident in the ability to identify, classify, protect and monitor their enterprise data, with few stats crossing the 50% line:
    • Employee data fares the best with 67% completely confident in knowing exactly where this data resides on the network, 59% enforce a least privilege model against it and only 45% audit access to it and alert on abuse.
    • Less than 50% of respondents can identify the location and monitor for anomalous behavior on customer and financial data.
    • Coming in last for all categories is intellectual property — one of the most toxic and costly data sets. Well under 45% are confident in their ability to identify, classify and restrict access on a need-to-know-basis to this data set: even more concerning, only 30% monitor IP for access and abuse.

While the similarities to the Forrester study are validating, real world examples showing how these data sets quickly turn toxic drive the point home even more. Let’s take a look at one of those examples.

Waymo and the Alleged Toxic IP Leak

Last week, Waymo, pioneers in self-driving car technologies, announced legal action against competitors Otto and Uber for the alleged theft at the hands of several former employees of more than 14,000 highly confidential and proprietary design files.

Mention this theft to any R&D head, CEO or CISO and they’ll cringe at the thousands of man hours, millions of R&D dollars and expected revenue that drove off the parking lot.  To put more context around this, Waymo spent seven years in R&D on self-driving technologies including their own in-house hardware, accumulated 1.5 million miles of experience on public roads and billions of miles in simulation tests.  Self-driving technology is how they make their money; now key components of that technology appear to have fallen into the hands of a competitor.

The loss and future damage of stolen IP is enough to cripple any company, maybe even put them out of business. Yet we see time and again in our risk assessments that sensitive data like IP is not identified, classified or monitored for abuse. Both the Forrester Study and our RSA survey results found that 60% of organizations do not enforce a need-to-know access model for this type of highly confidential information and even fewer monitor access for abusive behavior – like a sudden flurry of access activity on files an employee may not normally access (cue Paul Harvey: “And now for the rest of the story”… employee gives his resignation a few days later).

The allegations of IP theft at the hands of multiple former employees who are now at a competitor is a story we’ve seen (and blogged about) before: an ambitious insider not only steals IP but recruits other colleagues to do the same, and then he takes both to a competitor. The Waymo complaint outlines how the alleged ringleader, the founder of Otto, stole 9.7 GB of highly confidential data and tried to cover his tracks, and it alludes to collusion with several employees who followed suit:

A number of Waymo employees subsequently also left to join Anthony Levandowski’s new business, downloading additional Waymo trade secrets in the days and hours prior to their departure [emphasis mine].

Regardless of the court’s decision in the Waymo case, this serves as a wake-up call for any company who has data that would be toxic to the company’s revenues and reputation if it were stolen or made public.

And Now for the Rest of the Story

Data has real value.  Self-driving technology alone has the power to change the world and save lives. And there are many other types of innovations being worked on and invested in.  Organizations need to start seeing this data and data security as a driver of business growth. Ensuring that the right people and only the right people have access will accelerate bringing this innovation to market and drive competitive advantage – the flip side to this coin is very real, and we see it playing out in the Waymo/Uber case, where too much unmonitored access can give a competitive advantage to the other guy.

The final piece to our RSA survey asked respondents about the benefits they would receive with a unified data security platform – in other words, a solution that would have stopped or greatly reduced the damage of the Waymo IP theft. The top rated benefits include:

  • quicker response to breaches (60%)
  • improved ability to identify data (60%)
  • improved ability to spot anomalous behavior (56%)
  • increased visibility on access and usage of sensitive data (55%)

Want to see what type of data might be overexposed in your company?  Our Data Risk Assessment gives a snapshot of your data security to quickly ascertain the level of risk associated with your data: exposing high risk areas and where you can safely and swiftly pull back access, reducing your risk profile.

Get more details on our Data Risk Assessment.

Introducing a new security dashboard, enhanced behavioral analysis, and more

Introducing a new security dashboard, enhanced behavioral analysis, and more

Every day we hear new stories about how our customers are using DatAlert to stop cyberattacks: detecting and disabling ransomware infections, discovering misconfigurations and vulnerabilities, and setting up automatic responses to malware infections.

And so, we’ve updated DatAlert to be more intuitive, powerful, and insightful than ever: 6.3.150 includes major updates to DatAlert, additional platform support, and performance enhancements.

