Listing Thumbnail

    Varonis

     Info
    Sold by: Varonis 
    Deployed on AWS
    Free Trial
    Vendor Insights
    AWS Free Tier
    Varonis automatically discovers sensitive data in SaaS repositories, identifies where data is exposed, helps reduce risk by rightsizing privileges, and monitors data for suspicious activity to prevent cyberattacks from taking hold.
    4.4

    Overview

    Stop Data Breaches Automatically. With AI-powered automation, continuously discover and classify critical data, remove exposures, and stop threats in real-time.

    Varonis offers security teams a single control point to monitor and protect their SaaS, IaaS, and on-prem environments, including structured and unstructured sensitive data.

    Varonis identifies and surfaces where sensitive data lives across your environments and shows you where it's exposed. Varonis helps you reduce risk by understanding and rightsizing privileges, finding and fixing misconfigurations and security gaps, and monitoring for suspicious or inappropriate behavior across SaaS and IaaS platforms.

    Automated DSPM for AWS, Box, M365, Google, Salesforce, GitHub, Okta, Zoom, Jira, and Slack.

    More than 7,000 enterprises worldwide trust Varonis to keep their data safe.

    Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

    Data classification - Find and classify sensitive data across structured and unstructured data, including PII, PCI, and secrets, across all data stores, including saas, IaaS, and on-prem environments.

    Permissions analysis: Easily understand effective permissions to reduce data exposure and compliance gaps, such as ex-contractors and guest users who still have unnecessary access.

    Threat detection & response: Monitor data activity and alert on data exfiltration attempts by insiders and malicious actors.

    Least privilege automation Safely eliminates data exposure from sharing links, stale permissions, and group memberships.

    Automated posture management: Find and fix misconfigurations, org-wide settings problems, and other critical security gaps.

    Core use cases:

    -Sensitive data discovery and classification -Compliance management -Least privilege automation -Insider risk management -Ransomware prevention -Data security posture management (DSPM) -SaaS security posture management (SSPM) -Cloud security posture management (CSPM) -Proactive incident response

    GETTING STARTED

    All Varonis products are free to try and come with an engineer-led data risk assessment. The platform can be deployed in minutes and populates insights instantly, giving you a comprehensive look at your data security posture and actionable steps to reduce data exposure.

    Request a risk assessment: https://info.varonis.com/en/demo-test-drive . For custom order configuration & volume pricing, please contact aws@varonis.com 

    Highlights

    • Unrivaled visibility into SaaS and IaaS platforms - Varonis applies consistent and highly accurate classification policies across your SaaS and IaaS platforms to identify where sensitive data lives in your environments. Varonis maps and normalizes granular permissions across platforms into a simple CRUDS model - pairing with sensitivity results to show you who has access and where data is exposed org-wide, publicly, and externally.
    • Enhanced data security posture management (DSPM) - Surface critical org-wide configuration gaps across your SaaS and IaaS platforms, and fix them with a simple click of a button. Use Varonis' customizable DSPM dashboards to continuously visualize and assess your data security posture and track progress over time. See where there are unnecessary pathways to data and monitor changes to risk over time so you can reduce threats to your sensitive data as your SaaS and IaaS environments evolve.
    • Near real-time threat detection - Monitor activity across your SaaS and IaaS platforms to detect suspicious or risky activity to protect your critical data from malicious actors with notifications on abnormal activity, unauthorized access, and risky misconfigurations. Use our highly detailed alerts to jumpstart your investigation and drill down into our granular audit trail of activity to perform cross-cloud forensic investigations.

    Details

    Sold by

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.
    Security credentials achieved
    (3)

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (17)

     Info
    Dimension
    Description
    Cost/12 months
    Varonis for AWS/S3/RDS IaaS
    DSPM coverage for AWS, S3, EC2 and RDS
    $750.00
    Varonis for Box
    DSPM coverage for Box
    $310.00
    Varonis for Salesforce
    DSPM coverage for Salesforce
    $310.00
    Varonis for Slack
    DSPM coverage for Slack
    $310.00
    Varonis for Google Drive
    DSPM coverage for Google
    $310.00
    Varonis for Okta
    DSPM coverage for Okta
    $310.00
    Varonis for Jira
    DSPM coverage for Jira
    $310.00
    Varonis for Github
    DSPM coverage for Github
    $310.00
    Varonis for Zoom
    DSPM coverage for Zoom
    $310.00
    Varonis for M365
    DSPM coverage for M365
    $400.00

    Vendor refund policy

    Please contact aws@varonis.com 

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    We offer premium support for customers with business hours support coverage through global phone contacts, email, and our worldwide community forum.
    https://www.varonis.com/support 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By Varonis
    By Obsidian Security, Inc.

