Post on 19-Oct-2014
description
VARONISOVERVIEWSOLUTIONS FOR HUMAN GENERATED DATA
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL
VARONIS SOLUTIONS
GOVERNANCE
ACCESS
RETENTION
Ensure that only the right people have access to the right data at all times, access is monitored and abuse is flagged.
Use your existing file shares, on your own servers, to provide file synchronization, mobile access, and secure 3rd party sharing.
Intelligently automate data disposition, archiving and migration process using the intelligence of the Varonis Metadata Framework
VARONIS PRODUCTS
5 Major Product Families In 8 Years
DatAdvantage2006
IDU ClassificationFramework2009
DataPrivilege2006
Data TransportEngine 2012
DatAnywhere2012
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL
METADATA FRAMEWORK COMPONENTS
4
IT USERS BUSINESS USERS
Visualization & Accessibility
Data Transport Engine DatAdvantage IDU Classification
FrameworkDataPrivilege DatAnywhere
Metadata Change Execution &Automated Data Movement
Data Routing
UNIX/Linux NAS SharePoint Exchange MS Active Directory LDAP NIS Local Accounts
PROCESSINGPresentation
Analysis & SimulationRetention & Storage
Aggregation & Normalization
DATA COLLECTIONContent Classification
Access ActivityUser & Group Info
Permissions & File System Info
Windows
VARONIS TECHNOLOGY
Permissions VisibilityUsable Audit TrailPermissions Recommendations & ModelingData Ownership IdentificationData Classification Information*(with DCF)
© 2012 Varonis Systems. Proprietary and confidential.
Windows/CIFS ServersUnix/Linux/NFS Servers
NAS DevicesSharePointExchange
DATADVANTAGE
Entitlement ReviewsAuthorization WorkflowEthical WallsSelf-Service Portal
© 2012 Varonis Systems. Proprietary and confidential.
DATAPRIVILEGE
DATA TRANSPORT ENGINE
Find data based on metadata
Content, Permissions, Activity, File System info, etc.
Move it or delete it automatically
Scheduled, continual, incremental
Keep the permissions or make them better
Automatically handles cross platform and cross domain
moves
Automatically implements simulations and
recommendations if desired
DATANYWHERE
Provide the cloud experience…
File Synchronization
Mobile device and web access
3rd party collaboration
…without the cloud
All data kept on standard CIFS servers
All permissions enforced
Users authenticate with Active Directory
NEXT STEPS
GOVERNANCE
ACCESS
RETENTION
Ensure that only the right people have access to the right data at all times, access is monitored and abuse is flagged.
Use your existing file shares, on your own servers, to provide file synchronization, mobile access, and secure 3rd party sharing.
Intelligently automate data disposition, archiving and migration process using the intelligence of the Varonis Metadata Framework
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL10
Use Cases
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL
REDUCING RISK, COMPLEXITY, AND COST
11
RISK
30+% of data can be archived60+% of infrastructure is not utilized effectively
COMPLEXITY
COST
50+% of access is unwarranted70+% of infrastructure is unmonitored
Rationalize domain structure, access control entities, and supporting business processes
“Varonis DatAdvantage gave us the visibility and
recommendations to limit user-to-data access by
business function and need. Now, my team is able to
audit the use of any data set or group for our compliance
initiatives.”
─ James Nelson, IT Security Manager, Juniper Networks
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL
INCREASING PRODUCTIVITY AND FUNCTIONALITY
12
ACCESSIBILITY
Extends functionality of existing investments in infrastructure
OPERATIONAL EFFICIENCY
FUNCTIONALITY
File synchronization and mobile access make collaboration more immediate
10-40x Efficiency gains for daily data management and protection tasks
“A process that previously took five or six days now takes just a few hours... we’re able to produce reports that weren’t
possible previously,”
─ Thibaud Desforges, Tool and Processing Manager,
GDF Suez
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL
CASE STUDY: PHILIP MORRIS INTERNATIONAL
13
“What we have now is unprecedented visibilityinto who has access to which information.”
─Jan BillietDir. Security & Risk Management
Philip Morris International
Problem BenefitsSolution
Could not visualize access to critical data No visibility into collaboration workflowsLow productivity when fulfilling audit requirements
Instrumented file share and SharePoint environmentAutomated map of data, users, groups, and access controlsAutomated ownership identification and involvement
Global visibility of Active Directory, File server and SharePointQuantified access control challengesDrives Active Directory and file server managementbest practices