New Security Dashboard: DatAlert is easier than ever to use as a starting point for investigating suspicious behavior, spotting unusual activity on file servers, and finding security vulnerabilities.  We’re introducing a configurable dashboard where you can easily identify and prioritize at-risk areas like global access, stale data, and overexposed sensitive information.

Alert investigation page: A new alert page enables quick triage on individual alerts – drill down on suspicious activity that might indicate that an attack is under way and triage for further investigation.  The alert investigation page offers additional security insights about users, data, time, and affected devices.

Enhanced behaviors and analysis:

  • Behavioral Peers: DatAlert can compare file and email touches of one user – along with other activity – to that of her peers. Behavioral peer comparisons are available directly within the alerts page to streamline investigation and help identify the severity of alerted behavior.
  • Device Insight: Review device context cards, and get insight through the DatAlert UI to see alerts triggered on specific devices.  Insights into devices also help highlight abnormal device usage per user account to pinpoint a computer that’s been compromised for insider activities.
  • Normal Working Hours: Varonis determines normal working hours for each individual based on email & file activity – and compares activity against their peers, to catch suspicious activity more quickly than ever.
  • Flags & Watch list: Customers can now flag suspicious users, putting them on a watch-list for tracking – making it easier to keep an eye on suspicious users and devices. Users can be highlighted based on past alerts or based on information from legal, HR, or other departments.

Want to see DatAlert in action?  Schedule a free demo and see how it works in your environment.

 

 

The Data Security Money Pit: An Independent Research Study from Forrester

The Data Security Money Pit: An Independent Research Study from Forrester

We recently released a study with Forrester Consulting entitled “The Data Security Money Pit: Expense in Depth Hinders Maturity” that shows a candy-store approach to data security may actually hinder data protection and explores how a unified data security platform could give security professionals the protection capabilities they desire, including security analytics, classification and access control while reducing costs and technical challenges.

The report finds organizations invest heavily in individual tools to try to mitigate threats and meet compliance requirements. In fact, 76% of data security professionals believe their organization has a mature data security strategy as a result of these efforts.  Forrester writes:

The reality is that companies have spent a lot of money on individual technology — instead of a unified data security strategy — and are judging their maturity based on money spent.

This fragmented approach to data security exacerbates many vulnerabilities and challenges, and 96% of these respondents believe a unified approach would readily prevent and help them more quickly respond to attempted attacks and actual data breaches, meet regulatory compliance and free up resources to focus on building and enforcing policies, procedures and remediation actions. The study goes on to highlight specific areas where enterprise data security falls short:

  • 62% of respondents don’t know where their most sensitive unstructured data resides
  • 66% don’t classify this data properly
  • 59% don’t enforce a least privilege model for access to this data
  • 63% don’t audit use of this data and alert on abuses
  • 93% suffer persistent technical challenges with their current data security approach

Point products may mitigate specific threats, but when used tactically, they undermine more comprehensive data security efforts. Ransomware, for example, exploits the same internal deficiencies that a rogue or compromised insider might – insufficient detective controls and over-subscribed access. Instead of improving detective controls and locking down access – improvements that would mitigate ransomware as well as many other data security threats – organizations sometimes deploy a tactical solution for ransomware and neglect their core controls. This threat-reactive approach appears to have become the norm – many threats; many tools. Expense in depth.

According to the study, “It’s time to put a stop to expense in depth and wrestling with cobbling together core capabilities via disparate solutions.” Almost 90% of respondents desire a unified data security platform. Key criteria to include in such a platform as selected by the survey respondents include:

  • data classification, analytics and reporting (68% of respondents)
  • meeting regulatory compliance (76% of respondents)
  • aggregating key management capabilities (70% of respondents)
  • improving response to anomalous activity (66% of respondents)

In summarizing the findings, Forrester concludes,

A unified data security platform offers core capabilities to help organizations not just establish a robust technology foundation for their data security strategy but also create conditions that help to push firms toward greater security maturity and value-add to the business.

Read highlights from the Forrester report here – including 4 key recommendations for a unified security platform.

 

I’m Alan Cizenski, Corporate Systems Engineer at Varonis, and This is How I Work

I’m Alan Cizenski, Corporate Systems Engineer at Varonis, and This is How I Work

Alan Cizenski is a Corporate Systems Engineer at Varonis. Based in our New York City office, he is responsible for making sure Varonis solutions work smoothly for our prospective customers. Alan helps them realize the value we can provide within their environment and maintain these relationships as they become customers.

