Varonis MDDR: Industry's First Managed Data Detection and Response Offering

New 24x7x365 threat detection and response service is built to stop data breaches.
Rob Sobers
1 min read
Last updated March 5, 2024
shield cover cloud data, Varonis

We're thrilled to announce the latest evolution in our mission to deliver effortless outcomes for our customers: Managed Data Detection and Response (MDDR). MDDR is the industry's first managed service dedicated to stopping threats at the data level. 

The service combines Varonis' award-winning threat detection technology and automation with a global team of elite threat hunters, forensics analysts, and incident responders who investigate and respond to threats 24x7x365.

Blog_MDDR_InCopyImage-2_FNL 1

Our data-centric approach

Unlike traditional MDR services that are endpoint- and network-centric, MDDR focuses on a company's most critical asset — data.

"Organizations pay millions of dollars for threat detection products and services, yet when an incident occurs, they struggle to answer the most important question, 'Was any data stolen?'" said Matt Radolec, VP of Incident Response and Cloud Operations at Varonis. "Varonis brings threat detection and response closer to the target — closer to the data. MDDR gives customers the business outcome they want without the complexity and cost of building their own 24x7 operation."

Blog_MDDR_InCopyImage-3_FNL 1

Varonis pioneered real-time data detection and response (DDR) in 2013, added advanced user and entity behavior analysis (UEBA) in 2016, and formed its incident response (IR) organization in 2018. Since its inception, Varonis IR has investigated over 10,000 incidents. Along the way, we’ve added accolades for our category-leading DSPM from top analyst firms and industry leaders. 

Blog_MDDR_InCopyImage-1_FNL 1

How MDDR works

Varonis MDDR enhances the overall customer value and fills a major void in the managed cybersecurity services market. When threat actors bypass endpoint and perimeter defenses, Varonis is an organization’s last and only line of defense. 

Blog_MDDR_InCopyImage-4_FNL 1

MDDR gives our customers added assurance that their data is monitored around the clock:  

  • An industry-best SLA. Varonis MDDR offers a 30-minute response for ransomware attacks and a 120-minute response for all other alerts. The service also includes proactive threat hunting and monthly security assessments to ensure your data security posture is always improving. 
  • AI-driven investigations. MDDR is powered by Varonis’ proprietary data insights and an AI analysis engine that automates investigations. Critical alerts are sent to Varonis’ expert team for further investigation and mitigation.
  • Immediate time-to-value. Up and running in hours, not days or weeks, MDDR is a turnkey solution that solves the challenge of protecting sensitive data automatically. We’ll seamlessly integrate with your team and escalate incidents only when needed.

The new service is delivered on top of Varonis's cloud-native Data Security Platform and is available today. Reach out to your Varonis representative, or see Varonis in action by scheduling your 30-minute demo and see how Varonis MDDR can help secure your organization. 

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

how-to-analyze-malware-with-x64dbg
How to Analyze Malware with x64dbg
This is the fourth and final article in a series of blog posts that serve as an x64dbg tutorial. In this article, we will be taking all the knowledge we…
malware-protection:-basics-and-best-practices
Malware Protection: Basics and Best Practices
Our malware protection guide covers malicious software, utilizing the outlined controls and best practices to achieve a higher level of security.
how-to-use-ghidra-to-reverse-engineer-malware
How to Use Ghidra to Reverse Engineer Malware
An overview of the malware analysis tool Ghidra. This article covers how to install and navigate the Ghidra interface.
how-to-unpack-malware-with-x64dbg
How to Unpack Malware with x64dbg
This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.