Skip to main content
TrustRadius
Varonis Data Security Platform

Varonis Data Security Platform

Overview

What is Varonis Data Security Platform?

Varonis offers their Data Security Platform, a modular suite of data acess and data security products providing sensitive data discovery, data access governance, unusual behavior detection, GDPR compliance support, as well as incident playbooks and cybersecurity forensic reporting.

Read more
Recent Reviews

TrustRadius Insights

Helpful Data Structuring: Many users have found Varonis to be particularly helpful in structuring unstructured data and assisting with …
Continue reading
Read all reviews

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Varonis Data Security Platform?

Varonis offers their Data Security Platform, a modular suite of data acess and data security products providing sensitive data discovery, data access governance, unusual behavior detection, GDPR compliance support, as well as incident playbooks and cybersecurity forensic reporting.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

30 people also want pricing

Alternatives Pricing

What is ObservePoint?

ObservePoint’s Web Governance platform automates website scans, from the highest traffic pages and user paths to the dark corners of a company’s web presence. The software provides the ability to see what’s performing below acceptable standards, trace it back to the source, and quickly see a path…

What is Qlik Catalog?

Qlik Catalog (formerly Qlik Data Catalyst) builds a secure, enterprise-scale catalog of all the data in an organization available for analytics users as a service across lakes, warehouses, transactional systems, and file systems. It is able to recognize, profile, tag, and secure data in different…

Return to navigation

Product Demos

Not Another Demo - E8 - Varonis I CSA West Michigan

YouTube

What is Varonis? — Varonis Data Security Platform Explained for Beginners (Demo & Tutorial)

YouTube

The Varonis Mission

YouTube
Return to navigation

Product Details

What is Varonis Data Security Platform?

The Varonis Data Security Platform detects insider threats and cyberattacks by analyzing data, account activity, and user behavior. It is designed to prevent and limit disaster by locking down sensitive and stale data, and efficiently sustain a secure state with automation.

With it, the vendor states users will gain visibility into critical data and infrastructure, combine multiple data streams to discover security risks, and solve board-level data security problems at scale with automation.

Varonis Data Security Platform Features

  • Supported: Data Protection
  • Supported: Threat Detection & Response
  • Supported: Privacy & Compliance
  • Supported: VPN, DNS & Proxy Intelligence
  • Supported: File Analysis
  • Supported: GDPR & CCPA Classification
  • Supported: DSAR Portal
  • Supported: User Behavior Analytics
  • Supported: Email Security
  • Supported: Active Directory & Azure AD Clean-up & Monitoring
  • Supported: Compliance Reporting

Varonis Data Security Platform Integrations

  • Splunk Enterprise
  • IBM QRadar Security Intelligence Platform
  • LogRhythm
  • Webroot Threat Intelligence
  • Cyberark Application Identity Manager
  • ArcSight
  • FireEye TAP
  • RSA
  • Boldon James
  • TITUS

Varonis Data Security Platform Technical Details

Deployment TypesOn-premise
Operating SystemsWindows
Mobile ApplicationNo
Supported CountriesGlobal

Varonis Data Security Platform Downloadables

Frequently Asked Questions

Varonis offers their Data Security Platform, a modular suite of data acess and data security products providing sensitive data discovery, data access governance, unusual behavior detection, GDPR compliance support, as well as incident playbooks and cybersecurity forensic reporting.

Reviewers rate Support Rating highest, with a score of 9.6.

The most common users of Varonis Data Security Platform are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(29)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Helpful Data Structuring: Many users have found Varonis to be particularly helpful in structuring unstructured data and assisting with data classification projects. This feature has allowed them to easily organize and categorize their data, making it more manageable and accessible.

Effective Access Controls: Reviewers have praised Varonis for providing effective access controls around data, enabling them to regulate and limit who can access certain information. This has helped enhance data security and prevent unauthorized access.

Real-time Monitoring and Reporting: Several users have commended Varonis for its valuable tool for monitoring and reporting file and folder access and usage. The real-time alerting feature allows them to swiftly respond to any potential security incidents or unauthorized activities.

Challenging Implementation Process: Some users have found the implementation process to be challenging, as it can only be executed by the vendor and may come with additional charges for extra work. This has caused frustration and delays for several reviewers.

Costly Licensing Model: The licensing model of Varonis could be improved upon, as some users have expressed that additional licenses are required for additional features, leading to an increased cost of implementation. This has been a drawback for many customers trying to minimize operational expenses.

Limited Functionality of Web Interface: Some users have deemed the web interface somewhat limited in functionality, which has hindered their ability to fully utilize the platform. They have desired more robust features and capabilities from the web interface.