He’s also a regular panelist for the Inside Out Security show. Listen to him on our most recent episode, Is Security a Benefit or a Feature?

According to his manager Kris Keyser:

“Alan’s a positive, hard-working engineer with a strong sales background, who is always ready to go the extra mile for his customers and managers. Starting on the sales side as a Territory Development Rep, Alan quickly moved to the Corporate Sales Engineering team and continues to excel in his current position as a Commercial Sales Engineer.”

Read on to learn more about Alan – this time, in his own words.

What aspect of your role do you enjoy the most?

How dynamic my role is. I get the opportunity to experience a lot of different aspects of Varonis; from product testing/development, to thought leadership on the Inside Out Security Show, to working with customers to close business and ensure customer success.

What would people never guess you do in your role?

People would probably never guess that I cold call current Varonis customers. I reach out to them to open the lines of communication, touch base on the products they currently have, and make sure they’re successful and happy. Then see if there is a potential for upsells.

How has Varonis helped you in your career development?

I have received so much guidance to become a better salesman, a better engineer, a better analyst, and most importantly a better leader. I am always asking for help to develop more skills for the future and the company has always been happy to offer it. Varonis has also taught me to laugh (a lot).

What advice do you have for prospective candidates?

Be ready to learn because things can move quickly. There are a lot of very talented people to learn from at Varonis, so prepare yourself to pick up all the knowledge you can to execute opportunities when they are presented.

What do you like most about the company? 

The people…I know it’s cliché! The people here really are incredible though. I cannot overstate how instrumental my colleagues have been in my development as an employee and a person.

What’s the biggest data security problem your customers/prospects are faced with?

I would say the biggest challenge is how quickly threats evolve. Implementing new security practices is difficult and time-consuming – especially the kind of change a corporate culture that is typically required to protect data.

When programs are fully implemented, the attackers may have shifted tactics and organizations have to start from scratch, fighting a new type of threat. This is why user behavior analysis is becoming so important for insider threats.

Now for some Fun Facts on Alan!

What’ s your all-time favorite movie or tv show?

Twin Peaks, all the way.

If you could choose any place in the world to live, where would it be and why?

A nice boat with space to tie up a seaplane. That way, I could get a very cool perspective on the world and start every day with a swim.

What is the first thing you would buy if you won the lottery?

A seaplane with pilot lessons.

Interested in becoming Alan’s colleague? Check out our open positions, here!

Can Our Crystal Ball Hack It? 2017 Varonis Cybersecurity Predictions

Can Our Crystal Ball Hack It? 2017 Varonis Cybersecurity Predictions

Everyone makes predictions at this time of year, but who looks back to check on their accuracy? Let’s have a look at some of last year’s omens before directing our forecast lens to 2017.

Our first prediction for 2016: The U.S. Presidential campaign will be affected by a cyber attack.

We were on to something here, but we should have said numerous attacks. From Wikileaks exposing internal campaign emails to allegations that Russia attempted to affect the outcome, security became a front-and-center issue.

We also predicted: Ransomware damage will double.

We had the right direction but the problem actually became far worse than our modest foreboding (a real kick in the crystal ball). While 2015 saw about $325 million in ransom from CryptoLocker alone, 2016 will likely hit $1 billion in ransomware damages according to the FBI.

Amid the hacked ruins, compromised confidences and costly shakedowns of 2016 is the realization that privacy can never truly be assured for modern communications.

Let’s see what 2017 will bring.

1. Extortionware will be the new lucrative thing.

Ransomware’s more targeted, more difficult and more lucrative cousin, will emerge and cause major financial damages because of the sheer size of the payouts demanded when highly sensitive data is threatened with exposure. This will go largely unreported for reasons of discretion, making the prescience of this prediction conveniently unverifiable next year.

2. Ransomware will continue to be a major thing (and backups aren’t enough).

Ransomware will continue to grow in terms of the sheer number and frequency of attacks on organizations. IT best practices for defending against ransomware will expand from backup remediation to early detection and alerting as user behavior analytics become more intelligent and predictive. Stopping an attempted attack – before or right after it starts – is far more efficient and less painful than figuring out which files were affected and restoring them from backup.

