Blog

Data Security

Permission Propagation: Info and Tips

Brian Vecci

Brian Vecci

It's vital to understand permission propagation and its effect on cybersecurity—learn about roles, inheritance, broken folder permissions and more.

How Varonis Limits Organization-Wide Exposure

Michael Buckbee

Michael Buckbee

If you were hired at a top financial institution as a junior analyst tomorrow, chances are you’d have access to 20% of the company’s data on day one. Data available...

Are You Prepared For a Supply Chain Attack? Why Supply Chain Risk Management is Essential

Josue Ledesma

Josue Ledesma

Learn how to spot supply chain risks, attacks, and how to properly defend against them with an effective supply chain risk management strategy.

Using Salesforce Analytics for GDPR Compliance

Renganathan Padmanabhan

Renganathan Padmanabhan

GDPR compliance can be stressful. This guide shows you how to use Salesforce Analytics to comply with GDPR regulations by walking through common use cases.

Endpoint Detection and Response: All You Need to Know About EDR Security

Robert Grimmick

Robert Grimmick

This guide covers Endpoint Detection and Response, a type of solution to detect and respond to suspicious activity on desktops, laptops, and mobile devices.

How to Create and Manage the Azure Network Watcher Resource

Jeff Brown

Jeff Brown

The Azure Network Watcher comes with great diagnostic and monitoring tools. Learn more about how to create a Network Watcher and manage its components.

Docker vs. Kubernetes

Taurai Mutimutema

Taurai Mutimutema

Docker vs Kubernetes: Learn about Kubernetes and Docker as you discover which technology to use and why using it for each case is better. Should you use both?

March 2021 Malware Trends Report

Ben Zion Lavi

Ben Zion Lavi

This is a monthly report from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples.

The 2021 Healthcare Data Risk Report Reveals 1 Out of Every 5 Files is Open to All Employees

Rachel Hunt

Rachel Hunt

The Varonis 2021 Healthcare Data Risk Report found 20% of all files at hospitals, biotech firms and pharma companiesare open to every employee.

How to Use Azure Private Endpoints to Restrict Public Access to WebApps

Neeraj Kumar

Neeraj Kumar

Learn how to use Private Endpoints to assign a private IP address to an Azure PaaS service and bring the service within your own virtual network. Azure Private Endpoints enables secure connectivity to Azure services.

What is Data Integrity and How Can You Maintain it?

Michael Buckbee

Michael Buckbee

Interested in learning more about data integrity? Get the overview complete with information on why it's important and how to maintain it! Learn more here. 

What is Data Classification? Guidelines and Process

Michael Buckbee

Michael Buckbee

Data classification is the process of analyzing data and organizing it into categories. Learn how to mitigate and manage governance policies with Varonis.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.