Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Audits

Varonis Provides Visibility into Data Accessed on AIX File Systems

Varonis Systems, a provider of data governance software, today announced it has extended its DatAdvantage for UNIX now supports AIX servers, allowing AIX system administrators the ability to perform automated data access and usage audits, fix and maintain access controls, identify sensitive data and find data owners.

Varonis Systems, a provider of data governance software, today announced it has extended its DatAdvantage for UNIX now supports AIX servers, allowing AIX system administrators the ability to perform automated data access and usage audits, fix and maintain access controls, identify sensitive data and find data owners.

Varonis DatAdvantage for UNIX allows customers to identify excessive permissions and abnormal access activity by showing who has access to data, who is using their access, who shouldn’t have access, who owns the data and what data is sensitive on their file systems.

As part of the platform, Varonis’ Metadata Framework non-intrusively collects critical metadata, generates metadata where existing metadata is lacking (e.g. its file system filters and content inspection technologies), preprocesses it, normalizes it, analyzes it, stores it, and presents it to IT administrators in an interactive, dynamic interface.

Information about AIX servers can be displayed within the same single user interface that also monitors information from Linux, Solaris and NFS-enabled NAS devices, offering visibility, audit trails and recommendations on where excess file permissions and group memberships can be safely removed without affecting normal business processes.

“Digital collaboration is now a business critical activity for organizations and as a result IT departments are drowning in a deluge of digital data,” said Ohad Korkus, Executive Vice President of Engineering, CTO and Co-Founder.

More Information is available at: http://www.varonis.com/products/datadvantage/unix/

Advertisement. Scroll to continue reading.
Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.