Automatically find and secure sensitive data in Network File System shares on Oracle Solaris operating systems.
Detect unauthorized and abnormal Solaris activity.
Our behavior-based threat models detect any suspicious data access patterns—like ransomware or malicious insiders. Trigger an automatic response to mitigate damage. Get alerts on configuration file changes, permissions changes, and other file system actions that could put your Solaris-hosted files, databases, and applications at risk.
Get to least privilege with low effort.
Varonis crawls your Solaris permissions structure and creates a bi-directional permissions map so you can easily ensure only the right people have access to data, simulate permissions changes in a sandbox, and revoke unnecessary access without impacting the business.
Keep a full log of Solaris data access.
See a consolidated, human-readable log of every file and folder action and easily correlate events from Oracle Solaris systems with activity from LDAP, Windows, Active Directory, VPN, and Microsoft 365. Use your audit trail to investigate security incidents, find lost files, and prove compliance.