Skip to main content
TrustRadius
Varonis Data Security Platform

Varonis Data Security Platform

Overview

What is Varonis Data Security Platform?

Varonis offers their Data Security Platform, a modular suite of data acess and data security products providing sensitive data discovery, data access governance, unusual behavior detection, GDPR compliance support, as well as incident playbooks and cybersecurity forensic reporting.

Read more
Recent Reviews

TrustRadius Insights

Helpful Data Structuring: Many users have found Varonis to be particularly helpful in structuring unstructured data and assisting with …
Continue reading
Read all reviews

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Varonis Data Security Platform?

Varonis offers their Data Security Platform, a modular suite of data acess and data security products providing sensitive data discovery, data access governance, unusual behavior detection, GDPR compliance support, as well as incident playbooks and cybersecurity forensic reporting.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

31 people also want pricing

Alternatives Pricing

What is ObservePoint?

ObservePoint’s Web Governance platform automates website scans, from the highest traffic pages and user paths to the dark corners of a company’s web presence. The software provides the ability to see what’s performing below acceptable standards, trace it back to the source, and quickly see a path…

What is Qlik Catalog?

Qlik Catalog (formerly Qlik Data Catalyst) builds a secure, enterprise-scale catalog of all the data in an organization available for analytics users as a service across lakes, warehouses, transactional systems, and file systems. It is able to recognize, profile, tag, and secure data in different…

Return to navigation

Product Demos

Not Another Demo - E8 - Varonis I CSA West Michigan

YouTube

What is Varonis? — Varonis Data Security Platform Explained for Beginners (Demo & Tutorial)

YouTube

The Varonis Mission

YouTube
Return to navigation

Product Details

What is Varonis Data Security Platform?

The Varonis Data Security Platform detects insider threats and cyberattacks by analyzing data, account activity, and user behavior. It is designed to prevent and limit disaster by locking down sensitive and stale data, and efficiently sustain a secure state with automation.

With it, the vendor states users will gain visibility into critical data and infrastructure, combine multiple data streams to discover security risks, and solve board-level data security problems at scale with automation.

Varonis Data Security Platform Features

  • Supported: Data Protection
  • Supported: Threat Detection & Response
  • Supported: Privacy & Compliance
  • Supported: VPN, DNS & Proxy Intelligence
  • Supported: File Analysis
  • Supported: GDPR & CCPA Classification
  • Supported: DSAR Portal
  • Supported: User Behavior Analytics
  • Supported: Email Security
  • Supported: Active Directory & Azure AD Clean-up & Monitoring
  • Supported: Compliance Reporting

Varonis Data Security Platform Integrations

  • Splunk Enterprise
  • IBM QRadar Security Intelligence Platform
  • LogRhythm
  • Webroot Threat Intelligence
  • Cyberark Application Identity Manager
  • ArcSight
  • FireEye TAP
  • RSA
  • Boldon James
  • TITUS

Varonis Data Security Platform Technical Details

Deployment TypesOn-premise
Operating SystemsWindows
Mobile ApplicationNo
Supported CountriesGlobal

Varonis Data Security Platform Downloadables

Frequently Asked Questions

Varonis offers their Data Security Platform, a modular suite of data acess and data security products providing sensitive data discovery, data access governance, unusual behavior detection, GDPR compliance support, as well as incident playbooks and cybersecurity forensic reporting.

Reviewers rate Support Rating highest, with a score of 9.6.

The most common users of Varonis Data Security Platform are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(30)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Helpful Data Structuring: Many users have found Varonis to be particularly helpful in structuring unstructured data and assisting with data classification projects. This feature has allowed them to easily organize and categorize their data, making it more manageable and accessible.

Effective Access Controls: Reviewers have praised Varonis for providing effective access controls around data, enabling them to regulate and limit who can access certain information. This has helped enhance data security and prevent unauthorized access.

Real-time Monitoring and Reporting: Several users have commended Varonis for its valuable tool for monitoring and reporting file and folder access and usage. The real-time alerting feature allows them to swiftly respond to any potential security incidents or unauthorized activities.

Challenging Implementation Process: Some users have found the implementation process to be challenging, as it can only be executed by the vendor and may come with additional charges for extra work. This has caused frustration and delays for several reviewers.

