Varonis is a pioneer in data security and analytics, fighting a different battle
than conventional cybersecurity companies. We are pioneers because over a decade
ago, we recognized that enterprise capacity to create and share data far exceeded
its capacity to protect it. We believed the vast movement of information from
analog to digital mediums combined with increasing information dependence would
change both the global economy and the risk profiles of corporations and governments.
Since then our focus has been on using innovation to address the cyber-implications
of this movement, creating software that provides ways to track and protect
data wherever it is stored.
Our software allows enterprises to protect data stored on premises and in the
cloud: sensitive files and emails; confidential customer, patient and employee
data; financial records; strategic and product plans; and other intellectual
property. Recognizing the complexities of securing data, we have built a single
integrated platform for security and analytics to simplify and streamline security
and data management.
The Varonis Data Security Platform, built on patented technology, allows enterprises
to protect data against insider threats and cyberattacks. Our products enable
enterprises to analyze data, account activity and user behavior to detect attacks.
Our Data Security Platform prevents or limits unauthorized use of sensitive
information, prevents potential cyberattacks and limits others by locking down
sensitive and stale data. Our product efficiently sustains a secure state with
automation and addresses additional use cases including governance, compliance,
classification and threat analytics. Our Data Security Platform is driven by
a proprietary technology, the Metadata Framework, that extracts critical metadata,
or data about data, from an enterprise’s IT infrastructure. Our Data Security
Platform uses this contextual information to map functional relationships among
employees, data objects, content and usage.
The revolution in internet search occurred when search engines began to mine
internet metadata, such as the links between pages, in addition to page content,
thereby making the internet’s content more usable and consequently more
valuable. Similarly, our Data Security Platform creates advanced searchable
data structures out of available content and metadata, providing real-time intelligence
about an enterprise’s massive volumes of data, making it more accessible,
manageable and secured.
We believe that the technology underlying our Data Security Platform is our
primary competitive advantage. The strength of our solution is driven by several
proprietary technologies and methodologies that we have developed, coupled with
how we have combined them into our highly versatile platform. Our belief in
our technological advantage stems from us having developed a way to do each
of the following:
determine relevant metadata and security information to capture;
capture that metadata without imposing any strains or latencies on
the enterprise’s computing infrastructure;
modify that metadata in a way that makes it comparable and analyzable
despite it having originated from disparate IT systems;
create supplemental metadata, as needed, when the existing IT infrastructure’s
activity logs are not sufficient;
decipher the key functional relationships of metadata, the underlying
data, and its creators;
use those functional relationships to create a graphical depiction,
or map, of the data that will endure as enterprises add large volumes of data
to their network and storage resources on a daily basis;
analyze the data and related metadata utilizing sophisticated algorithms,
including cluster analyses and machine learning;
visualize and depict the analyses in an intuitive manner, including
simulating contemplated changes and automatically execute tasks that are normally
manually intensive for IT and business personnel;
identify and classify the data as sensitive, critical, private or regulated;
automate changes to directory service objects and access controls on
large file systems;
detect suspicious user behavior and unusual file and email activity
using deep analysis of metadata, machine learning and user behavior analytics;
and
generate meaningful, actionable alerts when security-related incidents
are detected.
The broad applicability of our technology has resulted in our customers deploying
our platform for numerous use cases. These use cases include: discovery and
classification of high-risk, sensitive data; centralized visibility into enterprise
data, user behavior and file activity; security monitoring and risk reduction;
data breach, insider threat, malware and ransomware detection; data ownership
identification; reporting and auditing with searchable logs; meeting security
policy and compliance regulation; data migration; and intelligent archiving.