Welcome!

News Feed Item

Boston University Prevents Data Loss With Varonis' Data Governance Solution

BOSTON, MA -- (Marketwired) -- 09/04/13 -- Varonis Systems, Inc., the leading provider of comprehensive data governance software, today released details of how it has helped Boston University bolster its data loss prevention (DLP) strategy and address its data governance concerns. Having initially investigated traditional DLP technologies, this leading university found that the majority of the solutions could only answer one aspect of DLP -- where sensitive data was located -- but could not determine who had access to it or who was using it. As the only solution able to provide deeper insight to the data, Varonis DatAdvantage and the Varonis IDU Classification Framework are now enabling Boston University to better ensure that sensitive data is only accessible to authorized users, while also providing extensive audit trails that detail how the data is being used.

Quinn Shamblin, Executive Director and Information Security Officer for Boston University, explains, "Data loss prevention is primarily concerned with ensuring that the right person has access to information, while preventing the wrong person from doing so. All the DLP technologies that we looked at, with the exception of one, could only tell me where sensitive data was; they couldn't tell me who had access to it or who was using it. Knowing the location of sensitive data without knowing who has access to it is almost irrelevant. Varonis offered a very strong combination of features and capabilities without having to go to multiple products and incur multiple licensing fees. And it does what I need it to do, help us be even more effective in dealing with the challenge of data loss prevention."

Varonis DatAdvantage aggregates Active Directory user and group details, ACL information and all data access events -- without requiring native OS auditing -- which means Boston University can answer one element of DLP by building a complete picture of who can and who is accessing data. By monitoring these file touches, the intelligence leads Quinn's team to the rightful data owners, who can then be involved in making sure the right people have appropriate access and usage. Varonis' IDU Classification Framework provides the other piece of the puzzle, the ability to accurately identify files that contain sensitive information, allowing IT to immediately identify folders with excessive permissions that contain quantities of sensitive data, for remediation.

An additional benefit from the solution, as Quinn explains, is that Varonis DatAdvantage is able to answer a question that has challenged the university for many years. "Because of what it does, recording all file access events, it can answer the core question the audit group are always asking: who has access to and who accessed what. For example, say Bill Smith was to leave the university -- we need to know what Bill has access to. Without a centralized solution, we had to work with each individual system administrator across all the different schools and departments across both campuses, getting them to manually review their systems to document Bill's permissions. Varonis DatAdvantage does this for us with a canned report. That's just one use and there are many other ways we hope it will revolutionize our processes. Varonis has value not just for my team but also the system administrators and auditors within the organisation."

Boston University is a leading research university, with more than 33,000 undergraduate and graduate students from more than 140 countries along with 10,000 faculty and staff, 16 schools and colleges, and 250 fields of study,

For the full Varonis case study on Boston University, visit http://www.varonis.com/customers. To find out more about Varonis and DatAdvantage, visit www.varonis.com.

Connect with Varonis

About Varonis

Varonis is the foremost innovator and provider of access, governance, and retention solutions for human-generated data, the fastest-growing and most sensitive class of digital information. Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times from all devices, all use is monitored, and abuse is flagged.

Varonis makes digital collaboration secure, effortless and efficient so that people can create and share content easily, and organizations can extract more value from their content while being confident that it is protected and managed efficiently.

Voted one of the "Fast 50 Reader Favorites" on FastCompany.com, and winner of the SC Magazine Innovation, Product or Service of the Year, and Best Network Security Awards, Varonis has more than 5,000 installations worldwide and is headquartered in New York, with regional offices in Europe and Asia.

Varonis, the Varonis logo, DatAdvantage®, DataPrivilege® and the IDU Classification Framework® are registered trademarks of Varonis® Systems in the United States and/or other countries and Metadata Framework™, DatAnywhere™, and Data Transport Engine™ are under a registration process in the United States and/or other countries. All other product and company names and marks mentioned in this document are the property of their respective owners and are mentioned for identification purposes only.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Shelley Harrison
CTP
Tel: 617-412-4000 x 249
Email: Email Contact


More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
We all know that end users experience the Internet primarily with mobile devices. From an app development perspective, we know that successfully responding to the needs of mobile customers depends on rapid DevOps – failing fast, in short, until the right solution evolves in your customers' relationship to your business. Whether you’re decomposing an SOA monolith, or developing a new application cloud natively, it’s not a question of using microservices – not doing so will be a path to eventual b...
One of the biggest challenges with adopting a DevOps mentality is: new applications are easily adapted to cloud-native, microservice-based, or containerized architectures - they can be built for them - but old applications need complex refactoring. On the other hand, these new technologies can require relearning or adapting new, oftentimes more complex, methodologies and tools to be ready for production. In his general session at @DevOpsSummit at 20th Cloud Expo, Chris Brown, Solutions Marketi...
At the keynote this morning we spoke about the value proposition of Nutanix, of having a DevOps culture and a mindset, and the business outcomes of achieving agility and scale, which everybody here is trying to accomplish," noted Mark Lavi, DevOps Solution Architect at Nutanix, in this SYS-CON.tv interview at @DevOpsSummit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
I think DevOps is now a rambunctious teenager - it's starting to get a mind of its own, wanting to get its own things but it still needs some adult supervision," explained Thomas Hooker, VP of marketing at CollabNet, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Enterprises are moving to the cloud faster than most of us in security expected. CIOs are going from 0 to 100 in cloud adoption and leaving security teams in the dust. Once cloud is part of an enterprise stack, it’s unclear who has responsibility for the protection of applications, services, and data. When cloud breaches occur, whether active compromise or a publicly accessible database, the blame must fall on both service providers and users. In his session at 21st Cloud Expo, Ben Johnson, C...
In this presentation, you will learn first hand what works and what doesn't while architecting and deploying OpenStack. Some of the topics will include:- best practices for creating repeatable deployments of OpenStack- multi-site considerations- how to customize OpenStack to integrate with your existing systems and security best practices.
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Agile has finally jumped the technology shark, expanding outside the software world. Enterprises are now increasingly adopting Agile practices across their organizations in order to successfully navigate the disruptive waters that threaten to drown them. In our quest for establishing change as a core competency in our organizations, this business-centric notion of Agile is an essential component of Agile Digital Transformation. In the years since the publication of the Agile Manifesto, the conn...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
"We work around really protecting the confidentiality of information, and by doing so we've developed implementations of encryption through a patented process that is known as superencipherment," explained Richard Blech, CEO of Secure Channels Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
"We were founded in 2003 and the way we were founded was about good backup and good disaster recovery for our clients, and for the last 20 years we've been pretty consistent with that," noted Marc Malafronte, Territory Manager at StorageCraft, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...