Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more

Varonis MDDR: Industry's First Managed Data Detection and Response Offering

New 24x7x365 threat detection and response service is built to stop data breaches.
Rob Sobers
1 min read
Last updated March 5, 2024
shield cover cloud data, Varonis

We're thrilled to announce the latest evolution in our mission to deliver effortless outcomes for our customers: Managed Data Detection and Response (MDDR). MDDR is the industry's first managed service dedicated to stopping threats at the data level. 

The service combines Varonis' award-winning threat detection technology and automation with a global team of elite threat hunters, forensics analysts, and incident responders who investigate and respond to threats 24x7x365.

Blog_MDDR_InCopyImage-2_FNL 1

Our data-centric approach

Unlike traditional MDR services that are endpoint- and network-centric, MDDR focuses on a company's most critical asset — data.

"Organizations pay millions of dollars for threat detection products and services, yet when an incident occurs, they struggle to answer the most important question, 'Was any data stolen?'" said Matt Radolec, VP of Incident Response and Cloud Operations at Varonis. "Varonis brings threat detection and response closer to the target — closer to the data. MDDR gives customers the business outcome they want without the complexity and cost of building their own 24x7 operation."

Blog_MDDR_InCopyImage-3_FNL 1

Varonis pioneered real-time data detection and response (DDR) in 2013, added advanced user and entity behavior analysis (UEBA) in 2016, and formed its incident response (IR) organization in 2018. Since its inception, Varonis IR has investigated over 10,000 incidents. Along the way, we’ve added accolades for our category-leading DSPM from top analyst firms and industry leaders. 

Blog_MDDR_InCopyImage-1_FNL 1

How MDDR works

Varonis MDDR enhances the overall customer value and fills a major void in the managed cybersecurity services market. When threat actors bypass endpoint and perimeter defenses, Varonis is an organization’s last and only line of defense. 

Blog_MDDR_InCopyImage-4_FNL 1

MDDR gives our customers added assurance that their data is monitored around the clock:  

  • An industry-best SLA. Varonis MDDR offers a 30-minute response for ransomware attacks and a 120-minute response for all other alerts. The service also includes proactive threat hunting and monthly security assessments to ensure your data security posture is always improving. 
  • AI-driven investigations. MDDR is powered by Varonis’ proprietary data insights and an AI analysis engine that automates investigations. Critical alerts are sent to Varonis’ expert team for further investigation and mitigation.
  • Immediate time-to-value. Up and running in hours, not days or weeks, MDDR is a turnkey solution that solves the challenge of protecting sensitive data automatically. We’ll seamlessly integrate with your team and escalate incidents only when needed.

The new service is delivered on top of Varonis's cloud-native Data Security Platform and is available today. Reach out to your Varonis representative, or see Varonis in action by scheduling your 30-minute demo and see how Varonis MDDR can help secure your organization. 

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

how-to-unpack-malware-with-x64dbg
How to Unpack Malware with x64dbg
This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.
what-is-x64dbg-+-how-to-use-it
What is x64dbg + How to Use It
Learn more about x64dbg as a malware analysis tool with our full-length guide and tutorial. Contact us for free trials and tutorials in malware protection.
how-to-analyze-malware-with-x64dbg
How to Analyze Malware with x64dbg
This is the fourth and final article in a series of blog posts that serve as an x64dbg tutorial. In this article, we will be taking all the knowledge we…
interview-with-wade-baker:-verizon-dbir,-breach-costs,-&-selling-boardrooms-on-data-security
Interview With Wade Baker: Verizon DBIR, Breach Costs, & Selling Boardrooms on Data Security
Wade Baker is best known for creating and leading the Verizon Data Breach Investigations Report (DBIR). Readers of this blog are familiar with the DBIR as our go-to resource for...