Varonis Data Security Platform

Varonis Data Security Platform

Varonis Data Security Platform

Overview

Reviews

Varonis Data Security Platform

9
Varonis [Data Security Platform] is being used throughout the organization and addresses audit business issues currently with Active …
Read full review

The Onus on Varonis

9
Data Governance suite was bought in for a couple of reasons, firstly to help with the organisation classification project and secondly to …

Varonis is a great product

9
Varonis is managed and administered within the central IT department for the organization, but, all aspects of the product are being used …
Read full review

Reviewer Pros & Cons

View all pros & cons

Pricing

View all pricing
N/A
Unavailable

What is Varonis Data Security Platform?

Varonis offers their Data Security Platform, a modular suite of data acess and data security products providing sensitive data discovery, data access governance, unusual behavior detection, GDPR compliance support, as well as incident playbooks and cybersecurity forensic reporting.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting / Integration Services

Would you like us to let the vendor know that you want pricing?

6 people want pricing too

Alternatives Pricing

What is CrowdStrike Falcon?

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment with no performance…

What is The Okta Identity Cloud?

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta helps IT become…

Features Scorecard

No scorecards have been submitted for this product yet..

Product Details

What is Varonis Data Security Platform?

The Varonis Data Security Platform detects insider threats and cyberattacks by analyzing data, account activity, and user behavior. It is designed to prevent and limit disaster by locking down sensitive and stale data, and efficiently sustain a secure state with automation.

With it, the vendor states users will gain visibility into critical data and infrastructure, combine multiple data streams to discover security risks, and solve board-level data security problems at scale with automation.

Varonis Data Security Platform Features

  • Supported: Data Protection
  • Supported: Threat Detection & Response
  • Supported: Privacy & Compliance
  • Supported: VPN, DNS & Proxy Intelligence
  • Supported: File Analysis
  • Supported: GDPR & CCPA Classification
  • Supported: DSAR Portal
  • Supported: User Behavior Analytics
  • Supported: Email Security
  • Supported: Active Directory & Azure AD Clean-up & Monitoring
  • Supported: Compliance Reporting

Varonis Data Security Platform Downloadables

Varonis Data Security Platform Integrations

  • Splunk Enterprise
  • IBM QRadar Security Intelligence Platform
  • LogRhythm
  • Webroot Threat Intelligence
  • Cyberark Application Identity Manager
  • ArcSight
  • FireEye TAP
  • RSA
  • Boldon James
  • TITUS

Varonis Data Security Platform Competitors

  • STEALTHbits
  • Netwrix
  • SailPoint

Varonis Data Security Platform Technical Details

Deployment TypesOn-premise
Operating SystemsWindows
Mobile ApplicationNo
Supported CountriesGlobal

Alternatives

View all alternatives

Frequently Asked Questions

What is Varonis Data Security Platform?

Varonis offers their Data Security Platform, a modular suite of data acess and data security products providing sensitive data discovery, data access governance, unusual behavior detection, GDPR compliance support, as well as incident playbooks and cybersecurity forensic reporting.

What is Varonis Data Security Platform's best feature?

Reviewers rate Support Rating highest, with a score of 9.6.

Who uses Varonis Data Security Platform?

The most common users of Varonis Data Security Platform are from Enterprises and the Higher Education industry.

Reviews and Ratings

(20)

