In addition to sensitive data, the secrets in companies also include stored information on access data, API keys or passwords on drives or in the cloud at AWS, Microsoft 365 or Google. To track down and classify these "secrets" in the corporate environment, Varonis now offers Secrets Discovery.
With increasing cloud usage and ever faster app development, secrets, i.e. confidential information such as API keys or passwords, can end up almost anywhere and reveal intellectual property, source code and critical infrastructure. Accordingly, open secrets are increasingly responsible for devastating data breaches.
The new data classification capabilities from Varonis Systems, Inc., the specialists in data-centric cybersecurity, identify exposed secrets that allow access to business-critical resources and thus lay the foundation for eliminating these risks. New features recognize private keys, encryption certificates, API keys and authentication tokens in files, source code and logs. Security officers can even choose exactly what types of secrets should be discovered in their cloud data storages in the program.
Automatically find sensitive data
Varonis can now automatically find secrets where you least expect them, remediate threats, and identify and stop anomalous access behavior. By examining source code files and locations such as Windows, Microsoft 365, Box, AWS, Google Drive or Salesforce, Varonis identifies improperly stored secrets such as hard-coded private keys and credentials or those contained in log files.
More at Varonis.de
About Varonis Since its founding in 2005, Varonis has taken a different approach than most IT security providers by placing company data stored both locally and in the cloud at the center of its security strategy: sensitive files and e-mails, confidential customer, patient and Employee data, financial data, strategy and product plans and other intellectual property. The Varonis data security platform (DSP) detects insider threats and cyber attacks through the analysis of data, account activities, telemetry and user behavior, prevents or limits data security breaches by locking sensitive, regulated and outdated data and maintains a secure state of the systems through efficient automation .,