Jump to content

NAS Permissions and Storage Optimization

  • Audit user activity on CIFS and NFS data
  • Visualize and report on permissions
  • Identify and involve data owners
  • Identify stale data
  • Lock down exposed, sensitive content
  • Simplify migrations and consolidations

Support for EMC VNX (Celerra), Netapp filers, HP IBRIX X9000, and more.

Interested but want to learn more? Register to download our free whitepapers, webinars, and case studies.

Overview

The Challenge

NAS administrators know that their storage requirements continue to increase by as much as 50% year over year. As the data grows it has to be backed up and archived to ensure that it's protected, preserved, and ready for use—even though much of that data – typically over 50% – is 'stale' or unused. For the data that is being used, it's impossible to determine which business units, individuals, or applications actually use which data because audit information from NAS systems is voluminous and often unavailable.

This can make migrations and consolidations difficult, chargeback initiatives imprecise, and also make it risky to revoke permissions because there is no way to test changes prior to committing them—a data move or a permissions change could impair or take down a critical application. Network attached storage administrators have to keep those terabytes available, backed up and responsive for both CIFS and NFS clients.

The Varonis Solution

Varonis addresses these challenges with a unique solution. Varonis® DatAdvantage® aggregates Active Directory, LDAP, and NIS user and group details, CIFS and NFS data hierarchy and ACL information, each and every data access event, and which files contain sensitive or regulated content. Varonis builds a complete picture of who can access data, who is accessing data, and who should have their access revoked, which data is stale, and where sensitive data is exposed to risk. It also helps identify data owners, so you can work directly with them during migrations and consolidations, and ensure that the right people have access to the right data.

Metadata Streams

Four types of metadata are critical for data governance

  • User and Group Information - from Active Directory, LDAP, NIS, SharePoint, etc.
  • Permissions information - knowing who can access what data in which containers
  • Access Activity - knowing which users do access what data, when and what they've done
  • Sensitive Content Indicators - knowing which files contain items of sensitivity and importance, and where they reside

Varonis Metadata Image

Why Varonis

Data protection is necessary to safeguard an organization's customers, employees, business partners, and investors. It is fundamental in securing an organization's intellectual property and competitive edge, and for maintaining the organizational trust required for it to properly function. Ongoing, scalable data protection and management require technology designed to handle an ever-increasing volume and complexity—a metadata framework.

The Varonis Metadata Framework non-intrusively collects this critical metadata, generates metadata where existing metadata is lacking (e.g. its file system filters and content inspection technologies), pre-processes it, normalizes it, analyzes it, stores it, and presents it to IT administrators in an interactive, dynamic interface. Once data owners are identified, they are empowered to make informed authorization and permissions maintenance decisions through a configurable web-based interface—that are then executed—with no IT overhead or manual backend processes.

Return on Investment

Management Activity

Perform Data Protection Activities up to 30 Times Faster



Active vs. Stale

Reduce Storage Costs by up to 35%

Resources

30-Day Trial

Our 30-Day Free Trial provides a full audit of your file system or your SharePoint environment. Audit permissions, auditing access, usage statistics, recommendations, impact analysis, and identification of business owners.

Within hours of installation

You can instantly conduct a permissions audit: File and folder access permissions and how those map to specific users and groups. You can even generate reports.

Within a day of installation

Varonis® DatAdvantage® will begin to show you which users are accessing the data, and how.

Within 3 weeks of installation

Varonis® DatAdvantage® will actually make highly reliable recommendations about how to limit access to files and folders to just those users who need it for their jobs.

Get the Varonis View. Sign up for the 30-Day Free Trial.