Varonis debuts trailblazing features for securing Salesforce. Learn More

Varonis named a Leader in The Forrester Wave™: Data Security Platforms, Q1 2023

Read the report

Varonis Version 7 Highlights

1 min read
Published March 29, 2020
Last updated October 14, 2022

Varonis Version 7 is now generally available – check out our latest 7.4 release and see some of the highlights of what’s new.

Find and fix vulnerabilities with a new Active Directory dashboard

25 new widgets to manage and protect your active directory environment at a glance.  From vulnerable Kerberos passwords to domain indicators, this dashboard is designed to help prevent attacks on Active Directory like Kerberoasting and golden ticket attacks.



Detect email attacks like never before

We’ve added new threat models to detect even more threats: customers can detect spearphishing attacks by monitoring proxy activity; detect malicious attachments in email; and more.

Get the benefits of the cloud without sacrificing security

Office 365 dashboards, Box security events, more threat models designed to protect Exchange Online, and saved searches – so you can enjoy the convenience of storing data in the cloud without sacrificing security.


Drill down into sensitive data directly from the dashboard

You asked, we listened: you can now drill down and review sensitive data directly from the dashboard – see what data is overexposed in the click of a button.


Incident response playbooks from the pros

Our security research lab has developed incident response playbooks for cyberattacks and we added them right in the UI – so that you know how to respond, who needs to be notified, and how to improve your security posture for future attacks.

Combine threat intelligence with perimeter telemetry

Track suspicious activity from the core to the edge. Varonis Edge puts perimeter telemetry in context and simplifies security investigations – bringing in threat detection, geolocation, and more to give you the full picture of what’s happening on your data.


Version 7 makes it easier than ever to see where your GDPR data is overexposed with a GDPR dashboard, out-of-the-box GDPR reports, and threat models focused on protecting GDPR data.


Scale and Speed with Solr

We’re leveraging Solr to get you responsive, fast results – even while handing billions of events at scale. You’ll see significant performance improvements, run lightning-fast investigations, and get immediate access to search results.

Broader support for platforms, proxies, and more

  • Support for NetApp ONTAP 9.5 cloud
  • New proxy source: Cisco
  • TLS 1.2 support

Customers can download Varonis 7.4 GA release via our support portal – and don’t forget to check out the product documentation (including an upgrade guide) in our customer community.

Want to learn more about what’s new in Version 7?  Check out our on-demand webinar, or request a custom product tour with one of our security engineers.

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.
Try Varonis free.
Get a detailed data risk report based on your company’s data.
Deploys in minutes.
Keep reading
Threat Update 56 – SSO Imposter: Targeting Box
In the final part of the series, Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team walk through how attackers could target Box. They investigate how an attacker…
Threat Update 55 – SSO Imposter: Targeting Google
In part two of this three-part series, Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team investigate how an attacker who compromised a single sign-on admin account can…
Threat Update 54 – SSO Imposter: Intrusion
Virtually every organization leveraging more than a few cloud offerings has a single sign-on solution to simplify the management of their various cloud apps. With a little careful planning, attackers…
Threat Update 53 – ProxyShell and PetitPotam and Ransomware… Oh My!
Technology grows, evolves, and changes over time, but most organizations often need to support legacy systems. In the Microsoft world, this typically means keeping legacy authentication protocols like NTLM authentication…