Skip to main content
TrustRadius
Varonis Data Security Platform

Varonis Data Security Platform

Overview

What is Varonis Data Security Platform?

Varonis offers their Data Security Platform, a modular suite of data acess and data security products providing sensitive data discovery, data access governance, unusual behavior detection, GDPR compliance support, as well as incident playbooks and cybersecurity forensic reporting.

Read more
Recent Reviews

TrustRadius Insights

Helpful Data Structuring: Many users have found Varonis to be particularly helpful in structuring unstructured data and assisting with …
Continue reading
Read all reviews

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Varonis Data Security Platform?

Varonis offers their Data Security Platform, a modular suite of data acess and data security products providing sensitive data discovery, data access governance, unusual behavior detection, GDPR compliance support, as well as incident playbooks and cybersecurity forensic reporting.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

30 people also want pricing

Alternatives Pricing

What is ObservePoint?

ObservePoint’s Web Governance platform automates website scans, from the highest traffic pages and user paths to the dark corners of a company’s web presence. The software provides the ability to see what’s performing below acceptable standards, trace it back to the source, and quickly see a path…

What is Qlik Catalog?

Qlik Catalog (formerly Qlik Data Catalyst) builds a secure, enterprise-scale catalog of all the data in an organization available for analytics users as a service across lakes, warehouses, transactional systems, and file systems. It is able to recognize, profile, tag, and secure data in different…

Return to navigation

Product Demos

Not Another Demo - E8 - Varonis I CSA West Michigan

YouTube

What is Varonis? — Varonis Data Security Platform Explained for Beginners (Demo & Tutorial)

YouTube

The Varonis Mission

YouTube
Return to navigation

Product Details

What is Varonis Data Security Platform?

The Varonis Data Security Platform detects insider threats and cyberattacks by analyzing data, account activity, and user behavior. It is designed to prevent and limit disaster by locking down sensitive and stale data, and efficiently sustain a secure state with automation.

With it, the vendor states users will gain visibility into critical data and infrastructure, combine multiple data streams to discover security risks, and solve board-level data security problems at scale with automation.

Varonis Data Security Platform Features

  • Supported: Data Protection
  • Supported: Threat Detection & Response
  • Supported: Privacy & Compliance
  • Supported: VPN, DNS & Proxy Intelligence
  • Supported: File Analysis
  • Supported: GDPR & CCPA Classification
  • Supported: DSAR Portal
  • Supported: User Behavior Analytics
  • Supported: Email Security
  • Supported: Active Directory & Azure AD Clean-up & Monitoring
  • Supported: Compliance Reporting

Varonis Data Security Platform Integrations

  • Splunk Enterprise
  • IBM QRadar Security Intelligence Platform
  • LogRhythm
  • Webroot Threat Intelligence
  • Cyberark Application Identity Manager
  • ArcSight
  • FireEye TAP
  • RSA
  • Boldon James
  • TITUS

Varonis Data Security Platform Technical Details

Deployment TypesOn-premise
Operating SystemsWindows
Mobile ApplicationNo
Supported CountriesGlobal

Varonis Data Security Platform Downloadables

Frequently Asked Questions

Varonis offers their Data Security Platform, a modular suite of data acess and data security products providing sensitive data discovery, data access governance, unusual behavior detection, GDPR compliance support, as well as incident playbooks and cybersecurity forensic reporting.

Reviewers rate Support Rating highest, with a score of 9.6.

The most common users of Varonis Data Security Platform are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(29)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Helpful Data Structuring: Many users have found Varonis to be particularly helpful in structuring unstructured data and assisting with data classification projects. This feature has allowed them to easily organize and categorize their data, making it more manageable and accessible.

Effective Access Controls: Reviewers have praised Varonis for providing effective access controls around data, enabling them to regulate and limit who can access certain information. This has helped enhance data security and prevent unauthorized access.

Real-time Monitoring and Reporting: Several users have commended Varonis for its valuable tool for monitoring and reporting file and folder access and usage. The real-time alerting feature allows them to swiftly respond to any potential security incidents or unauthorized activities.

Challenging Implementation Process: Some users have found the implementation process to be challenging, as it can only be executed by the vendor and may come with additional charges for extra work. This has caused frustration and delays for several reviewers.

Costly Licensing Model: The licensing model of Varonis could be improved upon, as some users have expressed that additional licenses are required for additional features, leading to an increased cost of implementation. This has been a drawback for many customers trying to minimize operational expenses.

Limited Functionality of Web Interface: Some users have deemed the web interface somewhat limited in functionality, which has hindered their ability to fully utilize the platform. They have desired more robust features and capabilities from the web interface.

