Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

1/19/2021
10:55 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Varonis Announces New Features to Combat Insider Threats and Collaboration Risks in Microsoft 365

New enhancements help pinpoint and reduce organizationwide exposure of sensitive data in the cloud

NEW YORK, Jan. 19, 2021 (GLOBE NEWSWIRE) -- Varonis Systems, Inc. (Nasdaq: VRNS), a pioneer in data security and analytics, announces new features for the Varonis Data Security Platform. The enhancements will help organizations visualize and reduce sensitive data exposure created as a byproduct of increased collaboration across Microsoft 365, including Teams.

Learn more: Attend our Varonis Virtual Connect! event on Friday, January 22 at noon ET for an in-depth product demo and expert Q&A. Register for the webinar.

The cloud makes collaboration easier, allowing users to share data without the help of IT administrators. Protecting data, however, becomes both more complex and urgent. Cloud data stores typically have more than double the permissions complexity as on-premises data stores, and native cloud security controls make it virtually impossible to visualize and reduce exposure to internal and external threats.

The Varonis Data Security Platform helps thousands of organizations worldwide secure their critical information using automation to enforce Zero Trust, tackle privacy and compliance tasks, and detect advanced cyber threats from nation-states to insiders. New capabilities in version 8.5 help organizations combat insider and collaboration risks in Microsoft 365.

The latest version delivers:

  • Insight into organization-wide exposure in Microsoft 365. New dashboard modules show where collaboration links, public sites, and permissions creep expose information to too many employees.
  • Expanded threat detection and automated indicators of compromise (IOC) updates. Additional threat models for Azure AD help thwart attacks against customers' Microsoft 365 environments, and automatic IOC updates help defend against emerging threats like the Zerologon vulnerability and SUNBURST.
  • More granular search capabilities for finding sensitive data. Search enhancements expose the logic behind queries, helping surface sensitive data across on-premises and cloud data stores.
  • Expanded NAS coverage. Support for Panzura, EMC NAS, Nasuni 8.5, Hitachi NAS, and NetApp ONTAP SELECT 9.7, and Hitachi NAS cluster namespaces.

"Microsoft 365 makes it easy to share sensitive data with your co-workers and guest users, but visualizing and controlling collaboration risk is virtually impossible with built-in tools," said David Gibson, CMO, Varonis. "The new capabilities in version 8.5 of the Varonis Data Security Platform will provide IT and security teams with a clear view into how users share information – so they can quickly monitor and remediate data security concerns and reduce risks from insider threats and external attackers."

Additional Resources

About Varonis

Varonis is a pioneer in data security and analytics, fighting a different battle than conventional cybersecurity companies. Varonis focuses on protecting enterprise data: sensitive files and emails; confidential customer, patient and employee data; financial records; strategic and product plans; and other intellectual property. The Varonis Data Security Platform detects insider threats and cyberattacks by analyzing data, account activity and user behavior; prevents and limits disaster by locking down sensitive and stale data; and efficiently sustains a secure state with automation. With a focus on data security, Varonis serves a variety of use cases, including governance, compliance, classification and threat analytics. Varonis started operations in 2005 and has customers spanning leading firms in the financial services, public, healthcare, industrial, insurance, energy and utilities, consumer and retail, technology, media and entertainment and education sectors.

Investor Relations Contact:
James Arestia
Varonis Systems, Inc.
646-640-2149
[email protected]

News Media Contact:
Rachel Hunt
Varonis Systems, Inc.
877-292-8767 (ext. 4247)
[email protected]

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32697
PUBLISHED: 2021-06-21
neos/forms is an open source framework to build web forms. By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators. Form state is secured with an HMAC that is still verified. That means that this issue can only be exploited if Form F...
CVE-2020-19510
PUBLISHED: 2021-06-21
Textpattern 4.7.3 contains an aribtrary file load via the file_insert function in include/txp_file.php.
CVE-2020-19511
PUBLISHED: 2021-06-21
Cross Site Scriptiong vulnerability in Typesetter 5.1 via the !1) className and !2) Description fields in index.php/Admin/Classes,
CVE-2021-21422
PUBLISHED: 2021-06-21
mongo-express is a web-based MongoDB admin interface, written with Node.js and express. 1: As mentioned in this issue: https://github.com/mongo-express/mongo-express/issues/577, when the content of a cell grows larger than supported size, clicking on a row will show full document unescaped, however ...
CVE-2021-0532
PUBLISHED: 2021-06-21
In memory management driver, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-185196177