Ratings

Reviews

(1-10 of 20)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Review Source
We are using Varonis to audit our Isilon file servers. We have used this software to identify sensitive data locations and locations that need to be more secure. This software has helped us automate a lot of the processes to secure these data locations. It took us a few months to fix these issues; whereas, it would have taken maybe years to repair manually. We are also using this to help us identify the presence of malware and alert us if any is detected and logoff any offending user.
  • Varonis logging is very robust and captures all audit events being sent from the file servers.
  • The ability to report and alert on Active Directory account events works very well with file activity monitoring. It can show the complete picture of what an account did while being used.
  • Have a customizable dashboard is great for being able to show upper management information that only pertains to them.
  • Some of the reporting interfaces are difficult to navigate and appear somewhat dated.
  • This software does require a lot of servers to be built for various purposes.
  • Varonis is on the pricey side and now requires subscription based licensing. This can present problems is your company tries to use very little OpX spending vs CapX.
Identifying open permissions on a file share [is] outstanding. It [Varonis Data Security Platform] can also recommend what users should have access and help clean up those file locations. It can also create the AD groups based on your naming convention. This does a great job identifying location of sensitive data (SSNs, Credit card numbers, etc...) We have used this software to lock down file locations based on the software's recommendation and then had to reverse the changes because of users getting denied access. On a positive note, the software does allow modeling and also has rollback ability.
Score 9 out of 10
Vetted Review
Verified User
Review Source
Varonis [Data Security Platform] is being used throughout the organization and addresses audit business issues currently with Active Directory and File Server, we are not licensed for email.
  • Audit of entire Active Directory.
  • Audit of the entire File Server.
  • Generate reports with many filter options.
  • Improve audit filters.
  • Be licensed for all use only and not separate, as here our e-mail is not auditable by [Varonis Data Security Platform] for lack of license.
  • Improve web dashboard interface to one that is more intuitive.
[Varonis Data Security is well suited for] any scenario where there are more than 200 users[.] File and email server, is highly recommended to use, because for auditing in this case it is very fast. It is less suitable for small businesses with less than 200 users.
Score 10 out of 10
Vetted Review
Verified User
Review Source
We're started using Varonis more than 6 years ago, primarily its file server auditor features, to log file server actions such as file/folders read, write, moving, deletion, etc. It's surely an important tool to have when you have file server incidents. Like some department folders 'disappearing' and the manager or department's head demanding to know who was responsible. We had some incidents like that and Varonis really proved its value. It has native integration to a wide range of storage/NAS/fileservers. In our case, we use Netapp storage and it integrates to it through Netapp's native "policies." It works really well! Varonis can also be used to manage permissions and to find access "anomalies," for example, if a user starts to read/write a large amount of data at the same time (it could be an infected computer running a ransomware attack).
  • Native integration to Netapp storage (and to others, but we use a Netapp).
  • Files/folders access logs (read/write/move/modify, etc.).
  • Due to the large amount of logs it keeps, it can be really slow to search.
  • It's console could be more user-friendly and intuitive. Maybe web-based. Why not?
For sure it is well suited for companies that need to keep track of their data and that are willing to pay for it. It does an excelent job of monitoring the file's access, with zero impact on Storage's performance. Sometimes it is not enough to be able to restore the data. Sometimes in critical incidents, managers and heads demand to know who caused it. Thanks to Varonis we were able to give them this information easily and in a short time.
Rodney Barnhardt | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source
Varonis Data Security Platform has a variety of uses. One of the best features is the ability to track and monitor file and folder access. This means that if a folder or file disappears, a report can be ran that tells whether it was moved or deleted and who performed the action. There are times folders are inadvertently moved, in the past. The only option was to restore from backup and assume it may have been deleted. This means there could be multiple copies in the wrong locations. Now, if it has been determined a something was moved, we can check and see if it was intentional, if so, why and inform other people. If it was unintentional, then we can move it back to the original location. Another great use of it is to monitor for sudden file changes that could indicate ransomware or some other attack. Some rules can be put into place that sends alerts out to various teams so an investigation can begin quickly and intercede a potential attack. The product also can monitor Active Directory and alert on changes to specific security groups, account lockouts, or changes in GPOs
  • Monitors and reports file and folder access and usage.
  • Provides for assigned folder owners who can receive reports and manage access themselves.
  • The reports can take some time to get used to creating and running. It can take some trial and error to determine the correct rule sets to get the information you need. The information is there. It may just take some time to set it up correctly. Once you find the right settings, you can save it for use later.
  • It does have a lot of different tie-in to other products, which can take some time to set up correctly. It would be good if that could be simplified.
In my opinion, the Varonis Data Security Platform is excellent in any environment where monitoring and reporting on access to data are imperative. This would include most mid-size to enterprise organizations with its ability to monitor across files structures, Active Directory, email systems, and other products. There can always be an audit trail on what has happened in the organization. In these times of ransomware, having a product that can detect and alert on decreased the likelihood that an attack will be successful. While very useful, this product may not work well for smaller organizations due to the amount of the learning curve and administrative task needed. Smaller organizations tend not to have as large a staff as larger organizations, so having someone proficient in the product may be difficult.
Support has always been very responsive and addressed any issues we may have had in the past. Some local engineers are willing to come onsite or work over a web session to discuss creating a new rule set or look at some issues. Getting issues address has never been a problem. There was one feature we had trouble getting to function correctly, but support and local engineers were willing to work with us as much as needed to get it working correctly for our organization.
Gus Awad | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source
Varonis is being used by all of the organization to search for financial data to classify them and encrypt all that data.
  • Varonis accurately detects critical data on our file servers and classify them based on the type of data.
  • Encrypt all data as configured to secure the data from unauthorized access.
  • Alerting and reports gave us information that we did not have before.
  • The web interface is somewhat limited in terms of functionality
  • More licenses are required for additional features. This increases the cost to implement.
  • Customized reporting is lacking.
Is well suited for companies that need to detect financial or personal information that requires it to be scanned, reported and encrypted. It's not suitable for nonsecurity requirements.
I dealt with support few times and each case was handled properly and escalated to the right person in a timely fashion.
Score 5 out of 10
Vetted Review
Verified User
Review Source
Varonis is utilized by the information security analyst across the entire organization to address compliance of file monitoring and alerting of suspicious or high amounts of activity on file systems.
  • Varonis 7 offers real time alerting which benefits the swift action of analysts.
  • Multiple file servers can be monitored by Varonis without a heavy performance interaction.
  • Varonis is capable of meeting several industry compliance standards.
  • The Web UI could have more in-depth analysis on alerts.
  • Amount of services installed is high.
  • Additional licenses have to be purchased for additional features.
Varonis Data Security Platform is excellent for organizations of different sizes and if properly configured and tuned, allows security specialists to be aware of file activity and active directory statistics within their organization.
March 17, 2017

The Onus on Varonis

Score 9 out of 10
Vetted Review
Verified User
Review Source
Data Governance suite was bought in for a couple of reasons, firstly to help with the organisation classification project and secondly to control and monitor access to data across the company. In both cases this tool provided a way of viewing what data was out there along with putting some control on who was accessing what and allowing the information owners and approvers to have a realtime view of what they are agreeing to when authorizing user access.
  • Ability to structure unstructured data
  • Help with data classification projects
  • Put access controls around data
  • Find out what is happening with your data
  • Implementation can be challenging in some areas and can only be executed by the vendor
  • Implementation can only be executed by the vendor and additional work can be chargeable
  • Licensing can be improved upon
  • Agent based so implementation can be longer than expected
Data Governance is well suited to areas where there is a requirement to control user access and privileges to unorganised data, if an organisation is taking on the challenge of a data classification project then this is a great tool for finding out what data is out in the organisation. Some additional modules allow information owners and approvers to authorise user access through a web portal cutting down on a manual process and lets profile administration be auditable.
Score 7 out of 10
Vetted Review
Verified User
Review Source
We are currently in our 1st year of deployment and are utilizing it across our entire organization. We mainly purchased the product for tracking account activity in active directory, but have found the added malware threat detection and notifications when group policies are changed have been added benefits for our Security and Identify and Access Management teams.
  • Searching for account permissions is much easier and granular with Varonis over normal AD users and computers
  • Having alerting when group policies are changed has been a big security group win
  • Identifying sensitive data such as PII and SOX data has also been a major win for our Organization
  • Implementation could have been a little smoother with more help from the Varonis sales team, but we managed
  • Tying it into some 3rd party systems could be more intuitive
  • Navigating the built in rules and patterns was a little clunky, but we worked through them

With minimal Identity and Access Management staff, this tool has been a blessing for quick responses to questions like:

'Who has access?' 'What are the permissions on a specific shared drive folder?' 'When was the last time a folder was modified and by who?' 'Where are all the locations that contain sensitive data such as SOX systems?'