Attribute Ratings

Reviews

(1-7 of 7)
Companies can't remove reviews or game the system. Here's why
Score 10 out of 10
Vetted Review
Verified User
We are using Varonis to audit our Isilon file servers. We have used this software to identify sensitive data locations and locations that need to be more secure. This software has helped us automate a lot of the processes to secure these data locations. It took us a few months to fix these issues; whereas, it would have taken maybe years to repair manually. We are also using this to help us identify the presence of malware and alert us if any is detected and logoff any offending user.
  • Varonis logging is very robust and captures all audit events being sent from the file servers.
  • The ability to report and alert on Active Directory account events works very well with file activity monitoring. It can show the complete picture of what an account did while being used.
  • Have a customizable dashboard is great for being able to show upper management information that only pertains to them.
  • Some of the reporting interfaces are difficult to navigate and appear somewhat dated.
  • This software does require a lot of servers to be built for various purposes.
  • Varonis is on the pricey side and now requires subscription based licensing. This can present problems is your company tries to use very little OpX spending vs CapX.
Identifying open permissions on a file share [is] outstanding. It [Varonis Data Security Platform] can also recommend what users should have access and help clean up those file locations. It can also create the AD groups based on your naming convention. This does a great job identifying location of sensitive data (SSNs, Credit card numbers, etc...) We have used this software to lock down file locations based on the software's recommendation and then had to reverse the changes because of users getting denied access. On a positive note, the software does allow modeling and also has rollback ability.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Varonis Data Security Platform is basically an enterprise security solution for data protection which detects threats and responds to them accordingly. Varonis Data Security Platform can protect your data on local servers as well as in the cloud. As an organization, you’ll be able to protect all your sensitive documents, emails, confidential business information, your employee personal records, and even your financial records as well. Varonis analyses your data time to time and makes sure there are no other suspicious activities.
  • Regular confidential data analysis to detect any anomalies.
  • Ability to detect such anomalies and take necessary action without any human involvement.
  • Keeping separate event logs for each file to keep track of its changes.
  • The Initial setting up process could be more simplified.
  • It requires a noticeable amount of processing power to run the system smoothly.
  • You're gonna need full-time staff members just for the maintenance.
The most highlighted feature of Varonis Data Security Platform is the data analyzing mechanism. It analyzes your data all the time with some special algorithms to detect any unusual activities so that it can identify any unusual behavior or users and take necessary action to save your sensitive data. They also offer a complete dashboard solution for their customers to control across different data stores, see their current state, and any security breaches to be addressed manually.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We're started using Varonis more than 6 years ago, primarily its file server auditor features, to log file server actions such as file/folders read, write, moving, deletion, etc. It's surely an important tool to have when you have file server incidents. Like some department folders 'disappearing' and the manager or department's head demanding to know who was responsible. We had some incidents like that and Varonis really proved its value. It has native integration to a wide range of storage/NAS/fileservers. In our case, we use Netapp storage and it integrates to it through Netapp's native "policies." It works really well! Varonis can also be used to manage permissions and to find access "anomalies," for example, if a user starts to read/write a large amount of data at the same time (it could be an infected computer running a ransomware attack).
  • Native integration to Netapp storage (and to others, but we use a Netapp).
  • Files/folders access logs (read/write/move/modify, etc.).
  • Due to the large amount of logs it keeps, it can be really slow to search.
  • It's console could be more user-friendly and intuitive. Maybe web-based. Why not?
For sure it is well suited for companies that need to keep track of their data and that are willing to pay for it. It does an excelent job of monitoring the file's access, with zero impact on Storage's performance. Sometimes it is not enough to be able to restore the data. Sometimes in critical incidents, managers and heads demand to know who caused it. Thanks to Varonis we were able to give them this information easily and in a short time.
Rodney Barnhardt | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Varonis Data Security Platform has a variety of uses. One of the best features is the ability to track and monitor file and folder access. This means that if a folder or file disappears, a report can be ran that tells whether it was moved or deleted and who performed the action. There are times folders are inadvertently moved, in the past. The only option was to restore from backup and assume it may have been deleted. This means there could be multiple copies in the wrong locations. Now, if it has been determined a something was moved, we can check and see if it was intentional, if so, why and inform other people. If it was unintentional, then we can move it back to the original location. Another great use of it is to monitor for sudden file changes that could indicate ransomware or some other attack. Some rules can be put into place that sends alerts out to various teams so an investigation can begin quickly and intercede a potential attack. The product also can monitor Active Directory and alert on changes to specific security groups, account lockouts, or changes in GPOs
  • Monitors and reports file and folder access and usage.
  • Provides for assigned folder owners who can receive reports and manage access themselves.
  • The reports can take some time to get used to creating and running. It can take some trial and error to determine the correct rule sets to get the information you need. The information is there. It may just take some time to set it up correctly. Once you find the right settings, you can save it for use later.
  • It does have a lot of different tie-in to other products, which can take some time to set up correctly. It would be good if that could be simplified.
In my opinion, the Varonis Data Security Platform is excellent in any environment where monitoring and reporting on access to data are imperative. This would include most mid-size to enterprise organizations with its ability to monitor across files structures, Active Directory, email systems, and other products. There can always be an audit trail on what has happened in the organization. In these times of ransomware, having a product that can detect and alert on decreased the likelihood that an attack will be successful. While very useful, this product may not work well for smaller organizations due to the amount of the learning curve and administrative task needed. Smaller organizations tend not to have as large a staff as larger organizations, so having someone proficient in the product may be difficult.
Gus Awad | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Varonis is being used by all of the organization to search for financial data to classify them and encrypt all that data.
  • Varonis accurately detects critical data on our file servers and classify them based on the type of data.
  • Encrypt all data as configured to secure the data from unauthorized access.
  • Alerting and reports gave us information that we did not have before.
  • The web interface is somewhat limited in terms of functionality
  • More licenses are required for additional features. This increases the cost to implement.
  • Customized reporting is lacking.
Is well suited for companies that need to detect financial or personal information that requires it to be scanned, reported and encrypted. It's not suitable for nonsecurity requirements.
Score 5 out of 10
Vetted Review
Verified User
Incentivized
Varonis is utilized by the information security analyst across the entire organization to address compliance of file monitoring and alerting of suspicious or high amounts of activity on file systems.
  • Varonis 7 offers real time alerting which benefits the swift action of analysts.
  • Multiple file servers can be monitored by Varonis without a heavy performance interaction.
  • Varonis is capable of meeting several industry compliance standards.
  • The Web UI could have more in-depth analysis on alerts.
  • Amount of services installed is high.
  • Additional licenses have to be purchased for additional features.
Varonis Data Security Platform is excellent for organizations of different sizes and if properly configured and tuned, allows security specialists to be aware of file activity and active directory statistics within their organization.
Score 10 out of 10
Vetted Review
Verified User
Incentivized

