Varonis Systems, Inc. (Nasdaq:VRNS), the leading provider of software solutions for unstructured, human-generated enterprise data, has been identified as a “Representative Vendor” by Gartner in its first-ever Market Guide for Data-Centric Audit and Protection (DCAP).
Gartner’s guide includes a sample list of DCAP vendors’ capabilities and lists Varonis with “Yes” checkmarks in all five “DCAP Capabilities” for files: Data Discovery, Privilege Management, Activity Monitoring, Audit, and Data Protection.
At a time when highly publicized, crippling cyber attacks and data breaches dominate the headlines, the reality has emerged that perimeter security by itself is insufficient to safeguard the most important and sensitive assets a company has: its critical, proprietary, often private data.
Gartner, a leading independent provider of IT advisory and market intelligence and research services worldwide, recently published its first “Market Guide for Data-Centric Audit and Protection (DCAP),” authored by Gartner analysts Brian Lowans and Earl Perkins. The report begins: “Organizations that have not developed data-centric security policies to coordinate management processes and security controls across data silos need to act. This market guide helps CISOs (Chief Information Security Officers) identify emerging data-centric audit and protection tools that can apply these policies.”
Among its key findings, Gartner finds, “The exponential growth in data generation and usage is rendering current methods of data security governance obsolete, requiring significant changes in both architecture and solutions approaches.”
David Gibson, Varonis Vice President of Marketing, said, “It is clear to us that Gartner’s analysis of the importance of data-centric security policies and controls is consistent with the way Varonis and our customers have been rising to the challenges of the digital world for years. Unstructured, human-generated data such as emails, spreadsheets, documents, presentations, and other files created and shared by employees must be monitored and protected. Connecting the dots between people and the files they can and do access is finally becoming the recommended way to ensure that an organization’s valuable and sensitive files are protected – while enabling a more productive work force of employees who must be able to find and get access to the data they need from anywhere and on the right devices.