David Gibson, Varonis Vice President of Strategy and Market Development, said, “It’s critical for organizations to go beyond perimeter protection and understand the relationships between users and data. The integration of the Varonis Metadata Platform with IBM Storwize brings two leading technology platforms together to help organisations of all sizes manage and protect their rapidly growing volumes of unstructured data from insider threats. The market-leading file analysis, audit and protection capabilities of Varonis DatAdvantage can prevent many of the data breaches that are happening with such frequency. The ability of Varonis DatAlert to provide real-time alerts can detect potential security breaches before they cause major damage, and the Varonis Data Classification Framework discovers sensitive content and its possible exposure, then helps you lock it down.” Eric Herzog, Vice President Marketing IBM Storage Systems at IBM, said, “Our clients store some of their most valuable and sensitive data on IBM Storwize, so the ability to monitor who has access to which files and when they actually access that data is critical. The Storwize V7000 Unified and Storwize V7000 systems provide the latest storage technologies for unlocking the business value of stored data. Together with the Varonis solutions, they provide valuable, complementary capabilities designed to give our clients peace of mind. The Storwize family supports the massive volumes of data created by today’s demanding applications. Together with Varonis, we can provide best-of-breed efficiency, ease of use and dependability for organisations of all sizes looking to glean insights and monitor their unstructured data.”
Mark Guadagni, Regional Vice President of Champions Solutions Group, an IBM and Varonis reseller and implementation specialist, said, “We’re very excited about the new integration of IBM Storwize V7000 with the latest version of DatAdvantage. The amount of unstructured data that our customers deal with on a daily basis isn’t slowing down, and probably never will. This information is highly sensitive, therefore they need solutions in place that can not only manage and store this data, but also provide greater insight into the metadata. This will ensure that only the right employees have access to the right data at all times, all access is monitored, and abuse is flagged. Knowing this level of detail will significantly reduce the risk of internal and external data breaches.”