Costly Licensing Model: The licensing model of Varonis could be improved upon, as some users have expressed that additional licenses are required for additional features, leading to an increased cost of implementation. This has been a drawback for many customers trying to minimize operational expenses.

Limited Functionality of Web Interface: Some users have deemed the web interface somewhat limited in functionality, which has hindered their ability to fully utilize the platform. They have desired more robust features and capabilities from the web interface.

Attribute Ratings

Reviews

(1-2 of 2)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
ResellerIncentivized
Varonis is managed and administered within the central IT department for the organization, but, all aspects of the product are being used throughout the organization.
  • Administrative interface to manage the product
  • Reports are easily generated and very detailed
  • Classification of data works great with a low false positive/classification rate
  • Technical support from the company is exceptional
  • Sales and sales engineering from the company is exceptional
  • Product can be costly
  • Different licenses needed to add in some modules to the product
  • Data storage needed can be high depending on amount of modules and data being collected
Very well suited for organizations the require complete monitoring of environment. If categorization and identification of data is needed, this product is best in class in my opinion. If budgets are not in place, now or in the future, this product may not be the best one to choose.
  • Put our organization within compliance with regulations, which saves us possible fines
  • Put our organization in a better position to handle audits and save on audit fees, since audit reports are quick and easy to run
Score 10 out of 10
Vetted Review
Verified User
Incentivized

Varonis is one of University Advancement’s core business partners in our effort to comply with the recent PCI and data security initiatives the University is undertaking. We needed to get control of our data but it became evident there was a great deal of data that was not identified due to the amount and length of data being stored.

Some of the key questions answered by Varonis:

  • The amount of stale and sensitive data.
  • Where was this data stored?
  • Who owned and had access to the data?
  • What were people doing with the data?

Some of the controls provided by Varonis:

1. Alerts and reports on data access and file types.

2. Notifications on high priority AD alerts, Exchange alerts, and behavioral analytics.

Varonis has given us much needed insight into our data, which has become essential in our ability to secure our environment.

  • It will scan severs for Data Classifications (Credit Cards, Social Security, HIPPA, Ferpa, etc.)
  • Detailed logging of all the writes, modified, delete, open, etc. of a file, folder, AD object, Exchange object, and sensitive data
  • Provides alerting for AD, Exchange, and Ransomeware
  • I can identify data owners of a particular share and email them quarterly entitlement reviews for permissions.
  • Speed up with website within the DatAlert site.
  1. We use Varonis on a daily basis to provide access reports to high profile data. One example is the business office report that we send to our SBO and also we use it to monitor critical Card Holder servers to match up with our Change Control documents to see which files were changes, modified, deleted, or created.
  2. We also use it to get some great informational reports like stale data reports, big data reports, exe, mp3, mov files, broken SIDs, etc.
  3. We use it for DCF (Data Classification Framework) to scan our servers for sensitive data and to stay compliant with our audits.
  4. We also use it to identify Data Owners. Varonis makes it super simple to identify these owners and then we can email them entitlement reports confirming access and they can request to change it or you can even automate it with a product like Data privilege. One important thing that most people miss is when people transfer to different departments, sometimes these people have more permissions than they need and these type of reports being sent quarterly are to help remove unneeded access.
  5. DatAlert - We use it for instant alerting (DatAlert for high priority AD alerts, exchange alerts and now Analytic alerts).
    1. The new analytics and behavior alerts are a big addition to the product. You can now see:
      1. Mass files being encrypted (Ransomware) & Behavior Patterns of Ransomware
      2. AD Permissions, OU Changes, locked accounts, etc.
      3. Detects deletion of multiple directory service objects
      4. Detects exploitation software created or modified
      5. Detects if a brute force attack is happening locking out multiple AD accounts
      6. Detects if the host file was changed
      7. Detects if system binaries are found in unusual locations
      8. Detects if Crypto tools are installed and being used
      9. Detects if Group Policy Objects have been modified and by whom
      10. This is just a few of what their product does now!
  • Satisfies many of our annual PCI audit requirements concerning data governance, permissions, and alerting
Asset Panda, BMC Track-It!
Return to navigation