Over 30% of Varonis users have detected suspicious insider activity or malware in advance of serious security threats

Send to friend

Since May, more than 30% of Varonis software users surveyed have proactively detected one or more instances of suspicious insider activity or malware, thanks to Varonis. The survey was conducted by Varonis Systems, Inc., the provider of software solutions for unstructured enterprise data.

The Identity Theft Resource Center (ITRC), which has been tracking data breach incidents for ten years, has counted 472 total breaches in 2015 through August 11, involving more than 139 million records. Most of these breaches go undetected for months or even years. The Varonis Metadata Framework, on which its solutions are built, intelligently and non-intrusively collects and analyses metadata from an enterprise's vast, distributed unstructured data stores, allowing for detailed tracking on otherwise unseen behavior: user access to the largest and fastest-growing kind of data. This approach, user behaviour analytics (UBA), watches and baselines what users are doing to detect and alert on anomalous behavior or data access, giving IT staff enough time to prevent an actual breach.

The survey was conducted using an email questionnaire, and more than 140 Varonis customers from multiple industries in the US and UK are represented in the survey sample. Of the 31% of respondents who had detected suspicious insider activity or malware using Varonis software, several provided anecdotal information that emphasised how they were able to detect this anomalous activity. Specific accounts included:

  • Being able to detect a user who deployed malware on the day it began
  • Using Varonis DatAdvantage to find CryptoLocker ransomware
  • Identifying the file-downloading actions of a departing employee
  • The survey also found that 95% of Varonis users are satisfied, very satisfied or extremely satisfied with the software.

David Gibson, Varonis Vice President of Strategy and Market Development, said, "For years we have been helping organisations classify and archive unstructured data, optimise their permissions, and sustain a least-privilege model. These customer survey responses reinforce our belief that in today's threat environment, user behaviour analytics has become an essential data security measure. There's no security perimeter anymore, and organisations are beginning to realise that this means they need to start fortifying the controls around the assets they need to protect. It is also gratifying to see that nearly all of our users are benefitting from our software and its ability to easily and proactively improve overall data security. We look forward to continuing to add capabilities and use cases to our solutions and helping many more organisations detect potential threats before they cause serious damage."

Comments (0)

Add a Comment

This thread has been closed from taking new comments.