Data Transport Engine

Auto-Enforce Data Governance Policies

Automatically move, archive, quarantine, or delete data based on content type, age, sensitivity, and access activity.

Download Datasheet

Automate policies in minutes, no code required

Create automation rules customized to fit your data security and privacy policies. Seamlessly copy and move data cross-domain or cross-platform without the risk of breaking permissions or interrupting business.

Build rules using a wide array of out-of-the-box filters, custom flags and tags, or labels applied via Microsoft AIP.

  • Permissions
  • Directory depth
  • Classification rule match
  • Creator/owner
  • File type
  • Access path
  • Classification category
  • # of sensitive record hits
  • File/folder size
  • Last access date
accent

“We have Data Transport Engine monitoring our systems on a set schedule. When it detects a file that hasn’t been touched for 90 days, it automatically moves or deletes that file.”

Infrastructure Engineer, International Law Firm

PII protection on autopilot

Ensure sensitive files don’t end up in risky, out-of-policy locations by quarantining misplaced regulated data. Data Transport Engine doesn’t just look at file-level metadata—it understands permissions, user activity, and file contents.

accent

Measure twice, cut once

Simulate your rules before you execute to visualize your new folder structure and permissions. Mirror existing permissions or automatically restrict access only the people who actively use the data.

Maintain business continuity

Schedule actions to adhere with maintenance windows or time constraints. Source and destination data are auto-synchronized with incremental copying — even if the source data is still being used.

Leave stub files behind when moving data so your users can still access archived data if needed.

Automate your compliance with Data Transport Engine.

accent

Data Transport Engine benefits

Clean up stale data

Confidently identify and archive data that is truly inactive, based on actual human user activity, not just last modified date. Reduce your risk and your storage costs.

Reduce your attack surface

Minimize the chance of a data breach by quarantining or archiving sensitive data that’s been accidentally misplaced or is no longer needed.

Streamline your cloud migrations

Stage on-premises data for a cloud migration with powerful rules that can separate the files you need from the files you don’t.

Create granular rules to meet complex privacy requirements

Enforce unique retention policies for different departments, servers, data types, and sensitivity levels.

Easily delete PII to comply with right-to-be-forgotten requests

Execute one-time or recurring rules to ensure that personal data is truly forgotten.

Simplify domain consolidation

Easily consolidate domains and handle large-scale data migrations, all while making sure data stays protected and permissions are optimized. Take full control of naming conventions, permission structures, and collision behavior.

“Using Varonis to identify stale data enables organizations to right-size their storage environments. Decreasing the amount of data in storage environments has the added benefits of increasing the overall performance of the storage environment and reducing the likelihood of a security breach.”

Read the Report

Resources

Technology Guide
How Varonis Helps Securely Migrate Data to the Cloud

Read More

Whitepaper
12 Ways Varonis Helps You Manage Mergers and Acquisitions

Read More

Case Study
How an International Law Firm is Remediating Nearly 470,000 Stale Sensitive Files With Varonis

Read More

FAQ

  • Can I move data cross-domain?

    With Data Transport Engine, you can migrate data between different platforms, migrate data between servers in different domains, and even map permissions from one platform to another.

  • How do you create transport rules?

    You can use the rule configuration wizard to set up rules based on your data transport needs: copy data from one folder to another, define project scope, delete empty folders after copying, even mirror permissions.

  • How do you mirror permissions?

    Data Transport Engine has out-of-the-box rules that enable copying folders and files such that the destination folder is identical to the source folder in terms of both content and permissions.

Want to see Data Transport Engine in action?

Request a Demo