Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Audits

Varonis Provides Visibility into Data Accessed on AIX File Systems

Varonis Systems, a provider of data governance software, today announced it has extended its DatAdvantage for UNIX now supports AIX servers, allowing AIX system administrators the ability to perform automated data access and usage audits, fix and maintain access controls, identify sensitive data and find data owners.

Varonis Systems, a provider of data governance software, today announced it has extended its DatAdvantage for UNIX now supports AIX servers, allowing AIX system administrators the ability to perform automated data access and usage audits, fix and maintain access controls, identify sensitive data and find data owners.

Varonis DatAdvantage for UNIX allows customers to identify excessive permissions and abnormal access activity by showing who has access to data, who is using their access, who shouldn’t have access, who owns the data and what data is sensitive on their file systems.

As part of the platform, Varonis’ Metadata Framework non-intrusively collects critical metadata, generates metadata where existing metadata is lacking (e.g. its file system filters and content inspection technologies), preprocesses it, normalizes it, analyzes it, stores it, and presents it to IT administrators in an interactive, dynamic interface.

Information about AIX servers can be displayed within the same single user interface that also monitors information from Linux, Solaris and NFS-enabled NAS devices, offering visibility, audit trails and recommendations on where excess file permissions and group memberships can be safely removed without affecting normal business processes.

“Digital collaboration is now a business critical activity for organizations and as a result IT departments are drowning in a deluge of digital data,” said Ohad Korkus, Executive Vice President of Engineering, CTO and Co-Founder.

More Information is available at: http://www.varonis.com/products/datadvantage/unix/

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...