Customers use the product to identify sensitive information, correlate it with access permissions, and utilize its automation engine for remediation. It includes fixing broken permissions and managing global access. In healthcare settings, the data privilege module allows for implementing the least privilege and simplifies permission management. It also provides effective data alerting and reporting for both on-premises and cloud environments like Microsoft 365.
Director of Cyber & Information Security at a government with 10,001+ employees
Real User
Top 20
2024-02-01T14:41:00Z
Feb 1, 2024
We use the product for auditing, and keeping track of shares. It ensures proper access control and monitors file creation, access by relevant users, and productivity analytics.
We use the solution's data alert, data advantage, and data classification modules. Its use case is similar to DLP. It helps to ensure that people don't move data to places they are not supposed to.
Varonis Platform specializes in network security and data monitoring with modules for alerting, data classification, and access management, benefiting environments like Microsoft 365.Varonis is designed to secure data by auditing and tracking data movement. It leverages data alert and classification modules to identify and manage sensitive information. The platform enhances network security by alerting users to unexpected data modifications and deletions, crucial for effective data loss...
We use the solution for data loss prevention. The tool scans Google Drive documents to ensure nothing is overshared.
Customers use the product to identify sensitive information, correlate it with access permissions, and utilize its automation engine for remediation. It includes fixing broken permissions and managing global access. In healthcare settings, the data privilege module allows for implementing the least privilege and simplifies permission management. It also provides effective data alerting and reporting for both on-premises and cloud environments like Microsoft 365.
We use it to manage storage systems. We can see who changes file names, folder names, deletes files, removes or adds permissions.
We use the product for auditing, and keeping track of shares. It ensures proper access control and monitors file creation, access by relevant users, and productivity analytics.
We use the solution's data alert, data advantage, and data classification modules. Its use case is similar to DLP. It helps to ensure that people don't move data to places they are not supposed to.