Varonis debuts trailblazing features for securing Salesforce. Learn More

Varonis announces strategic partnership with Microsoft to acclerate the secure adoption of Copilot.

Learn more

Polyrize Acquisition

1 min read
Last updated June 16, 2023

I’m excited to announce today our agreement to acquire Polyrize, a software company whose team and products are a natural fit as part of the Varonis family. This is the first company Varonis has acquired, and I want to give you some background on the strategic rationale for today’s announcement.

While companies have been moving data to the cloud for some time, we’ve seen cloud adoption accelerate this year. This is not surprising, as the spread of COVID-19 has meant that employees – quite literally overnight – needed to begin working from home, and cloud services are naturally suited to anywhere, anytime access. Today, sensitive data is stored in and accessed from more places than ever before. Access grows unchecked in every store, each having its own permissions model and configuration set. User, application and administrative accounts multiply and become difficult to manage.

In other words, organizations are both more reliant on the cloud and more at risk, so protecting sensitive data across new cloud stores is becoming more urgent. This is where the acquisition of Polyrize comes in, and why it makes sense for Varonis and for our customers right now.

Polyrize has developed software to map and analyze the relationships between users and data in cloud data stores like Salesforce, G-suite and Amazon S3, and correlate the disparate accounts used to access these stores.  Varonis started mapping the relationships between users and data years ago, first in the on-prem world, and more recently as part of our support for Office 365 and Teams, where we have seen enormous momentum.

By incorporating Polyrize’s capabilities into our Data Security Platform, we can extend our coverage, expand our market opportunity, and offer a more complete view into established and emerging enterprise data stores. It’s a natural fit.

Wherever the relationships between users and data become complex, Varonis shines. Our technology has helped thousands of organizations visualize their sensitive data, prioritize and remediate risk, and detect and respond to threats in major enterprise data stores. With our acquisition of Polyrize, we accelerate our plans to provide the same level of control and automation to new stores.

If you’d like to hear more about this exciting acquisition, we’d be happy to meet with you for an executive briefing. Please contact your sales team or click here to schedule.

Be well,

Yaki

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.
Try Varonis free.
Get a detailed data risk report based on your company’s data.
Deploys in minutes.
Keep reading
threat-update-56-–-sso-imposter:-targeting-box
Threat Update 56 – SSO Imposter: Targeting Box
In the final part of the series, Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team walk through how attackers could target Box. They investigate how an attacker…
threat-update-55-–-sso-imposter:-targeting-google
Threat Update 55 – SSO Imposter: Targeting Google
In part two of this three-part series, Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team investigate how an attacker who compromised a single sign-on admin account can…
threat-update-54-–-sso-imposter:-intrusion
Threat Update 54 – SSO Imposter: Intrusion
Virtually every organization leveraging more than a few cloud offerings has a single sign-on solution to simplify the management of their various cloud apps. With a little careful planning, attackers…
threat-update-53-–-proxyshell-and-petitpotam-and-ransomware…-oh-my!
Threat Update 53 – ProxyShell and PetitPotam and Ransomware… Oh My!
Technology grows, evolves, and changes over time, but most organizations often need to support legacy systems. In the Microsoft world, this typically means keeping legacy authentication protocols like NTLM authentication…