Varonis offers a powerful software suite that protects your file, email servers and cloud applications from cyber-attacks and insider threats. We analyze the behavior of the people and machines that access your data, alert on misbehavior, and enforce a least privilege model.

 

We help thousands of customers prevent data breaches.

Varonis Edge

Insider Threat

Varonis Security

PRODUCT OVERVIEW

 

Extend Your Data Security to the Edge

  • Spot signs of attack at the perimeter with telemetry from VPN, DNS, and Web Proxies.
  • Analyze activity on perimeter devices including DNS and VPN.
  • Apply geolocation and threat intelligence to your security telemetry.
  • Detect perimeter attacks like malware, APT intrusion, and exfiltration.

 

"It’s like having an extra staff member that never sleeps always watching over our data." – Jay Attiya, Director of IT, Toms River Regional Schools

 

Detect perimeter attacks including DNS attacks, domain hijacking - even stolen credentials on a VPN.

  • Detect primary intrusion vectors of malware: email, web, and brute force attacks
  • Correlate events and alerts so you can see the full picture and investigate security violations.
  • Stop Trojan code from leveraging DNS for botnet campaigns, financial data theft campaigns or targeted attacks

Get more telemetry and context from the core to the perimeter

  • Track potential data leaks and attacks at the edges
  • Apply perimeter context to internal alerts
  • Apply internal context to perimeter alerts
  • Monitor perimeter attacks and put them in context with activity and alerts in your core data stores

Detect Attacks on the Edges of the Cyber Kill Chain

  • DNS Tunneling
  • Access from a suspicious or unexpected geolocation
  • Account Hijacking
  • Access from a suspicious IP
  • Access to known C&C servers
  • ….many more

3 Ways Varonis Helps You Fight Insider Threats

1. Rapid Detection and Response

 

Varonis DatAdvantage captures more information about how users interact with data than any other technology – it analyzes file system activity on platforms that provide adequate auditing through their API’s, like those from Netapp and EMC and in Office365, and uses file system filters to capture metadata for platforms where native auditing is lacking, like Windows, Unix, Exchange, and SharePoint.


Varonis DatAdvantage also collects critical Active Directory events, like logon events and group changes, and with Varonis Edge, telemetry from DNS servers, web proxies and VPN concentrators. DatAdvantage also collects permissions/access control list information, and with the Data Classification Engine, looks inside files to discover sensitive information, like personal data, medical records and financial information.

 

2. Data Lockdown

One of the biggest soft spots for insider threats is shared folders, which typically hold 10 to 1,000 times more data than on a laptop or a workstation. In the 2017 Varonis Data Risk Report, we found that 20% of all shared folders were open to every employee. One rogue user could potentially steal any part of 20% of your data without requiring any more sophistication than mapping a drive.


Varonis DatAdvantage analyzes file system permissions, user and group relationships, and activity to find overly broad access granted through global groups (like everyone, authenticated users, and domain users), permissions malfunctions, and excessive group memberships. DatAdvantage also provides the ability to model or sandbox changes to reduce access, and then execute them, safely. The Varonis Data Classification Engine can help you prioritize remediation efforts by identifying sensitive and regulated content, and the Varonis Automation Engine can safely remove global access groups over entire shares or servers – automatically. By reducing broad access, an insider can do
far less damage.

 

3. Data Cleanup

Varonis automates data disposition and clean-up projects. Sensitive data that’s exposed to all insiders can be locked down or quarantined. Non-business data can be deleted. Data that hasn’t been accessed for a long time can be moved to cheaper storage and restricted. The Varonis Data Transport Engine allows you to define rules to identify data that meets criteria for sensitivity and relevance, move or delete it, even translating permissions across data stores and domains.


By reducing the amount of accessible stale and sensitive data, you can reduce the scope of damage an insider can do.

YOUR DATA. OUR MISSION.


Our unified data security platform is engineered from the ground up to protect your data from insider threats and cyberattacks.


Prevent data breaches
Detect and investigate anomalous behavior, privilege escalations, and unauthorized access to your core data stores: file servers, email systems, Active Directory.

Reduce Risk
Identify your most sensitive data, see where it's overexposed, track who can and does access it, and safely lock it down to a least privilege model.

Achieve Compliance
Demonstrate compliance with built-in reports and a searchable audit trail of data access and authorization process. Help meet requirements for GDPR, PCI-DSS, HIPAA, GLBA, SOX, and more.

 

Security Analytics with Deep Data Context

Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification, and threat analytics.

Confidently answer the question “Is my data safe?” with continuous monitoring and alerting on your core data and systems. Varonis is the only solution that combines data classification and access governance with UEBA, giving our threat models richer context and more accurate alerts.

We protect your data wherever it lives.