Varonis helps Miramax Control and secure valuable contracts, scripts, creative assets and other data from threats

Send to friend

Varonis Systems, Inc., provider of software solutions that protect data from insider threats and cyberattacks, has released details on how Miramax relies on Varonis solutions to protect its most valuable data.

Miramax, the global film and television studio whose acclaimed library contains over 700 titles, including Pulp Fiction, Good Will Hunting and new titles like the upcoming Bridget Jones's Baby with Universal Pictures and Studio Canal, set out to find a solution that could set and enforce data-access policies and provide quick, secure searches on documents within its organisation. The research led to the evaluation and implementation of Varonis DatAdvantage for monitoring file activity and user behaviour, DatAnswers for secure enterprise search and Data Classification Framework for sensitive content discovery, remediation and protection.

Denise Evans, Miramax Vice President of Information Technology, said, "When Miramax spun off from Disney in 2010, we were like a startup company. We inherited a lot of unstructured data -- scanned documents, contracts with the talent and other valuable and sensitive files. Disney's naming conventions were not always consistent with ours. Without metadata on these files, we needed the ability to search and find documents we needed quickly and Varonis and its Professional Services team were able to help us do this. Now, we can support eDiscovery requests and get very accurate results that save the company time and money and also ensure that documents are encrypted and stored securely as necessary."

Implementing a Least Privilege Model

With the help of Varonis, Miramax was able to put in place a least privilege model, so that users only had access to the files they needed to do their jobs.

Evans added, "Prior to implementing a least privilege model with Varonis, 40% of our files were overexposed when they didn't need to be. This kind of exposure isn't a problem until a security breach occurs. Should there be a breach, we're now able to quickly identify and target problem areas in a manner we weren't previously able to do."

Comments (0)

Add a Comment

This thread has been closed from taking new comments.