-
Data SecurityJul 06, 2021
What is Data Security? Everything You Need to Know
Protect your most valuable asset: your data. Learn what data security is, including key components, technologies and best practices.
Nolan Necoechea
7 min read
-
Data SecurityJun 28, 2021
ReConnect - Meet DatAdvantage Cloud
Varonis introduced an exciting new cloud-hosted solution that brings our data-centric security approach to AWS, Box, GitHub, Google Drive, Jira, Okta, Salesforce, Slack, and Zoom!
Kilian Englert
1 min read
-
Data SecurityJun 28, 2021
Last Week in Ransomware: Week of June 28th
Ransomware in the News If you’re a small or medium business using locally hosted cloud storage drives by a popular brand you need to disconnect them from the internet immediately....
Michael Raymond
2 min read
-
Data SecurityJun 25, 2021
SIEM Tools: 9 Tips for a Successful Deployment
Security Information and Event Management (SIEM) tools are an essential part of a modern enterprise’s information security program, but careful planning and implementation are required in order to get the…
Robert Grimmick
7 min read
-
Data SecurityJun 21, 2021
Azure Bicep: Getting Started and How-To Guide
Learn more about Azure Bicep, Microsoft’s new infrastructure as a code language for deploying Azure resources. Contact Varonis today for more information.
Jeff Brown
10 min read
-
Data SecurityJun 17, 2021
Network Flow Monitoring Explained: NetFlow vs sFlow vs IPFIX
Modern networking equipment is capable of processing billions of packets every second, but most of that work happens behind the scenes. Network Flow Monitoring, also known as packet sampling, aims…
Robert Grimmick
7 min read
-
Active Directory Data SecurityJun 14, 2021
How to Create an Azure Virtual Network
Azure Virtual Networks are the core of any Azure deployment. Learn the basics of Azure Virtual Networks and how to create one using three different methods.
Jeff Brown
7 min read
-
Data SecurityJun 11, 2021
Azure Automation using PowerShell Runbooks
Ever wanted to automate the process of creation of virtual machines in Azure based on the service now request or request from any other digital workflows that the enterprise uses?...
Neeraj Kumar
12 min read
-
Data SecurityJun 07, 2021
Cybersecurity Threats Resource Center
Learn the cybersecurity threats facing your organization today and find out what tools, processes, and systems can help protect you from them.
Josue Ledesma
6 min read
-
Data SecurityJun 02, 2021
Process Hacker: Advanced Task Manager Overview
This article is an overview of the tool Process Hacker. This is a popular tool amongst security professionals when analyzing malware as it will display real-time activity of processes and provide a wealth of technical information on how a particular process is behaving.
Neil Fox
5 min read
-
Data SecurityMay 25, 2021
What is Privileged Access Management (PAM) and Why It’s Important to Your Organization
Learn why privileged access management is a necessary component of your cybersecurity strategy that keeps your assets protected.
Josue Ledesma
4 min read
-
Data SecurityMay 24, 2021
April 2021 Malware Trends Report
This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to…
Ben Zion Lavi
5 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital