Overview
What is Varonis Data Security Platform?
Varonis offers their Data Security Platform, a modular suite of data acess and data security products providing sensitive data discovery, data access governance, unusual behavior detection, GDPR compliance support, as well as incident playbooks and cybersecurity forensic reporting.
Varonis is a great tool for watching over and reporting on your environment. It helps you sleep at night!
Modern ways to secure your sensitive data
Data Classification is important, so select the best tool.
A must-have file/folder auditing platform
Varonis Data Security Platform Monitors and Protects Your Data
Varonis, great value add product for Identity Access Management Teams!
Varonis is a great tool to use for data security
Keeping an eye in the sky
Varonis is a great product
Varonis - The must have tool for Data Governance
Varonis is one of University Advancement’s core business partners in our effort to comply with the recent PCI and data security …
The Onus on Varonis
Reviewer Pros & Cons
Pricing
What is Varonis Data Security Platform?
Varonis offers their Data Security Platform, a modular suite of data acess and data security products providing sensitive data discovery, data access governance, unusual behavior detection, GDPR compliance support, as well as incident playbooks and cybersecurity forensic reporting.
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
30 people also want pricing
Alternatives Pricing
What is ObservePoint?
ObservePoint’s Web Governance platform automates website scans, from the highest traffic pages and user paths to the dark corners of a company’s web presence. The software provides the ability to see what’s performing below acceptable standards, trace it back to the source, and quickly see a path…
What is Qlik Catalog?
Qlik Catalog (formerly Qlik Data Catalyst) builds a secure, enterprise-scale catalog of all the data in an organization available for analytics users as a service across lakes, warehouses, transactional systems, and file systems. It is able to recognize, profile, tag, and secure data in different…
Product Demos
Not Another Demo - E8 - Varonis I CSA West Michigan
What is Varonis? — Varonis Data Security Platform Explained for Beginners (Demo & Tutorial)
The Varonis Mission
Product Details
- About
- Integrations
- Tech Details
- Downloadables
- FAQs
What is Varonis Data Security Platform?
With it, the vendor states users will gain visibility into critical data and infrastructure, combine multiple data streams to discover security risks, and solve board-level data security problems at scale with automation.
Varonis Data Security Platform Features
- Supported: Data Protection
- Supported: Threat Detection & Response
- Supported: Privacy & Compliance
- Supported: VPN, DNS & Proxy Intelligence
- Supported: File Analysis
- Supported: GDPR & CCPA Classification
- Supported: DSAR Portal
- Supported: User Behavior Analytics
- Supported: Email Security
- Supported: Active Directory & Azure AD Clean-up & Monitoring
- Supported: Compliance Reporting
Varonis Data Security Platform Integrations
- Splunk Enterprise
- IBM QRadar Security Intelligence Platform
- LogRhythm
- Webroot Threat Intelligence
- Cyberark Application Identity Manager
- ArcSight
- FireEye TAP
- RSA
- Boldon James
- TITUS
Varonis Data Security Platform Technical Details
Deployment Types | On-premise |
---|---|
Operating Systems | Windows |
Mobile Application | No |
Supported Countries | Global |
Varonis Data Security Platform Downloadables
Frequently Asked Questions
Comparisons
Compare with
Reviews and Ratings
(29)Community Insights
- Pros
- Cons
Helpful Data Structuring: Many users have found Varonis to be particularly helpful in structuring unstructured data and assisting with data classification projects. This feature has allowed them to easily organize and categorize their data, making it more manageable and accessible.
Effective Access Controls: Reviewers have praised Varonis for providing effective access controls around data, enabling them to regulate and limit who can access certain information. This has helped enhance data security and prevent unauthorized access.
Real-time Monitoring and Reporting: Several users have commended Varonis for its valuable tool for monitoring and reporting file and folder access and usage. The real-time alerting feature allows them to swiftly respond to any potential security incidents or unauthorized activities.
Challenging Implementation Process: Some users have found the implementation process to be challenging, as it can only be executed by the vendor and may come with additional charges for extra work. This has caused frustration and delays for several reviewers.
Costly Licensing Model: The licensing model of Varonis could be improved upon, as some users have expressed that additional licenses are required for additional features, leading to an increased cost of implementation. This has been a drawback for many customers trying to minimize operational expenses.
Limited Functionality of Web Interface: Some users have deemed the web interface somewhat limited in functionality, which has hindered their ability to fully utilize the platform. They have desired more robust features and capabilities from the web interface.
Attribute Ratings
Reviews
(1-11 of 11)Varonis is a great tool for watching over and reporting on your environment. It helps you sleep at night!
- Varonis logging is very robust and captures all audit events being sent from the file servers.
- The ability to report and alert on Active Directory account events works very well with file activity monitoring. It can show the complete picture of what an account did while being used.
- Have a customizable dashboard is great for being able to show upper management information that only pertains to them.
- Some of the reporting interfaces are difficult to navigate and appear somewhat dated.
- This software does require a lot of servers to be built for various purposes.
- Varonis is on the pricey side and now requires subscription based licensing. This can present problems is your company tries to use very little OpX spending vs CapX.
Modern ways to secure your sensitive data
- Regular confidential data analysis to detect any anomalies.
- Ability to detect such anomalies and take necessary action without any human involvement.
- Keeping separate event logs for each file to keep track of its changes.
- The Initial setting up process could be more simplified.
- It requires a noticeable amount of processing power to run the system smoothly.
- You're gonna need full-time staff members just for the maintenance.
Data Classification is important, so select the best tool.
- This tool allows us to protect sensitive data.
- It also improves our ability to maintain compliance with many different requirements.
- The tool also permits auditing capabilities that we did not have prior to its implementation.
- The tools also proactively alerts us to potential ransomware related events.
- The tool is vast and it takes a significant amount of time to tune it for your evironment.
- The report formatting is rudimentary and takes a while to get use to for staff.
- The integration to our SIEM could be better.
A must-have file/folder auditing platform
- Native integration to Netapp storage (and to others, but we use a Netapp).
- Files/folders access logs (read/write/move/modify, etc.).
- Due to the large amount of logs it keeps, it can be really slow to search.
- It's console could be more user-friendly and intuitive. Maybe web-based. Why not?
Varonis Data Security Platform Monitors and Protects Your Data
- Monitors and reports file and folder access and usage.
- Provides for assigned folder owners who can receive reports and manage access themselves.
- The reports can take some time to get used to creating and running. It can take some trial and error to determine the correct rule sets to get the information you need. The information is there. It may just take some time to set it up correctly. Once you find the right settings, you can save it for use later.
- It does have a lot of different tie-in to other products, which can take some time to set up correctly. It would be good if that could be simplified.
- Searching for account permissions is much easier and granular with Varonis over normal AD users and computers
- Having alerting when group policies are changed has been a big security group win
- Identifying sensitive data such as PII and SOX data has also been a major win for our Organization
- Implementation could have been a little smoother with more help from the Varonis sales team, but we managed
- Tying it into some 3rd party systems could be more intuitive
- Navigating the built in rules and patterns was a little clunky, but we worked through them
With minimal Identity and Access Management staff, this tool has been a blessing for quick responses to questions like:
'Who has access?' 'What are the permissions on a specific shared drive folder?' 'When was the last time a folder was modified and by who?' 'Where are all the locations that contain sensitive data such as SOX systems?'
Varonis is a great tool to use for data security
- Varonis accurately detects critical data on our file servers and classify them based on the type of data.
- Encrypt all data as configured to secure the data from unauthorized access.
- Alerting and reports gave us information that we did not have before.
- The web interface is somewhat limited in terms of functionality
- More licenses are required for additional features. This increases the cost to implement.
- Customized reporting is lacking.
Keeping an eye in the sky
- Varonis 7 offers real time alerting which benefits the swift action of analysts.
- Multiple file servers can be monitored by Varonis without a heavy performance interaction.
- Varonis is capable of meeting several industry compliance standards.
- The Web UI could have more in-depth analysis on alerts.
- Amount of services installed is high.
- Additional licenses have to be purchased for additional features.
Varonis is a great product
- Administrative interface to manage the product
- Reports are easily generated and very detailed
- Classification of data works great with a low false positive/classification rate
- Technical support from the company is exceptional
- Sales and sales engineering from the company is exceptional
- Product can be costly
- Different licenses needed to add in some modules to the product
- Data storage needed can be high depending on amount of modules and data being collected
Varonis - The must have tool for Data Governance
Varonis is one of University Advancement’s core business partners in our effort to comply with the recent PCI and data security initiatives the University is undertaking. We needed to get control of our data but it became evident there was a great deal of data that was not identified due to the amount and length of data being stored.
Some of the key questions answered by Varonis:
- The amount of stale and sensitive data.
- Where was this data stored?
- Who owned and had access to the data?
- What were people doing with the data?
Some of the controls provided by Varonis:
1. Alerts and reports on data access and file types.
2. Notifications on high priority AD alerts, Exchange alerts, and behavioral analytics.
Varonis has given us much needed insight into our data, which has become essential in our ability to secure our environment.
- It will scan severs for Data Classifications (Credit Cards, Social Security, HIPPA, Ferpa, etc.)
- Detailed logging of all the writes, modified, delete, open, etc. of a file, folder, AD object, Exchange object, and sensitive data
- Provides alerting for AD, Exchange, and Ransomeware
- I can identify data owners of a particular share and email them quarterly entitlement reviews for permissions.
- Speed up with website within the DatAlert site.
- We use Varonis on a daily basis to provide access reports to high profile data. One example is the business office report that we send to our SBO and also we use it to monitor critical Card Holder servers to match up with our Change Control documents to see which files were changes, modified, deleted, or created.
- We also use it to get some great informational reports like stale data reports, big data reports, exe, mp3, mov files, broken SIDs, etc.
- We use it for DCF (Data Classification Framework) to scan our servers for sensitive data and to stay compliant with our audits.
- We also use it to identify Data Owners. Varonis makes it super simple to identify these owners and then we can email them entitlement reports confirming access and they can request to change it or you can even automate it with a product like Data privilege. One important thing that most people miss is when people transfer to different departments, sometimes these people have more permissions than they need and these type of reports being sent quarterly are to help remove unneeded access.
- DatAlert - We use it for instant alerting (DatAlert for high priority AD alerts, exchange alerts and now Analytic alerts).
- The new analytics and behavior alerts are a big addition to the product. You can now see:
- Mass files being encrypted (Ransomware) & Behavior Patterns of Ransomware
- AD Permissions, OU Changes, locked accounts, etc.
- Detects deletion of multiple directory service objects
- Detects exploitation software created or modified
- Detects if a brute force attack is happening locking out multiple AD accounts
- Detects if the host file was changed
- Detects if system binaries are found in unusual locations
- Detects if Crypto tools are installed and being used
- Detects if Group Policy Objects have been modified and by whom
- This is just a few of what their product does now!
- The new analytics and behavior alerts are a big addition to the product. You can now see:
The Onus on Varonis
- Ability to structure unstructured data
- Help with data classification projects
- Put access controls around data
- Find out what is happening with your data
- Implementation can be challenging in some areas and can only be executed by the vendor
- Implementation can only be executed by the vendor and additional work can be chargeable
- Licensing can be improved upon
- Agent based so implementation can be longer than expected