What's new

Explore our latest product enhancements, release notes, acquisitions, and more.

Apr 2026

AI Security DSPM Posture Management

Protect secrets, credentials, and PII across the development cycle

Varonis has extended its data security platform into the tools developers use to plan, build, package, and collaborate. New capabilities detect and secure secrets, credentials, and PII across the development lifecycle through integrations with Jira, Confluence, and GitHub, with new support for Bitbucket and JFrog.

With Varonis Atlas, customers can also secure the AI systems used to build AI applications and pentest applications before deployment.

Learn more here

Count files directly under a folder for more precise reporting

Customers can now count files that are located directly under a selected folder. This makes it easier to generate precise reports for stakeholders by isolating top‑level folder contents.

Malicious domain detection and password validation

Customers can now strengthen account security by detecting sign‑in attempts from malicious domains and validating password strength using new filters in Account analytics. The Token issuer and Password policies filters help teams quickly assess authentication risk and identify weak account protections.

Localized timestamps for Data Access Governance requests

Data Access Governance timestamps are now shown in customers’ local time zones, making it easier to review request creation, activation, expiration, and scheduling times. 

Centralized management for Data Access Governance Requests

The new Requests page in Varonis Analytics provides a centralized workspace for viewing and managing all Data Access Governance (DAG) requests. Enhanced filtering, drilldowns, and built‑in insights help teams identify governance risks, enforce governance policies, and prepare for compliance audits more efficiently.

Gain full visibility into Governed Resources and Groups

Analytics for Resources and Groups now include dedicated views for governed entities, giving admins a single place to analyze governed resources and groups and take action. Enhanced filtering, insights, contextual drilldowns, and streamlined enforcement actions deliver greater visibility and actionability across the Data Access Governance (DAG) interface. 

Automatically label files based on inherited flags 

Labels can now be applied automatically to files that inherit flags from flagged folders, enabling fully automated labeling for new files added to flagged locations.