Ease of use after implementation

Built in security policies

Ability to customize policies

Identifying Sensative data repositories

Score 9 out of 10
Vetted Review
Reseller
Review Source
Varonis is managed and administered within the central IT department for the organization, but, all aspects of the product are being used throughout the organization.
  • Administrative interface to manage the product
  • Reports are easily generated and very detailed
  • Classification of data works great with a low false positive/classification rate
  • Technical support from the company is exceptional
  • Sales and sales engineering from the company is exceptional
  • Product can be costly
  • Different licenses needed to add in some modules to the product
  • Data storage needed can be high depending on amount of modules and data being collected
Very well suited for organizations the require complete monitoring of environment. If categorization and identification of data is needed, this product is best in class in my opinion. If budgets are not in place, now or in the future, this product may not be the best one to choose.
Score 10 out of 10
Vetted Review
Verified User
Review Source

Varonis is one of University Advancement’s core business partners in our effort to comply with the recent PCI and data security initiatives the University is undertaking. We needed to get control of our data but it became evident there was a great deal of data that was not identified due to the amount and length of data being stored.

Some of the key questions answered by Varonis:

  • The amount of stale and sensitive data.
  • Where was this data stored?
  • Who owned and had access to the data?
  • What were people doing with the data?

Some of the controls provided by Varonis:

1. Alerts and reports on data access and file types.

2. Notifications on high priority AD alerts, Exchange alerts, and behavioral analytics.

Varonis has given us much needed insight into our data, which has become essential in our ability to secure our environment.

  • It will scan severs for Data Classifications (Credit Cards, Social Security, HIPPA, Ferpa, etc.)
  • Detailed logging of all the writes, modified, delete, open, etc. of a file, folder, AD object, Exchange object, and sensitive data
  • Provides alerting for AD, Exchange, and Ransomeware
  • I can identify data owners of a particular share and email them quarterly entitlement reviews for permissions.
  • Speed up with website within the DatAlert site.
  1. We use Varonis on a daily basis to provide access reports to high profile data. One example is the business office report that we send to our SBO and also we use it to monitor critical Card Holder servers to match up with our Change Control documents to see which files were changes, modified, deleted, or created.
  2. We also use it to get some great informational reports like stale data reports, big data reports, exe, mp3, mov files, broken SIDs, etc.
  3. We use it for DCF (Data Classification Framework) to scan our servers for sensitive data and to stay compliant with our audits.
  4. We also use it to identify Data Owners. Varonis makes it super simple to identify these owners and then we can email them entitlement reports confirming access and they can request to change it or you can even automate it with a product like Data privilege. One important thing that most people miss is when people transfer to different departments, sometimes these people have more permissions than they need and these type of reports being sent quarterly are to help remove unneeded access.
  5. DatAlert - We use it for instant alerting (DatAlert for high priority AD alerts, exchange alerts and now Analytic alerts).
    1. The new analytics and behavior alerts are a big addition to the product. You can now see:
      1. Mass files being encrypted (Ransomware) & Behavior Patterns of Ransomware
      2. AD Permissions, OU Changes, locked accounts, etc.
      3. Detects deletion of multiple directory service objects
      4. Detects exploitation software created or modified
      5. Detects if a brute force attack is happening locking out multiple AD accounts
      6. Detects if the host file was changed
      7. Detects if system binaries are found in unusual locations
      8. Detects if Crypto tools are installed and being used
      9. Detects if Group Policy Objects have been modified and by whom
      10. This is just a few of what their product does now!