Spotlighting Unstructured Data Access
Ed Amoroso summarizes a recent discussion with Varonis on their methods for providing visibility into unstructured data access.

Spotlighting Unstructured Data Access

Last month, I received a note from Cornell Professor Rebecca Slayton, by way of Steve Bellovin, asking about early secure Unix projects. I offered what information I could, and in the ensuing email thread, I enjoyed some wonderful reflections by pioneers such as Steve Lipner. But the whole discussion got me thinking about operating system security, and the significant trade-offs between application-level add-ons and kernel-level protections.

In a nutshell, application-level security is easier to install and integrate, but provides only local visibility – which is fine if the goal is application security. Kernel-level protections, in contrast, require more work to design into the operating system – often via software shims. But they provide deeper, more penetrating visibility, which makes them the preferred option for teams addressing broad questions that extend across a large swath of computing activity.

I was thinking about operating system design while chatting this week with David Gibson, who runs the marketing team for cyber security company Varonis. Industry veteran, Greg Stein, now with Varonis, recommended the chat, and I’m glad he did, because the company is focused on some amazing technology to protect unstructured data. And the techniques employed involve kernel-level software right out of the old secure Unix playbook.

“Our platform exposes where sensitive data is located and who is accessing it,” explained Gibson. “We detect unauthorized behaviors such as unexpected privilege abuse or escalation in file systems, enterprise email, and shared services like Active Directory. The resulting visibility is presented to IT and security teams via detailed reports and logs that help meet security and privacy compliance requirements.”

Many companies offer data visibility, so I pushed to understand the secret behind the Varonis approach. After all, this is a publicly-traded company with over two-hundred million dollars in sales. So, I figured something significant must be going on, and Gibson did not disappoint: “Our solution started in the kernel,” he explained. “This enabled the telemetry required to build an accurate map of data access and usage that is understandable and actionable. In fact, our most valuable intellectual property is centered on this notion of making the collected data practically usable.”

The Varonis platform consists of data mapping using hierarchies and permissions, and auditing (DatAdvantage), classification (DCE), as well as behavior-based threat detection and response (DatAlert). DatAlert analyzes transactional access usage from the underlying low-level software for just about every source of unstructured enterprise data. This includes AD, Windows, SharePoint, Exchange, Office 365, Linux, Dell EMC, HPE, DNS, proxy, VPN, and on and on. It’s a collective spotlight on data access across the enterprise.

“By capturing access information from data stores, we provide detailed guidance on how sensitive data is being used and how it should be classified,” Gibson said. “Sometimes the results of this visibility can be unsettling. For example, we’ve had customers run our software, only to find that hundreds of employees have unneeded access to sensitive data. Fixing this problem and locking down the data is an effective way to reduce cyber risk.”

In addition to the security use-cases, we all agreed that this sort of powerful, kernel-level visibility into file transactions enables many non-security objectives such as file system optimization and data center configuration management. I asked Gibson if IT managers were as excited with the capability as security teams: “Our platform certainly has advantages for both security and non-security objectives,” he replied.

Varonis is led by an experienced executive team under industry veteran Yaki Faitelson, who serves as the company’s CEO and Board Chairman. With 1,400 employees serving roughly 6,600 enterprise customers from the company’s New York Headquarters and Israeli research and development facility, Varonis appears poised to continue the significant YOY revenue growth they’ve reported the last few years.

As with all cyber security companies, growth is no easy lay-up, especially with so many new entrants in this crowded data protection segment. Migration to hybrid cloud introduces additional sales risk for vendors, simply because any change must be navigated to ensure continued success. But sensitive data access visibility will continue to be super-important in virtualized, distributed enterprise, so the Varonis platform should remain highly relevant.

If you care about whether your sensitive data protection policies are being met – or if you just want better visibility into the location and usage patterns for your data, then you’d be wise to give the team at Varonis a call. I suspect you’ll find – whether you are in security or IT – that their integrated approach to data access visibility will be an important part of your present and future strategy.

As always, share with us what you’ve learned.

Perhaps someone's bolt on security was compromised? Like most things, if the design form the beginning was to facilitate a specific set of functions, it would understandably be better than something added after the fact. The description from David that this approach enabled additional benefits is understandable. As any operation expert would say, that the better you can measure a process, the better control you can control it. Sounds like their customers are getting opportunities to improve more than just the security of their enterprise.

Edward Amoroso

Founder and CEO of TAG Infosphere

6 年

For those of you who might have tried to comment here, sorry about the little glitch. The comment and like buttons were broken all day, but we just got it fixed! Thanks.

要查看或添加评论,请登录

Edward Amoroso的更多文章

  • Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    As you no doubt have heard, plans are in place to establish a Strategic Bitcoin Reserve and Digital Asset Stockpile…

    13 条评论
  • Parable of Network Observability

    Parable of Network Observability

    I’d like to discuss here a common problem we see in our work at TAG every day – namely, the deployment of “network…

    23 条评论
  • Parable of the Cyber Industrial Complex

    Parable of the Cyber Industrial Complex

    Preamble In 1961, Eisenhower gave a famous speech that warned of the dangers of the so-called military-industrial…

    34 条评论
  • The Challenges of CISOs Working for Cybersecurity Vendors

    The Challenges of CISOs Working for Cybersecurity Vendors

    (Note to Reader: Normally these reports are available only to TAG Research as a Service (RaaS) subscribers. But with…

    27 条评论
  • Have Uncle Joe Read This Before He Invests in Crypto

    Have Uncle Joe Read This Before He Invests in Crypto

    I’ve been lecturing to my graduate students on the foundations of cryptocurrency and blockchain for years. Starting…

    15 条评论
  • Why TAG is Now Rating Cybersecurity Vendors

    Why TAG is Now Rating Cybersecurity Vendors

    by Edward Amoroso The first time I ever paid attention to an analyst quadrant – fully two decades ago, I found myself…

    11 条评论
  • Predicting the Impact of Trump’s Election on Cyber

    Predicting the Impact of Trump’s Election on Cyber

    Below are seven predictions from our team at TAG for how the recent Trump election of 2024 will impact U.S.

    83 条评论
  • Five Tips for Working CISOs

    Five Tips for Working CISOs

    Our team at TAG has been coaching CISOs for years – and this includes private discussions just about every day of every…

    11 条评论
  • The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    Preface During May and June of 2024, draft versions of this article were shared with Chief Information Security…

    123 条评论
  • Sad Loss Today

    Sad Loss Today

    Several years ago, before the Pandemic, I received a friendly call from a law firm I’d done some business with – and…

    9 条评论

社区洞察

其他会员也浏览了