Attribute Ratings

Reviews

(1-5 of 5)
Companies can't remove reviews or game the system. Here's why
Score 10 out of 10
Vetted Review
Verified User
We are using Varonis to audit our Isilon file servers. We have used this software to identify sensitive data locations and locations that need to be more secure. This software has helped us automate a lot of the processes to secure these data locations. It took us a few months to fix these issues; whereas, it would have taken maybe years to repair manually. We are also using this to help us identify the presence of malware and alert us if any is detected and logoff any offending user.
  • Varonis logging is very robust and captures all audit events being sent from the file servers.
  • The ability to report and alert on Active Directory account events works very well with file activity monitoring. It can show the complete picture of what an account did while being used.
  • Have a customizable dashboard is great for being able to show upper management information that only pertains to them.
  • Some of the reporting interfaces are difficult to navigate and appear somewhat dated.
  • This software does require a lot of servers to be built for various purposes.
  • Varonis is on the pricey side and now requires subscription based licensing. This can present problems is your company tries to use very little OpX spending vs CapX.
Identifying open permissions on a file share [is] outstanding. It [Varonis Data Security Platform] can also recommend what users should have access and help clean up those file locations. It can also create the AD groups based on your naming convention. This does a great job identifying location of sensitive data (SSNs, Credit card numbers, etc...) We have used this software to lock down file locations based on the software's recommendation and then had to reverse the changes because of users getting denied access. On a positive note, the software does allow modeling and also has rollback ability.
  • Malware alerting
  • File system auditing
  • User event auditing for cloud and on-prem
  • Varonis has only been a positive impact on our environment, but helping us close security holes that we didn't know existed.
  • This product has also provided piece of mind by watching our environment for Malware attacks and taking automatic actions if necessary.
  • This software does require a fair amount of server resources, but fortunately can be hosted in a virtual environment and has made this need easier to handle.
Varonis does a much better job presenting the entire picture. It can show an account being used, then elevated and then what actions were done with that account on a file system. ADaudit didn't have all of this information available with the modules we tested.
Rodney Barnhardt | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Varonis Data Security Platform has a variety of uses. One of the best features is the ability to track and monitor file and folder access. This means that if a folder or file disappears, a report can be ran that tells whether it was moved or deleted and who performed the action. There are times folders are inadvertently moved, in the past. The only option was to restore from backup and assume it may have been deleted. This means there could be multiple copies in the wrong locations. Now, if it has been determined a something was moved, we can check and see if it was intentional, if so, why and inform other people. If it was unintentional, then we can move it back to the original location. Another great use of it is to monitor for sudden file changes that could indicate ransomware or some other attack. Some rules can be put into place that sends alerts out to various teams so an investigation can begin quickly and intercede a potential attack. The product also can monitor Active Directory and alert on changes to specific security groups, account lockouts, or changes in GPOs
  • Monitors and reports file and folder access and usage.
  • Provides for assigned folder owners who can receive reports and manage access themselves.
  • The reports can take some time to get used to creating and running. It can take some trial and error to determine the correct rule sets to get the information you need. The information is there. It may just take some time to set it up correctly. Once you find the right settings, you can save it for use later.
  • It does have a lot of different tie-in to other products, which can take some time to set up correctly. It would be good if that could be simplified.
In my opinion, the Varonis Data Security Platform is excellent in any environment where monitoring and reporting on access to data are imperative. This would include most mid-size to enterprise organizations with its ability to monitor across files structures, Active Directory, email systems, and other products. There can always be an audit trail on what has happened in the organization. In these times of ransomware, having a product that can detect and alert on decreased the likelihood that an attack will be successful. While very useful, this product may not work well for smaller organizations due to the amount of the learning curve and administrative task needed. Smaller organizations tend not to have as large a staff as larger organizations, so having someone proficient in the product may be difficult.
  • It has reduced the amount of time and success in determining what has happened to missing files and folders. Anytime one of these disappears, someone wants to know what happened to it and who did it. In the past, we were not able to provide this information.
  • It has assisted us in determining why a service type account locks and from the source. These have caused issues in the past in determining the source and when it locked. Many times the information would be on one of several DC's or could have possibly rolled off the logs by the time we checked on it.
We have not evaluated against other competitors. We have had this product several years, and they were one of the first of their type of product. While I am aware some products do much of the same functions, there would be a lot of time and effort involved in comparing and trying to see if they would meet our needs. Varonis Data Security Platform has been great for us, so at this time, I do not see anything it is missing, or we would need that would persuade me to look at competing products.
Support has always been very responsive and addressed any issues we may have had in the past. Some local engineers are willing to come onsite or work over a web session to discuss creating a new rule set or look at some issues. Getting issues address has never been a problem. There was one feature we had trouble getting to function correctly, but support and local engineers were willing to work with us as much as needed to get it working correctly for our organization.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
We are currently in our 1st year of deployment and are utilizing it across our entire organization. We mainly purchased the product for tracking account activity in active directory, but have found the added malware threat detection and notifications when group policies are changed have been added benefits for our Security and Identify and Access Management teams.
  • Searching for account permissions is much easier and granular with Varonis over normal AD users and computers
  • Having alerting when group policies are changed has been a big security group win
  • Identifying sensitive data such as PII and SOX data has also been a major win for our Organization
  • Implementation could have been a little smoother with more help from the Varonis sales team, but we managed
  • Tying it into some 3rd party systems could be more intuitive
  • Navigating the built in rules and patterns was a little clunky, but we worked through them