3. Threats within will drive the need for smarter security analytics.

Adoption of security analytics will increase, as insider threats continue to get CXO and board-level attention. Insiders have legitimate access to systems and data, so preventing initial access is more than impractical. Detection is the next line of defense for employees or contractors who abuse their access, and to reveal insider credentials that are stolen.

4. Goodbye, ads. Hello, blockers.

The use of ad blockers will skyrocket after another major media site becomes a distributor of malware (as Forbes was in 2016) and users take more deliberate command of their own protection against growing malware threats.

5. Weaponizing IoT will become a regular occurrence.

IoT (Internet of Things) devices such as DVRs and security cameras will become more frequent targets for attackers. While the devices themselves may not all contain valuable data, they represent potential stepping stones on a hacker’s path to steal digital assets. The Mirai botnet, capable of some of the biggest attacks yet and able to reach high volumes with minimal ramp-up time, will threaten the adoption of IoT applications as device makers realize they must make security a design principle or lose their markets.

6. You’re hired, Ms. IT Security Candidate.

With $1 trillion predicted to be spent globally on cybersecurity between 2017 and 2021 and more than 200,000 security jobs currently unfilled in the U.S., computer security skills will continue to be the hottest kind in the IT job market in terms of the number of unfilled jobs and the compensation levels.

7. Organizations will need to save users from themselves.

User education on password hygiene and recognizing potential attacks will continue to increase but the reality will sink in that vigilance alone will not suffice, as phishing and malware become more and more difficult for even careful employees to detect. Organizational remedies will become more widespread to protect their employees, customers, partners, and themselves.

I’m Jim Graham, Manager of Sales Engineering at Varonis, and This is How I Work

I’m Jim Graham, Manager of Sales Engineering at Varonis, and This is How I Work

This quarter we will be getting to know Jim Graham, a Manager of Sales Engineering at Varonis, who manages employees located in California, Nevada, Arizona, New Mexico, and Hawaii.

According to his manager Scott Truchot:

Jim is well liked by his coworkers and there to provide a helping hand when needed, and his happy demeanor invites people to spend time with him off the clock as well.

 How does Jim work his magic with customers?

He understands the challenges our customers face, and how Varonis can help at all levels of an organization.  He always maintains a professional, yet personal demeanor which sets customers at ease and quickly shifts to them respecting him as a trusted advisor.

When he first started at Varonis as a Sales Engineer, he met with an unhappy customer that was not going to renew their maintenance.  Within a few days of work, not only did he make them happy and renew, they actually bought additional software from us.”

Read on to learn more about Jim – this time, in his own words.

When did you start working at Varonis and what does your role entail?

I have been with Varonis since July of 2013. As a Manager of Sales Engineering, I am responsible for leading my team, ensuring that they each have has a successful sales campaign. I also make sure our customers are getting the most value from the products and solutions they have purchased.

Relationship counseling is also a part of my job here, something you might not expect. I greatly enjoy teaching my team the hard and soft skills that I have used in my past in order to be successful and watching them be successful as well.

How has Varonis helped you in your career development?

Varonis has helped me better understand my strengths as a manager and provided me the opportunity to lead a fast growing team.

What advice do you have for prospective candidates?

To be mindful that each day is an opportunity to help build a great company. That every job and task we do is part of the bigger goal and to celebrate the little wins.

What do you like most about the company?

Each day we make a difference to our customers and we continue to innovate our solutions to help guarantee that difference for years to come.

What’s the biggest data security problem your customers/prospects are faced with?

The lack of visibility across the business and the capability to act against a threat is our customers and prospects greatest problem.

What certificates do you have?

I have certificates for Microsoft Certified IT Professional in SQL and Microsoft Certified Professional for SharePoint, Dynamics GP, and Dynamics CRM.

What’s your all-time favorite movie or TV show?

I really am hooked on the Walking Dead and the Game of Thrones.

If you could choose any place in the world to live, where would it be and why?

I don’t know if I could pick just one place. The place where I would like to live most would be somewhere tropical and by the ocean. Growing up in Colorado, I have had enough cold to last a lifetime.

What is the first thing you would buy if you won the lottery?

I would buy a house near the beach.

Interested in becoming Jim’s colleague? Check out our open positions, here!

