- 21 Jul 2022
- 1 Minute to read
Integrating CTERA with Varonis Data Security Platform
- Updated on 21 Jul 2022
- 1 Minute to read
CTERA enables centralized data access from any edge location or device without compromising performance or security. In a distributed enterprise with an increasingly remote workforce, the need to ensure unstructured file data is private and secure is paramount for success. Files can contain sensitive enterprise data, such as intellectual property or customer information, and they must be protected from theft, leakage, and loss.
The Varonis Data Security Platform secures data from unauthorized access and cyber-threats by locating where sensitive and regulated information lives across on-premises and cloud datastores – limiting access to data and analyzing activity for abnormal behavior or indications of compromise. Varonis correlates data activity from CTERA into context with additional information such as data classification, authentication events, and network activity to provide a complete audit trail of user activity.
The integration between CTERA and the Varonis Data Security Platform enables:
- Central feed of file operations from all devices
- Scans global file system to map files and permissions and identify sensitive data
- Alerts on compliance violations
As organizations begin to adopt more rigorous and modern security protocols like Zero Trust, they can utilize CTERA and Varonis in tandem to help reach a mature Zero Trust environment. The Zero Trust security model states that all users, devices, applications, and networks should be inherently untrusted. With CTERA, each direct request is approved and digitally signed by a centralized security authority. Edge devices never possess credentials for object storage, and they cannot corrupt your critical data even if they are compromised. Varonis adds an extra layer of security to the CTERA global file system. The Varonis Data Security Platform rapidly detects and responds to threats by comparing data activity with baseline behavioral profiles created using machine learning algorithms. These algorithms automatically detect abnormal user behaviors and trigger automated responses that stop attackers in their tracks and mitigate any potential damage.
Varonis maps out your CTERA environment’s entire permission structure to understand where sensitive data lives within your environment, revealing where data is overexposed and at risk. Varonis grants complete control over access to your data and gives administrators the ability to control file access at a granular level, helping minimize exposure, reduce the attack surface, and protect sensitive data from potential threats. Additionally, CTERA provides the ability to migrate and support previously defined Windows NT Access control lists (ACLs) and enforces them at both the filer and browser levels.