Varonis Objection Handling Flashcards

1
Q

Why do other solutions fail to protect data?

A

They simply cannot provide outcomes like Varonis can
- Lack the ability to get their arms around data
- If they cant get their arms around data then they cant give complete understanding and solution to a problem
- They cant automate remediation and fix problems they cant see or dont find

They don’t have the 3 Cs / Can’t Scale to all data types

Complete
- Some solutions are just cloud, not on prem and cloud from one view
- Databases: Not unstructured, which is more complicated and obviously where the more sensitive data is
- Scanning: has to be comprehensive and current. not partial either. others provide only samples. they cant scale

Current
- Not real time
- scans take too long and are out of date
- everything down stream is late and incorrect

Context
- User and Group Information - who has access to what resources
- Permission Information - across file systems, data stores, and cloud environments
- Access Activity and Audit Data - monitors and collects data on every file touch across the monitored environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do Classification Solutions fail?

A

their scanning takes too long and wont be real time because of their frequency

3 Cs

Complete
- We can and monitor all data
- Everywhere it resides on prem or in the cloud
- Unstructured or structured

Current
- Scans take too long
- We are real time - incremental and delta scans
- Competition only does period or massive scans - takes forever, not current, policies are don’t work

Context
- Complete audit trail over every file touch, modify, and delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why do DLP Solutions Fail?

A

Part 1 - their scanning of data at rest takes too long

Part 2 - DLP is victim to the policy enforced. Bad actor? What if someone has been granted access they shouldn’t have, and they’re compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why do DSPMs fail?

A
  • No cyber expertise
  • No remediation
  • Weak Visibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is Varonis able to solve the data security problem?

A
  • Complete real-time visibility
  • We solve mission critical issue allowing for direct outcomes via automation
  • Threat detection in real-time

3 Cs

Three reasons

The 3 Cs
- Complete – we scan and monitor all of your data – everywhere it resides, on prem, in cloud, structured, unstructured
- Current – we are doing this in real time & doing incremental and delta scans; everyone else pretty much does period, massive scans – takes forever, never current, policies don’t work
- Context – complete audit trail over every file touch, modify, add, delete

Focus on Outcomes
- Actually addressing and fixing the problems we find in an automated fashion

Threat Detection
- We detect threats in real time and stop them with our Managed Detection Response team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is our Visibility Better / What are the 3 Cs?

A

Complete and Current Context
- Full scans on data stores, zero blind spots
- No one else can scale like Varonis
- Map permissions and config data (allowing us to see all activity - unmatched context)
- Scans are always current

Complete and Current Conntext

3 Cs
- Complete: we go out and look for sensitive data and label it everywhere (no one else can)
- Current: Our scans are in real time delta scans, we scan for changes, everyone else does slow scans - this undermines the ability to see and act now
- Context: not just total context of the data type, but c omplete audit trail of every file touch, create, add, modify, move, or delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why are we able to remediate / fix problems with automation

What are 5 examples of Remediation via Automation?

A

Context
- Because of the complete context we provide about data it allows us to go out and remediate open access via automation.
- That context into the data gives the peace of mind that problems are solved and data is safe

Are you confident in that data protection?

Automation Examples
1. Eliminate Open Access to sensitive data - via automation (VA OIG finding)
2. Global Access Remediation - revoke board permissions to Everyone or Domain User Groups
3. Broken ACL Repair (Access Control List) - Uncheck opens risk to unauthorizeed access
4. Shared Link Remediation - Teams (NIH needs this)
5. Automated Policy Enforcements - Customizable based on context from your environment on all your data types on prem or in the cloud
6. Automate data movement, revoke stale data access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are we able to Alert and Respond?

Provide 5 examples vs competition (the bitches)

A

Proactive Detection and MDDR

We see events everywhere - Bank Analogy
- Complete and Current Context

Alerts on Access to Sensitive Data
- 3 Cs will give you full visibilty into every unauthorized access to sensitive data

Excessive Access to sensitive data
- The VA

Identify service accounts authentication to privilged devices
- Solarwinds

Insider Threat Alerts
- Detect data exfiltration - OIG Finding
- Detect downloads of data from cloud

Custom Alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the Banking Analogy

A

Fraud Incident on your credit card

Bank had visibility into abnormal behavior

Data perspective
- Who is accessing, using, moving, or deleting data?
- No other data solutions provide this
- Resulting in the inability to alert and protect the data
- Internal misuse or exfil.. if you don’t have our capability you cant protect your data
- no other competitor can do this… OOORAH DRILL SARGENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why do Labeling Projects Fail?