Protecting Bridget Jones’s Baby

Protecting Bridget Jones’s Baby

In the wake of the Sony Pictures breach, studios are getting much smarter when it comes to data protection. A shining example is Miramax, a global film and television studio best known for its award-winning and original content such as 2016’s Bridget Jones’s Baby with Universal Pictures and Studio Canal.

Read the full case study ⟶

Miramax was looking for a solution that could monitor for insider threat and user behavior activity, and help classify its unstructured data for content discovery, remediation, and protection—that’s when implementation of Varonis DatAdvantage, DatAnswers, and Data Classification Framework all came into play.

Denise Evans, VP of Information Technology at Miramax mentioned, “Prior to implementing a least privilege model with Varonis, 40% of our files were overexposed when they didn’t need to be. This kind of exposure isn’t a problem until a  security breach occurs. Should there be a breach, we’re now able to quickly identify and target problem areas in a manner we weren’t previously able to do.” With the help of Varonis, Miramax was able to put in place a least privilege model, so that users only had access to the files they needed to do their jobs.

What’s also really compelling about this story is that Miramax is using our secure search product DatAnswers to enhance productivity. Miramax can now support eDiscovery requests and get very accurate search results that save the company time and money.

Click to read the full case study: https://www.varonis.com/success-stories/miramax

Enterprise Security Gaps: a Ponemon Institute Study

Enterprise Security Gaps: a Ponemon Institute Study

We recently sponsored a study about data protection and enterprise security with the Ponemon Research institute: Closing Security Gaps to Protect Corporate Data: A Study of U.S. and European Organizations.

A primary focus was to research security gaps within organizations that lead to data breaches and ransomware attacks – what are the leading causes?  How frequently does data theft occur?  How does ransomware affect organizations?  Where are these security gaps most evident?

Some key findings include:

  • 76% of IT practitioners say their organization experienced the loss or theft of company data over the past two years.
  • 62% of end users say they have access to company data they probably shouldn’t see.
  • 35% of organizations have no searchable records of file system activity, leaving them unable to determine which files have been encrypted by ransomware.
  • Only 29% of enterprises enforce a least privilege model to ensure that insiders have access to company data on a strictly need-to-know basis.

One of the biggest takeaways from these findings is that you can’t prevent what you don’t know about: overexposed data and users with excess privilege present a huge risk to enterprise security, leaving file and email servers vulnerable to data breaches and theft.

In order to close these security gaps and protect organizations from data theft and ransomware attacks, organizations need to monitor file activity & user behavior – and get to a least privilege model so that sensitive data is locked down and secure.

Find out how Varonis closes these security gaps and protects enterprise data.

6.2.51 (including DLX) is now GA

6.2.51 (including DLX) is now GA

We’re excited to announce the GA release of 6.2.51: this release includes a range of enhancements focusing on data security, new integrations, and a more intuitive user interface.

Some of the highlights that are now generally available include:

New DatAlert Threat Models: Get inside-out security with sophisticated threat models built on advanced analytics, user behavior, and machine learning.  DatAlert threat models protect your data and trigger alerts on what looks unusual, uncovering potential security issues.

New DatAlert Web UI: DatAlert’s new web UI makes it easy to spot threats to your data – who’s behaving suspiciously and which data assets are threatened – and identify ransomware activity before it’s too late.  The new DatAlert UI includes:

  • A dashboard displaying alerts at a glance, top alerted users, assets, and threat models, along with a kill chain analysis.
  • In-depth views of alert data
  • Context cards with detailed information on alerts and activity

Varonis behavior research laboratory: A dedicated team of security experts, analysts, and data scientists who stay up-to-date on the latest security issues, APTs, and insider threats, and how to defend against them. The laboratory continually introduces new threat models to DatAlert – including the latest threat model introduced in 6.2.51 that actively detects patterns and user actions that resemble ransomware.

SIEM Integration: Users can automatically send DatAlerts into these external platforms, thereby increasing the speed and accuracy with which they are able to identify threats by correlating unstructured data behavior with alerts from other systems.

DatAdvantage for Microsoft Office 365: Get actionable insight and bi-directional visibility in the cloud with permissions visibility for Microsoft Exchange Online, SharePoint Online, OneDrive, and visibility into Active Directory for Azure.

Directory Services: Manage risk reduction and business intelligence more effectively by viewing authentication statistics, tracking GPO policy settings, and with real-time alerts on permissions and policy changes. See account authentication and access requests; when GPO settings were modified, and more.

