The State of Data Protection [INFOGRAPHIC]
In the age of big data, businesses are creating, processing, storing, and sharing information at an alarming rate. A significant amount of the data is highly sensitive or confidential and should be...
View ArticleIs Big Data IT’s Secret Weapon for Information Security?
When I talk to IT security pros today about how they manage and protect data, most describe grueling manual processes and makeshift solutions comprised of countless off-the-shelf products and fragile...
View ArticleLost in the Cloud – Are Businesses Really in Control of Their Data?
Managing and protecting corporate data is a major challenge. As the technology evolves, so must our data protection strategies. Unfortunately, as our March 2012 report on “The State of Data Protection”...
View ArticleShared folders, like coconuts, don’t migrate by themselves
Our new survey on domain and data migrations shows that 95% of organizations move data at least once a year, for any of several reasons— infrastructure upgrades, mergers, acquisitions, and...
View ArticleEmail vs. Employee: Can We Win the Inbox Race? [INFOGRAPHIC]
Many of us think we are masters of our email universe. By sending messages from a desktop app or mobile device, we’re able to direct and coordinate coworkers anywhere in the organization to solve...
View ArticleReport: Nearly Half of IT Staff Fear Unauthorized Access To Virtual Servers
There are reportedly over 50 million VMs residing on servers. Varonis surveyed IT staff at VMWorld San Francisco and VMWorld Barcelona in 2012 to answer questions about VM adoption, saturation, use...
View ArticleBring Your Own Demise [INFOGRAPHIC]
Bring Your Own Device (BYOD) is certainly not new, but its effects on security and employee behavior are still largely undetermined. To quantify the impact of personal devices in corporate settings,...
View ArticleVaronis Privacy and Trust Report
Even in an age of social media and voracious over-sharing, there are still times we need privacy online. When we engage in old-fashioned point-to-point communication, we expect the person or business...
View ArticleRed Alert: A Data Breach Report
Can you detect a data breach in real-time? Most people can’t. Our new Red Alert Research Report, based on survey data from 248 information security professionals, indicates that only 6% of companies...
View Article10 Insights on Enterprise Data [Free eBook]
If you follow IDC’s Digital Universe study each year, you can know that the enterprise technology landscape is fast-changing. Data growth is out of control and companies are scrambling—with limited...
View ArticleCorporate Data: A Protected Asset or a Ticking Time Bomb?
How many days pass between big, publicized security breaches now? Not many. You’ve probably been worried about the state of data security, but you’re going to be surprised at just how out of control...
View Article
More Pages to Explore .....