Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot. Learn more

What's New in Varonis: April 2024

Learn more about Varonis for Microsoft 365 Copilot, our latest security posture reports, and the features of our new MDDR service.
Shane Walsh
2 min read
Last updated May 1, 2024
What's New in Varonis: April edition

This month, we unveiled updates designed to help you safely adopt and manage the use of Microsoft 365 Copilot, easily track configuration drift, and discover new ways to detect and investigate threats.

Our new functionality includes: 

Discover what’s new for Varonis customers in this quick three-minute video or continue reading for all the details.

 

Introducing Varonis for Microsoft 365 Copilot 

Varonis for Microsoft 365 Copilot is a new add-on that builds on our existing Microsoft 365 security suite and features new capabilities to monitor Copilot data access in real time, detect abnormal Copilot interactions, and automatically limit sensitive data accessible by both humans and AI. 

Varonis for M365 Copilot's rapidly growing features include: 

  • Copilot posture dashboards: Get a real-time view of sensitive and regulated data exposed to Copilot users, see usage trends, and track how much sensitive data is accessed by AI. 
  • Copilot policy automation: Get your Microsoft 365 environment ready for a successful Copilot rollout, safely eliminating massive amounts of data exposure in just days. 
  • Copilot monitoring and forensics: Capture all Copilot interactions, including which files are referenced in prompt responses, in our centralized and searchable audit trail. 
  • Copilot threat detection: Our user behavior analysis (UEBA) engine factors in Copilot activity and notifies customers of abnormal or suspicious Copilot interactions with sensitive data. 
  • Athena AI integration: Use Athena AI's SOC assistant and natural language search to easily investigate and resolve Copilot-related security incidents. 

Blog_Screenshot-8

Answer questions like, "How many people are using Copilot?" or "Who are my Copilot super users?"

Blog_Screenshot-1

Policies that are designed to help ensure Copilot readiness and ongoing security are marked with a "Copilot Remediation" badge.

 

Blog_Screenshot-7

Access Intelligence UI helps you quickly pinpoint what sensitive data is exposed to certain users via Copilot.

Blog_Screenshot-5

Using behavior-based rules instead of static triggers reduces false positives and alerts.

New security posture reporting 

Varonis released new security posture reports that help organizations track and report on resource-level configuration drift and security posture changes.

These reports allow users to track all the configuration drift within their environments in one exportable report, and build on our existing capabilities to combat configuration drift in your environments

Resource Level Misconfigs

Review all security posture misconfigurations within a single exportable report.

Discover and classify data in IBM DB2. 

Varonis’ world-class data classification capabilities now extend to IBM DB2 to help you discover and classify sensitive and mission-critical data across your database instances.

Screenshot-2

Discover and classify data within IBM DB2 databases.

Screenshot-1

Locate instances of IBM DB2 databases across multiple platforms.  

Varonis MDDR is now available. 

Blog_WhatsNewMarch2024-4[75]

Varonis’ newest service, Managed Data Detection and Response, combines our threat detection technology and automation with our team of threat hunters, analysts, and incident responders to investigate and respond to threats 24x7x365. 

Varonis MDDR features include:

  • Unique data-centric telemetry: Track sensitive data to determine if sensitive information was accessed during a breach and detect threats beyond APTs, including insiders and data exposure.
  • AI-powered threat detection: Our AI combines data security with UEBA to automatically assess, triage, and respond to threats without having to involve our customer. 
  • 24x7x365 coverage: Our global team of data security experts and incident responders continuously stops threats to protect your sensitive data.
  • Industry-leading SLA: Varonis MDDR offers a 30-minute response for ransomware attacks and a 120-minute response for all other alerts. The service also includes proactive threat hunting and monthly security assessments to ensure your data security posture is always improving. 

See Varonis in action. 

Varonis is innovating faster than ever, helping you get 10x the value with 10% of the effort. Ready to give our Data Security Platform a test drive? Try Varonis for free. 

It takes just minutes to install and provides data security insights instantly. Schedule your personalized, 30-minute demo with one of our security experts to get started today. 

For more information on this month’s new features, including release notes and how-to videos, visit the Varonis Community.

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

what’s-new-in-varonis:-december-2023
What’s new in Varonis: December 2023
This month brings you several new features to help security teams manage and secure their critical cloud data.
what’s-new-in-varonis:-june-2023
What’s new in Varonis: June 2023
This month brings more cloud security features to help you better govern your SaaS and IaaS security posture.
what-is-two-factor-authentication-(2fa)-and-why-should-you-use-it?
What is Two-Factor Authentication (2FA) and Why Should You Use It?
Learn why 2FA is one of the most effective cybersecurity tools you can use across your organization.
2024-cybersecurity-trends:-what-you-need-to-know
2024 Cybersecurity Trends: What You Need to Know
Learn more about data security posture management, AI security risks, compliance changes, and more to prepare your 2024 cybersecurity strategy.