Reporting enhancements: Varonis reports give insight into trends, help track and monitor activity and use, and give greater visibility into your data.  New reports include: Most active users per folder, GPO setting changes, Open access on sensitive data, and more.  The report API provides customers with restful APIs that enable accessing and extracting data from DatAdvantage.

Commit Management Platform: a centralized console enables managing individual and bulk changes to access control lists and group memberships, viewing history and dependencies of each change before it happens.  We’ve also added notifications on completion, configurable security options, and a rollback option for previously committed changes – saving time and eliminating potential mistakes while managing access control securely.

DataPrivilege for SharePoint: Customers can now use DataPrivilege to manage SharePoint sites and folders, setting permissions and membership requests, entitlement reviews, automatic rules and ethical walls, and more. DataPrivilege puts identity management in hands of decision makers: reducing IT burden, empowering decision makers, and sustaining a least-privilege model. Support for on-premises SharePoint entities includes:

  • Managing SharePoint site collections, protected sites and folders
  • Defining SharePoint permission levels and their inheritance structure
  • Managing SharePoint groups
  • Configuring and managing entitlement reviews for SharePoint entities
  • Ownership synchronization – Logical folder owners added through DataPrivilege are synchronized to the mapped physical folder in DatAdvantage.

DatAnswers: Search smarter with DatAnswers with more customization and control on how you manage enterprise search:

  • Users can run elevated searches, either by seeing unfiltered results or by impersonating a different user.
  • New methods are now available to retrieve a document’s metadata and the contact information of document authors, business owners and users who performed Create or Modify events on the document.
  • Limit the search scope to a specific folder or a set of folders
  • View more metadata for each item in the search results with the metadata pane

Additional Platform Support:

  • Red Hat 7, Ubuntu 12.04.4 LTS Kernal 3.2.1; Ubuntu 14.04 LTS Kernal 3.13.0
  • IBM Storwize v7000
  • AIX 7.1
  • Azure Active Directory and Office 365
  • Isilon 7.2 or higher for NFS events
  • SQL Server AlwaysOn availability groups.
  • NetApp 8.3 RC, GA; 8.3.1 RC; 8.3 P1 – Also supported for cluster mode
  • Nexenta

[Infographic] Varonis Behind the Scenes

[Infographic] Varonis Behind the Scenes

With 32 patents issued and 108 patent applications worldwide, we’ve been working hard to help you protect your organization’s data from insider threats and cyberattacks. To get a better idea of what’s happening behind the scenes, we thought it might help to see a few stats.

The People Behind the Software

We currently have 989 employees worldwide. The staff includes software developers, support, sales engineers, marketing and sales, and many individuals in between who play more than one role — we’re fully loaded and committed to help our prospects and customers protect their data from the inside out!

For an inside scoop on Varonis employees, check out our “This is How I work” series. If you’re curious about our company culture, watch our Why Work at Varonis video as well as open positions, here!

Explosion of Use Cases

Catch up on the latest use cases on our Solutions page. From insider threat prevention, automating data protection, and regulatory compliance, we have you covered.

Our Customer’s Success is Our Success

Thousands of the world’s top enterprises trust Varonis to manage and protect their data. Just how many? Over 4,550 customers, across all verticals – financial, healthcare, education, entertainment, government and more!

To read more about their journey, click here.

Current customers can join our Connect community to converse with other customers, our engineers, and support staff. Once you’re in, make sure you join your regional group so that you’re invited to live connect events, where we chat about new features and products over cocktails.

Lastly, an infographic to help you put it all together:

varonis-stats-june-2016

DatAnywhere 3.0 is here

DatAnywhere 3.0 is here

DatAnywhere just got better – in addition to the secure enterprise file sync and share features you know and love, we’re thrilled to announce enhanced auditing as part of the beta release for DatAnywhere 3.0.

What does it all mean?

Well, it means that not only do you now get better reporting about who’s doing what, but DatAnywhere now includes support for third -party MDM solutions like AirWatch.  DatAnywhere events can now be translated and displayed in the DatAdvantage log – giving you reports, statistics, and visibility into your shared data.

Want to know who’s been sharing what with external parties?  Need to report on file deletions and folder movement?  DatAnywhere 3.0 has you covered.

Try DatAnywhere Now