Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more

DatAlert Analytics and the Varonis Behavior Research Laboratory

Last November, we introduced Varonis UBA threat models to automatically analyze behavior and detect insider threats throughout the lifecycle of a breach.  Our UBA threat models, which are major enhancements...
Michael Buckbee
1 min read
Published February 24, 2016
Last updated January 17, 2023

Last November, we introduced Varonis UBA threat models to automatically analyze behavior and detect insider threats throughout the lifecycle of a breach.  Our UBA threat models, which are major enhancements to Varonis DatAlert and are in beta availability, have been helping our customers protect their data – from spotting signs of ransomware activity to catching unusual activity on sensitive data.

But with news of more data breaches rolling out every day and brand new variants of ransomware popping up all the time, how can you keep up?

We’ve established a professional behavior research laboratory for just that reason.

Security experts and data scientists from Varonis now continually introduce new behavior-based threat models as part of DatAlert Analytics, keeping you up-to-date with the latest in security issues, APTs, and insider threats. This dedicated team is focused exclusively on creating new threat models to better protect your data, including privileged and service account detection and integration with all up-to-date malware and crypto repositories.

As insider threats become more sophisticated, so do our security tactics.  Some of the things our experts will focus on in the coming months include:

  • Account detection and auto-profiling, so you can automatically detect executive accounts and see unauthorized attempts to gain access to c-level data.
  • Threat models designed to alert on new variants of CryptoLocker so you can spot ransomware attacks before they get out of hand.
  • Threat models that detect mass deletes and lockout activity so you can find out when somebody’s attempting to damage or destroy data before it’s gone.

DatAlert Analytics is like having your very own behavior research laboratory to stay on top of the latest in security attacks and develop more ways to fight back against insider threats. Want to get see DatAlert Analytics in action?  Get in touch.

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

cryptolocker,-lockouts-and-mass-deletes,-oh-my!
Cryptolocker, lockouts and mass deletes, oh my!
DatAlert Analytics just got some new threat models. Our research laboratory is tracking new ransomware, finding vulnerabilities in common security practices, and setting up new threat models to keep your...
visualize-your-risk-with-the-datalert-dashboard
Visualize your risk with the DatAlert dashboard
Last week, we introduced over 20 new threat models to help defend your data against insider threats, ransomware attacks and threats to your most sensitive data. But with all this...
what-is-threat-modeling-and-how-to-choose-the-right-framework
What is Threat Modeling and How To Choose the Right Framework
Learn why threat modeling is necessary for protecting your organization and how to choose the right framework for your specific needs.
three-ways-varonis-helps-you-fight-insider-threats
Three Ways Varonis Helps You Fight Insider Threats
Insider threats are difficult for organizations to combat. Varonis’ modern cybersecurity answer uses the data security triad of sensitivity, access, and activity to combat threats.