News By Tag Industry News * Data Governance * More Industries... News By Location Country(s) Industry News
| Varonis Systems Issues Clarification and Correction Regarding Computershare Data BreachA media advisory issued Nov 16 entitled “Varonis Systems: Automated Data Governance Technology Could Have Stopped Computershare Breach” inadvertently identified the company as “Compushare” in some versions of the advisory.
By: Varonis Systems NEW YORK - Nov. 17, 2011 - Varonis Systems Inc. today issued a statement that a media advisory issued on November 16 entitled “Varonis Systems: Automated Data Governance Technology Could Have Stopped Computershare Breach” inadvertently identified the company as “Compushare” Compushare has no involvement whatsoever with this alleged data breach and is an entirely different entity than Computershare. About Varonis Systems Varonis is the leader in unstructured and semi-structured data governance for file systems, SharePoint and NAS devices, and Exchange servers. Named a "Cool Vendor" in Risk Management and Compliance by Gartner and voted one of the "Fast 50 Reader Favorites" on FastCompany.com, Varonis has more than 4,000 installations worldwide. Based on patented technology and a highly accurate analytics engine, Varonis' solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times. Varonis is headquartered in New York, with regional offices in Europe, Asia and Latin America. Varonis, the Varonis logo, DatAdvantage and DataPrivilege are registered trademarks of Varonis Systems in the United States and/or other countries and Data Classification Framework and Metadata Framework are under a registration process in the United States and/or other countries. All other product and company names and marks mentioned in this document are the property of their respective owners and are mentioned for identification purposes only. # # # With over 4500 installations worldwide, Varonis® enables organizations to audit data access activity, fix access controls, identify sensitive data, find data owners and involve them in automated authorization processes. End
|
| |||||||||||||||||||||||||||||||||||||||||||||||||||