Following is the summary of Varonis tools, functionalities and respective features.
Varonis Tools
|
Functionalities
|
Features
|
Remark
|
| DataAdvantage | Data audit and protection | Bi-directional permissions view | User permission view for each access point such as sharepoint, AD, mail, etc |
| Audit trail | IO operations (open, create, delete, etc) in each access points | ||
| recommendation & modelling | Based on who has permission & auditing, provide recommendations to control access | ||
| Data ownership identification | Top access users for each access point | ||
| Content classification | Anayze sensitive information (credit card No, Social security no, etc) and provide details on who has accessed and who is accessing those. | ||
| Multiple platform supportiveness | Windows Severs, Unix, NAS devices, Exchange and public folders | ||
| DataAlerts | User behaviour analytics | Priviledge escalations | |
| Critical file, folders, sites are accessed or deleted | |||
| Permissions are changed | |||
| Change is detected outside control hours | |||
| DataPrivilege | Access governance | Provide priviledge for business users to approve access requests | No IT team support required |
| DataAnswers | Enteprise search and eDiscovery | Search folder and intranet for specific file or file metadata such as who created, opened, modified and who has access | |
| DataAnywhere | Enteprise file sync and share | Turn your file share into a private cloud | Private
cloud features:- - Access from mobile - share with external parties - Set permission - Backup/ ID management / encryption / data classification |
| IDU Classification Framework | Data classification | Where in file system sensitive data resides | |
| Who has accesss | |||
| Who should and shouldn’t have access | |||
| Who uses it | |||
| Who owns it | |||
| Calculate risk percentage on data | |||
| Set prority for data based on risk | |||
| Alert on statistical deviation or spike in email/file access | |||
| Data Transport Engine | Retention and migration | Migrate live data | -
Filter based on any criteria before migration - Choose destination - Set permission at the destination - Schedule the migration |
| Migrate between two domains | |||
| Migrate data between windows to filshare or vice versa | |||
| Simulate migration |
Are you satisfied with the above overall solution on data prevention?
I would still say no. Because even how depth it provides protection on analyzing and auditing data transfers still I could get a photo of your sensitive data collection or create a PDF version and send it to anybody. Major cons of Varonis is, it still not supporting image and PDF processing in order to governor the data content.
Cheers..





