Getting a Grip on Human-generated Data

How many work-related documents, images, and videos do you interact with on a daily basis? Before you answer, include the number of e-mails you send and receive. Tens? Hundreds? Maybe thousands? And that’s just you. Imagine if you’re part of a huge organization with thousands of employees. The number grows exponentially. Now imagine you’re an IT admin who is supposed to be monitoring all of that. Scary, right? Do the right people have access to the right files? Has an owner of the data been identified? Who is accessing which files? How long has it been since a file was last accessed? Are any of the files sensitive? Are the sensitive files exposed to the wrong people? If you answered “I don’t know” to any of those questions, you could be setting yourself up for a major headache down the road.

We recently had a chance to take a peek at the Varonis Data Governance Suite, which addresses all of the above questions and more. The suite automates all of those time consuming data protection and management tasks for both IT admins and business users to help reduce risk, improve productivity, and lower costs.

Varonis showed us how the software suite can help find and fix a number of problems like incorrect privilege settings, unwarranted access to files and e-mails, suspicious activity, anomalous content access. It found where secure data was located, who could access it, and most importantly who SHOULD have access to it. One of the cooler features in our opinion was the ability to identify data owners. Whoever was assigned as the data owner could manage access to the data via e-mail. No logging into the software, no navigating to a special screen, no clicking the mouse 15 times to get to where you need to be just to say “Yes.” If Joe requests access to Folder A, simply respond to an e-mail with an “X” next to approve or deny.

We gained visibility into how much data was stored in the infrastructure. More importantly we could see when that data was last accessed. If it hadn’t been accessed in a while we could archive it to more cost-effective storage. If data was located in the wrong place, we could migrate it to a different server cross-domain. If it was useless data that meant nothing, we could simply delete it.

Overall, the biggest takeaway was pretty obvious. When it comes to data protection and management tasks, regardless of whether you’re trying to be proactive and prevent something from happening or something already happened and you need to fix it, Varonis Data Governance Suite can help you get a grip on all the human-generated data within your infrastructure.

For more details on how it works and how it can help, check out the recently completed ESG Lab Spotlight.

Topics: Cybersecurity Data Protection