Data Security
Meet DatAdvantage Cloud: Data-Centric Security for SaaS & IaaS
May 17, 2021
Today we’re happy to announce early access to DatAdvantage Cloud. Our new cloud-hosted solution brings Varonis’ data-centric security approach to AWS, Box, GitHub, Google Drive, Jira, Okta, Salesforce, Slack, and…
YARA Rules Guide: Learning this Malware Research Tool
May 17, 2021
YARA rules are used to classify and identify malware samples by creating descriptions of malware families based on textual or binary patterns.
How to Use Azure Sentinel for Security Analytics and Threat Intelligence
May 11, 2021
Data is the key, and security is the topmost concern for every organization. It is nearly impossible to properly analyze and resolve high volumes of security alerts generated by the…
What is an SMB Port + Ports 445 and 139 Explained
May 07, 2021
An SMB port is a network port commonly used for file sharing. IBM programmer Barry Feigenbaum developed the Server Message Blocks (SMB) protocol in the 1980s for IBM DOS. SMB continues to be the de facto standard network file sharing protocol in use today.
5 Data Governance Reports for Data Owners
Apr 27, 2021
This blog will cover five Varonis reports that you can automatically generate for data owners to promote strong data governance practices. We will show you how to create, customize, schedule,...
ARP Poisoning: What it is & How to Prevent ARP Spoofing Attacks
Apr 27, 2021
ARP Poisoning is a type of cyberattack that abuses weaknesses in the widely used Address Resolution Protocol (ARP) to disrupt, redirect, or spy on network traffic. In this piece, we’ll…
What is C2? Command and Control Infrastructure Explained
Apr 26, 2021
A successful cyberattack is about more than just getting your foot into the door of an unsuspecting organization. To be of any real benefit, the attacker needs to maintain persistence…
Permission Propagation: Info and Tips
Apr 23, 2021
It's vital to understand permission propagation and its effect on cybersecurity—learn about roles, inheritance, broken folder permissions and more.
How Varonis Limits Organization-Wide Exposure
Apr 07, 2021
If you were hired at a top financial institution as a junior analyst tomorrow, chances are you’d have access to 20% of the company’s data on day one. Data available...
Are You Prepared For a Supply Chain Attack? Why Supply Chain Risk Management is Essential
Apr 02, 2021
Learn how to spot supply chain risks, attacks, and how to properly defend against them with an effective supply chain risk management strategy.
Using Salesforce Analytics for GDPR Compliance
Apr 01, 2021
GDPR compliance can be stressful. This guide shows you how to use Salesforce Analytics to comply with GDPR regulations by walking through common use cases.
Endpoint Detection and Response: All You Need to Know About EDR Security
Apr 01, 2021
This guide covers Endpoint Detection and Response, a type of solution to detect and respond to suspicious activity on desktops, laptops, and mobile devices.
Try Varonis free.
Deploys in minutes.