|By Marketwired .||
|May 5, 2014 04:10 PM EDT||
NEW YORK, NY -- (Marketwired) -- 05/05/14 -- Varonis Systems, Inc. (NASDAQ: VRNS), the leading provider of software solutions for unstructured, human-generated enterprise data, today introduced DatAnswers, bringing secure, user-friendly enterprise search of human-generated data such as presentations, spreadsheets and documents. Varonis DatAnswers provides any organization with the increased employee collaboration and productivity that comes from controlled access to their company's "institutional memory" without sacrificing security. EMC World 2014 attendees can see a demo of DatAnswers at the Varonis booth (number 244).
Because DatAnswers sits on top of and extends the Varonis Metadata Framework, this new solution capitalizes on activity metadata collected by Varonis DatAdvantage to deliver highly relevant results at scale, with the same efficient, incremental scanning technology that was developed as part of the Varonis IDU Classification Framework. Because DatAnswers understands the relationships between employees and files, and knows who is regularly accessing what content, it refines its search results to be even more effective over time as more metadata is collected.
Varonis DatAnswers also takes an unprecedented, much-needed approach to securing enterprise search. First, DatAnswers only displays files the user is authorized to access based on his or her access rights, or permissions. Second, DatAnswers makes use of the access control mapping and patented recommendations technology found in DatAdvantage, which looks at permissions and user access patterns to calculate where users have access to files that they should not. This allows the business to automatically exclude files that users should not have access to -- even if, as is often the case, permissions had been set incorrectly or are outdated. Third, DatAnswers can filter out files that contain PII (personally identifiable information) and other regulated content (such as HIPAA or Sarbanes-Oxley-regulated data) as identified by the Varonis IDU Classification Framework. This further reduces the risk of users finding files that they shouldn't.
Yaki Faitelson, Varonis CEO and Co-Founder, said, "Think of how many times you use an internet search engine every day. It is surprising that so few organizations have the same functionality for their own file systems. DatAnswers will provide their employees broader, faster access to the right documents and files that can save time and speed up decision-making. With the introduction of DatAnswers, we are providing a cost-effective, user-friendly solution that will help employees be much more productive, and help organizations get more out of the vast intellectual capital stored in their human-generated data without introducing risk."
Jon Oltsik, Senior Principal Analyst at Enterprise Strategy Group, said, "One of the most important success factors in encouraging effective and efficient collaboration within the enterprise and beyond is to ensure that employees have access to the files and documents they need in order to tap into institutional memory. Varonis DatAnswers provides organizations the ability to enable employees to identify and access the files they need at the right time, both safely and cost-effectively."
In summary, Varonis DatAnswers:
- Provides the most secure, efficient end-user search available for Windows Shares and SharePoint
- Delivers highly relevant search results by analyzing usage
- Delivers rapid results using incremental indexing and granular scoping
- Ensures secure results using DatAdvantage recommendations and Data Classification Framework results
Varonis DatAnswers is expected to be available as a beta version in late May and released for general availability later this year.
For more information on DatAnswers along with other Varonis solutions, please visit www.varonis.com.
Varonis is the leading provider of software solutions for unstructured, human-generated enterprise data. Varonis provides an innovative software platform that allows enterprises to map, analyze, manage and migrate their unstructured data. Varonis specializes in human-generated data, a type of unstructured data that includes an enterprise's spreadsheets, word processing documents, presentations, audio files, video files, emails, text messages and any other data created by employees. This data often contains an enterprise's financial information, product plans, strategic initiatives, intellectual property and numerous other forms of vital information. IT and business personnel deploy Varonis software for a variety of use cases, including data governance, data security, archiving, file synchronization, enhanced mobile data accessibility and information collaboration. As of March 31, 2014, Varonis had approximately 2,550 customers, spanning leading firms in the financial services, public, healthcare, industrial, energy & utilities, technology, consumer and retail, education and media & entertainment sectors.
News Media Contact:
Tel: 617-412-4000 x 249
Email: Email Contact
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
Jul. 29, 2016 12:00 PM EDT Reads: 1,823
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
Jul. 29, 2016 12:00 PM EDT Reads: 2,086
On Dice.com, the number of job postings asking for skill in Amazon Web Services increased 76 percent between June 2015 and June 2016. Salesforce.com saw its own skill mentions increase 37 percent, while DevOps and Cloud rose 35 percent and 28 percent, respectively. Even as they expand their presence in the cloud, companies are also looking for tech professionals who can manage projects, crunch data, and figure out how to make systems run more autonomously. Mentions of ‘data science’ as a skill ...
Jul. 29, 2016 11:46 AM EDT
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Jul. 29, 2016 11:30 AM EDT Reads: 1,215
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Jul. 29, 2016 11:15 AM EDT Reads: 1,333
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Jul. 29, 2016 11:15 AM EDT Reads: 665
Deploying applications in hybrid cloud environments is hard work. Your team spends most of the time maintaining your infrastructure, configuring dev/test and production environments, and deploying applications across environments – which can be both time consuming and error prone. But what if you could automate provisioning and deployment to deliver error free environments faster? What could you do with your free time?
Jul. 29, 2016 11:00 AM EDT Reads: 418
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
Jul. 29, 2016 11:00 AM EDT Reads: 493
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Jul. 29, 2016 11:00 AM EDT Reads: 507
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
Jul. 29, 2016 11:00 AM EDT Reads: 781
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
Jul. 29, 2016 10:53 AM EDT Reads: 240
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.
Jul. 29, 2016 10:45 AM EDT Reads: 487
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Jul. 29, 2016 09:45 AM EDT Reads: 2,126
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Jul. 29, 2016 09:45 AM EDT Reads: 1,027
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
Jul. 29, 2016 09:45 AM EDT Reads: 1,462