Keep reading
Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.
SecurityRWD - Introduction to AWS Identity and Access Management (IAM)
Kilian Englert
March 4, 2022
Kilian Englert and Ryan O'Boyle from the Varonis Cloud Architecture team compare and contrast Amazon Web Services Identity and Access Management against a traditional on-prem setup with Active Directory. Listen in as the team discusses how AWS IAM goes beyond simple user and group management to creating an entire network and defining access to network resources and infrastructure.
What is OAuth? Definition and How it Works
OAuth (Open Authentication) is an open-standard authorization protocol or framework that provides applications the ability for “secure designated access.” It is a way for users to grant websites or applications access to their information without giving away their passwords.
What Is Network Access Control? Explaining NAC Solutions
Robert Grimmick
July 7, 2022
Explore network access control (NAC), a technology aimed at giving organizations more control over who can access their network and with what permissions.
Automating Permissions Cleanup: An In-Depth ROI Analysis
Michael Buckbee
March 29, 2020
Previously, we discussed automating data access requests to achieve incredible ROI by cutting down on help desk tickets. We also briefly mentioned the enormous amount of work involved in finding...