Data Security
Last Week in Ransomware: Week of July 5th
Jul 06, 2021
Ransomware in the News Before we get to the major ransomware attack that occurred over the holiday weekend, let’s take a look at some of the other stories from the...
What is Data Security?: Definition, Explanation and Guide
Jul 06, 2021
Learn more about data security, why it’s important, and how you can protect your most valuable – and vulnerable – asset with Varonis.
Your Guide to Salesforce Data Protection
Jun 29, 2021
That is the approximate cost of a data breach on any business worldwide in 2020. The number increases to 8.64 million dollars in expenses in the United States alone. Let…
ReConnect - Meet DatAdvantage Cloud
Jun 28, 2021
Varonis introduced an exciting new cloud-hosted solution that brings our data-centric security approach to AWS, Box, GitHub, Google Drive, Jira, Okta, Salesforce, Slack, and Zoom!
Last Week in Ransomware: Week of June 28th
Jun 28, 2021
Ransomware in the News If you’re a small or medium business using locally hosted cloud storage drives by a popular brand you need to disconnect them from the internet immediately....
SIEM Tools: 9 Tips for a Successful Deployment
Jun 25, 2021
Security Information and Event Management (SIEM) tools are an essential part of a modern enterprise’s information security program, but careful planning and implementation are required in order to get the…
Azure Bicep: Getting Started and How-To Guide
Jun 21, 2021
Learn more about Azure Bicep, Microsoft’s new infrastructure as a code language for deploying Azure resources. Contact Varonis today for more information.
Network Flow Monitoring Explained: NetFlow vs sFlow vs IPFIX
Jun 17, 2021
Modern networking equipment is capable of processing billions of packets every second, but most of that work happens behind the scenes. Network Flow Monitoring, also known as packet sampling, aims…
How to Create an Azure Virtual Network
Jun 14, 2021
Azure Virtual Networks are the core of any Azure deployment. Learn the basics of Azure Virtual Networks and how to create one using three different methods.
Azure Automation using PowerShell Runbooks
Jun 11, 2021
Ever wanted to automate the process of creation of virtual machines in Azure based on the service now request or request from any other digital workflows that the enterprise uses?...
Cybersecurity Threats Resource Center
Jun 07, 2021
Learn the cybersecurity threats facing your organization today and find out what tools, processes, and systems can help protect you from them.
Process Hacker: Advanced Task Manager Overview
Jun 02, 2021
This article is an overview of the tool Process Hacker. This is a popular tool amongst security professionals when analyzing malware as it will display real-time activity of processes and provide a wealth of technical information on how a particular process is behaving.
Try Varonis free.
Deploys in minutes.