What is Labeling

A

They fail because they only think about DLP aspect of the labeling program

Critical to get labeling right
- it has to be accurate and timely or DLP efforts won’t provide value

Rely on manual user labeling
- we know this doesn’t work
- not complete, inaccurate, and mistakes
- missing and misapplied labels all over the environment

They cannot automatically label like Varonis

Varonis automatically applies labels based on classification scans, automatically fixes misapplied labels based on the content of the file. We then automatically apply the mising label based on our real time scanning.
- Integration with MSFT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What Does Purview Do?

How does Varonis help?

A

Purview is MSFT Data Governance Platform
Goal is to classify and label data while preventing sensitive data from being shared
It can label data but its too cumbersome
- cant enable blocking
- abandon on-prem scanning
- classification is not great - leads to labeling issue. downstream problem are then caused because policies are
- paint that picture

Reality via Varonis

w/ Varonis
- Auto label data on prem and in the cloud
- Better together
- Outcomes are realistic and on time with both

Varonis plugs all holes created by Purview
- Complete accurate and up to date classification /labeling data environment that can truly enforce your policies against.
- we solve this with a unified, clear, and uncluttered user experience
- 90% of data is on-prem at the VA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Purview Objection

Purview is Enough

A

Let us Show You

RA

  • They will see how cumbersome Purview is
  • We will provide in a few days what purview cant and show the plan to success
  • Outcomes
  • Remediation and Automation purview cant provide
  • Alerting (banking analogy)
  • Not just front end
  • We don’t compete on the front end
  • Automated least privilege, and real-time detection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Varonis and Co-Pilot

A

It is an Insider Threat on Steroids
CoPilot is MSFT AI productivity aide
- it can help write an email, create a presentation, and summarize spreadsheets
- However, the insider threat issue that is created by Co-Pilot is HUGE. By leveraging existing rights to access and gather data the dangers created affect all facites of business

Access

Ignorance as a security control

Co-Pilot knows what I have access to and uses it
- Accidently pull up notes from a meeting
- People didn’t know what they had access, but now through prompting they will have access to anything anywhere on the corporate network, intentionally or not
- No distinguishing between sensitive or not - only knows what you have access to
- Least Privilege
- Court Records
- Prescription Drug Information

Microsoft Partnership
- Automated least privilege can only be done with Varonis

Varonis helps regardless of where an environment is in rolling out CoPilot
- By mapping permissions to data access and monitoring and alerting on behavior Varonis puts your organization in a least privileged model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a DSPM?

Where do we fit?

A

Data Security Posture Management
- where sensitive data is - our ability to provide complete coverage
- who has access to that data and how its been used
- security posture of the data store and applications

Visibility / Security Posture of Data / Security Controls for Risk

We are the only true vendor to hit the mark
- Current and Complete Context
- Other solutions only identify the problem - they scan, classify, and look for sensitive data - but they fall short
- Scans are only samples and predictive, not complete
- Rarely have real level of context and (most critical) they don’t see the EVENTS - so they are not current.
- They may identify sensitive data but they do not do the next thing - identify who has access to that data, cant see how the data is used. They may provide file attributes like last modified but they are not seeing all transactions - bank analogy
- We take the next step toward outcomes based on the 3 Cs
- Bank analogy
- Alerting
- #1 on Gartner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does BigID do?

How do they fail?

A

We have BigID or this solution
- all they provide is sending a ticket to service now
- huge difference in the outcome provided
- we deliver an outcome not a ticket

The product does not work

  • Scans take forever
  • Its only sampling, its not a feature
  • Zero Context
  • They do not fix anything, they just create the ticket
  • They gravitate toward coverage, specifically databases
  • they aren’t architected like us

Outcomes
- they identify all the problems but cant fix them
- we do
- they do not alert
- they create a lot of work and manual effort
- manual costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cyera

A
  • They focus on IaaS and Databases
  • Nothing on-prem
  • No event monitoring
  • They cant scale only sample
  • Nothing for the 3 Cs
  • Can’t Scale
  • not complete so outcomes are not achievable

Customer base and the outcomes

  • Project won’t suceed
  • POC will fail
  • No IR / MDDR / Threat Detection
17
Q
  • Dig
  • App Omni
  • Securitai
  • NetWrix
  • Sailpoint
A
  • Can’t scale
  • Similar talk track to Cyera
  • Nothing for the 3 Cs
  • Can’t fix

Bank Analogy

Appomni
- Big list of findings
- Go fix them?
- No added value
- Single pane of glass?