Varonis is one of University Advancement’s core business partners in our effort to comply with the recent PCI and data security initiatives the University is undertaking. We needed to get control of our data but it became evident there was a great deal of data that was not identified due to the amount and length of data being stored.

Some of the key questions answered by Varonis:

  • The amount of stale and sensitive data.
  • Where was this data stored?
  • Who owned and had access to the data?
  • What were people doing with the data?

Some of the controls provided by Varonis:

1. Alerts and reports on data access and file types.

2. Notifications on high priority AD alerts, Exchange alerts, and behavioral analytics.

Varonis has given us much needed insight into our data, which has become essential in our ability to secure our environment.

  • It will scan severs for Data Classifications (Credit Cards, Social Security, HIPPA, Ferpa, etc.)
  • Detailed logging of all the writes, modified, delete, open, etc. of a file, folder, AD object, Exchange object, and sensitive data
  • Provides alerting for AD, Exchange, and Ransomeware
  • I can identify data owners of a particular share and email them quarterly entitlement reviews for permissions.
  • Speed up with website within the DatAlert site.
  1. We use Varonis on a daily basis to provide access reports to high profile data. One example is the business office report that we send to our SBO and also we use it to monitor critical Card Holder servers to match up with our Change Control documents to see which files were changes, modified, deleted, or created.
  2. We also use it to get some great informational reports like stale data reports, big data reports, exe, mp3, mov files, broken SIDs, etc.
  3. We use it for DCF (Data Classification Framework) to scan our servers for sensitive data and to stay compliant with our audits.
  4. We also use it to identify Data Owners. Varonis makes it super simple to identify these owners and then we can email them entitlement reports confirming access and they can request to change it or you can even automate it with a product like Data privilege. One important thing that most people miss is when people transfer to different departments, sometimes these people have more permissions than they need and these type of reports being sent quarterly are to help remove unneeded access.
  5. DatAlert - We use it for instant alerting (DatAlert for high priority AD alerts, exchange alerts and now Analytic alerts).
    1. The new analytics and behavior alerts are a big addition to the product. You can now see:
      1. Mass files being encrypted (Ransomware) & Behavior Patterns of Ransomware
      2. AD Permissions, OU Changes, locked accounts, etc.
      3. Detects deletion of multiple directory service objects
      4. Detects exploitation software created or modified
      5. Detects if a brute force attack is happening locking out multiple AD accounts
      6. Detects if the host file was changed
      7. Detects if system binaries are found in unusual locations
      8. Detects if Crypto tools are installed and being used
      9. Detects if Group Policy Objects have been modified and by whom
      10. This is just a few of what their product does now!
Return to navigation