With minimal Identity and Access Management staff, this tool has been a blessing for quick responses to questions like:

'Who has access?' 'What are the permissions on a specific shared drive folder?' 'When was the last time a folder was modified and by who?' 'Where are all the locations that contain sensitive data such as SOX systems?'

  • The positive ROI has been in time spent now vs. pre Varonis tracking down permissions and access to folders in a share environment
  • The built in policy rules were very helpful after learning how to properly apply them
  • Quick snapshot into our sensitive data repositories has been a major win for our Security team
We briefly evaluated Stealthbits, but found it was not a major Enterprise grade product

Ease of use after implementation

Built in security policies

Ability to customize policies

Identifying Sensative data repositories

Score 5 out of 10
Vetted Review
Verified User
Incentivized
Varonis is utilized by the information security analyst across the entire organization to address compliance of file monitoring and alerting of suspicious or high amounts of activity on file systems.
  • Varonis 7 offers real time alerting which benefits the swift action of analysts.
  • Multiple file servers can be monitored by Varonis without a heavy performance interaction.
  • Varonis is capable of meeting several industry compliance standards.
  • The Web UI could have more in-depth analysis on alerts.
  • Amount of services installed is high.
  • Additional licenses have to be purchased for additional features.
Varonis Data Security Platform is excellent for organizations of different sizes and if properly configured and tuned, allows security specialists to be aware of file activity and active directory statistics within their organization.
  • Varonis helped detect unethical activity from an internal employee.
  • Varonis meets several compliance controls for the organization.
Score 10 out of 10
Vetted Review
Verified User
Incentivized

Varonis is one of University Advancement’s core business partners in our effort to comply with the recent PCI and data security initiatives the University is undertaking. We needed to get control of our data but it became evident there was a great deal of data that was not identified due to the amount and length of data being stored.

Some of the key questions answered by Varonis:

  • The amount of stale and sensitive data.
  • Where was this data stored?
  • Who owned and had access to the data?
  • What were people doing with the data?

Some of the controls provided by Varonis:

1. Alerts and reports on data access and file types.

2. Notifications on high priority AD alerts, Exchange alerts, and behavioral analytics.

Varonis has given us much needed insight into our data, which has become essential in our ability to secure our environment.

  • It will scan severs for Data Classifications (Credit Cards, Social Security, HIPPA, Ferpa, etc.)
  • Detailed logging of all the writes, modified, delete, open, etc. of a file, folder, AD object, Exchange object, and sensitive data
  • Provides alerting for AD, Exchange, and Ransomeware
  • I can identify data owners of a particular share and email them quarterly entitlement reviews for permissions.
  • Speed up with website within the DatAlert site.
  1. We use Varonis on a daily basis to provide access reports to high profile data. One example is the business office report that we send to our SBO and also we use it to monitor critical Card Holder servers to match up with our Change Control documents to see which files were changes, modified, deleted, or created.
  2. We also use it to get some great informational reports like stale data reports, big data reports, exe, mp3, mov files, broken SIDs, etc.
  3. We use it for DCF (Data Classification Framework) to scan our servers for sensitive data and to stay compliant with our audits.
  4. We also use it to identify Data Owners. Varonis makes it super simple to identify these owners and then we can email them entitlement reports confirming access and they can request to change it or you can even automate it with a product like Data privilege. One important thing that most people miss is when people transfer to different departments, sometimes these people have more permissions than they need and these type of reports being sent quarterly are to help remove unneeded access.
  5. DatAlert - We use it for instant alerting (DatAlert for high priority AD alerts, exchange alerts and now Analytic alerts).
    1. The new analytics and behavior alerts are a big addition to the product. You can now see:
      1. Mass files being encrypted (Ransomware) & Behavior Patterns of Ransomware
      2. AD Permissions, OU Changes, locked accounts, etc.
      3. Detects deletion of multiple directory service objects
      4. Detects exploitation software created or modified
      5. Detects if a brute force attack is happening locking out multiple AD accounts
      6. Detects if the host file was changed
      7. Detects if system binaries are found in unusual locations
      8. Detects if Crypto tools are installed and being used
      9. Detects if Group Policy Objects have been modified and by whom
      10. This is just a few of what their product does now!
  • Satisfies many of our annual PCI audit requirements concerning data governance, permissions, and alerting
Asset Panda, BMC Track-It!
Return to navigation