18
Q

What is IaaS

A

Infrastructure as a Service
- File servers and NAS arrays turned into IaaS but they’re object storage like
- Azure Blob
- Amazon S3
- Oracle
- Google

Moving compute / backend storage
- Data location

Discuss Iaas Coverage
- No Context
- No outcomes
- How many locations?
- Only we have this

19
Q

What is CSPM

A

Cloud Security Posture Management
- Automates Identification and Remediation of misconfigurations and security risks across an orgs cloud environment
- Identify and lock potential attack paths and vulnerabilities
- Lacks Completeness
- On prem?
- Outcomes?

Attack Path

  • A lot of Native Tools
  • Server Inventory
  • Vulnerabilities lead to a breach
  • No depth about the data like Varonis
20
Q

Who are the Players in the CSPM space?

What do we do differently / better?

A
  • Wiz
  • Prisma
  • Microsoft Defender
  • Cloud Gaurd
  • MVision

Can’t deliver the 3 Cs

21
Q

What is a CASB?

What do we provide that a CASB does not?

A

Cloud Access Security Broker - Security Policy Enforcement Point
- It is just a crossing gaurd - once authorization is given the casb is blind
- Does not stop exfiltration
- Does not stop data abuse whether by a user or by co-pilot
- Point solution showing how you get access to info
- Software as a Service Edge
- Zero Trust Networking

Varonis monitors all activity after the log in, it has currency there, it looks for anomalies, alerts on them.

Bank Analogy

  • ZTA must have full visibility and leat privlege enforcement for permissions and activity around your sensitive data - with the ability to remediate, or their just findings
  • Once they’re in visibility is lost (file touches, normal vs. abnormal, misuse of data, insider threat)
  • CASB does not limit the blast radius
  • No cyber expertise
  • No forensics trail of all transactions against your data
22
Q

What is Endpoint Security?

What do we provide that they do not?

A

EDR
- Bought it to stop malware on their machines
- EDR was not bought to harden data or protect it from co-pilot

  • Holes in your data protection strategy and EDRs do not provide what we do
  • Purchase was for external threats
  • 25% of breaches come fron the inside
  • Inside Out approach

Not a 1 stop shop

23
Q

How does Varonis Make these better?
- IAM
- PAM
- SIEM
- DLP in Motion

A

They all fall short in providing outcomes for proper data protection

IAM and PAM:
- Access and privilege access management solution only
- they are big and complicated
- good at granting access to people
- help control passwords
- They don’t know what they are allowing access to
- blast radius, we are complimentary

DLP:
- for dlp to work they have to have accurate labeling and in real time
- we build on one another… if labeling is not automated and missing or incorrect labels cant be identified and corrected. Long road vicious cycle
- VA story

SIEM:
- focused alerts with context, not just simple alerting but with context, enriching logs
- not overwhelmed with alerts
- Varonis enriches the logs and serves up focused and actionable results

24
Q

IAM

A
  • Big complicated solution
  • They are not good at knowing what they allow access
  • Varonis ensures the right people have access to the right data
25
Q

PAM

A

Classify Service and Admin accounts
- Control the passwords of the accounts and vault them
- they do not know what the account has access to and is that too much?

Blast Radius - complimentary

Varonis has to be first because of the importance of classification and labeling
- If data is open then there isn’t anything to help if a user has access.
- PAM can’t stop insider threat exfil

26
Q

Product X covers that

Universal Connecter

A
  • Connects, but no outcomes
  • Complete and Current Context
  • We provide outcomes
  • Even with connection parity there is not a lot of value in being connected to everything if all it does is identfy the problem
  • BIG ID - privacy tool, touts widespread connection but no auditing, only samples, not a complete understanding witout the context, no classification, no outcomes
  • ZTA / Data: Least Privilege
27
Q

Product X is cheaper

A
  • Not true, outdated
  • Apples to Oranges / Lawn Mower to Scissors
  • all data types
  • Timetable of other products
  • Big ID is not cheaper - outcomes are only doable with an army of peoplem, their automation is a ticket
  • ## Cost of no outcomes?

Big ID / Deloitte

We are more expensive than some, but the cost of doing business with an incomplete solution will be higher

28
Q

Three Streams

A
  • User and Group Information: helps us build a picture of who has access to what resources
  • Permissions Information: Across file systems, data stores, and cloud environments
  • Access Activity and Audit Data: monitors and collects data on every file touch across the monitored environment