    Accolades

     Info
    Top
    10
    In Data Security and Governance, Legal & Compliance
    Top
    10
    In Data Security and Governance
    Top
    100
    In Security

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    3 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Sensitive Data Discovery and Classification
    Automatically identifies and classifies sensitive data including PII, PCI, and secrets across structured and unstructured data stores in SaaS, IaaS, and on-premises environments using AI-powered automation.
    Permissions Analysis and Least Privilege Automation
    Maps and normalizes granular permissions across platforms into a CRUDS model to identify excessive access, eliminate stale permissions, and automatically reduce data exposure from sharing links and group memberships.
    Data Security Posture Management
    Continuously discovers and surfaces critical configuration gaps across SaaS and IaaS platforms with customizable dashboards to visualize security posture, track progress over time, and identify unnecessary data access pathways.
    Real-Time Threat Detection and Monitoring
    Monitors data activity across SaaS and IaaS environments to detect suspicious behavior, unauthorized access attempts, and data exfiltration by insiders and malicious actors with granular audit trail capabilities.
    Multi-Platform Coverage
    Provides automated data security and posture management across AWS, Box, Microsoft 365, Google, Salesforce, GitHub, Okta, Zoom, Jira, and Slack platforms from a single control point.
    Identity Threat Detection
    Active threat detection and neutralization for SaaS identities with spearphishing blocking and incident response capabilities
    Third-Party Integration Risk Management
    Discovery and governance of third-party integrations across SaaS applications with risk assessment and mitigation
    Data Movement Governance
    Monitoring and control of data movement between SaaS applications with visibility into data flows
    Application Posture Management
    Automated compliance enforcement, privilege reduction, and configuration drift prevention across SaaS platforms
    Unified SaaS Security Platform
    Integrated platform combining identity security, data governance, and application posture management in a single modular solution
    Cloud Access Security Broker
    Unified cloud access security broker (CASB) functionality providing visibility and control over access to managed and unmanaged cloud services with conditional, granular policy enforcement.
    Secure Web Gateway
    Next generation secure web gateway (SWG) capabilities delivering comprehensive threat protection for cloud and web services with context-aware access control.
    Data Loss Prevention
    Data-at-rest and data-in-motion inspection with DLP violation detection, malware scanning in cloud storage, and data exfiltration prevention to unmanaged cloud infrastructure.
    Cloud Infrastructure Monitoring
    Continuous security assessment monitoring of cloud infrastructure for risky misconfigurations including data exposure across AWS and other cloud providers with inventory and configuration visibility.
    Compliance and Remediation Automation
    Pre-defined compliance profiles aligned with CIS, PCI, and NIST standards, advanced RBAC, scheduled reporting, alert notifications, exception handling, and automated remediation capabilities accessible via REST APIs.

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    -
    -
    -
    No security profile
    No security profile

    Contract

     Info
    Standard contract
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.4
    83 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    65%
    31%
    2%
    1%
    0%
    1 AWS reviews
    |
    82 external reviews
    External reviews are from G2  and PeerSpot .
    Lovekesh Malik

    Data security posture has improved and platform manages access and behavior analytics effectively

    Reviewed on Mar 24, 2026
    Review provided by PeerSpot

    What is our primary use case?

    I mainly use Varonis Platform  to identify the overall security posture of an organization from a data security point of view. When you want to understand where exactly the critical data resides, it functions as a discovery tool. From an initial point, you can see where exactly the data resides. With that capability, it can also allow you to put a restriction if there is an open base. Overall, if you want to check your data from an initial point of view, Varonis Platform  is the best use case you can consider.

    What is most valuable?

    The functions of Varonis Platform that I appreciate the most include the data transport engine, which is something I haven't seen in other DSPM tools. This engine allows you to move your stale data to an archive location in an automated solution that requires nothing from you. It is pre-filled and happens in the background, moving your data whenever required. This functionality has been coded into the platform itself.

    I do use the data classification feature in Varonis Platform, and it is indeed useful because of the dictionaries, pre-built features, and custom classifiers it has, which is commendable. It also gives you the capability to write regex if you wanted. In comparison to Purview , I would rate it in second place, with Purview  being the top one.

    My opinion about the ML-based threat detection capabilities in Varonis Platform is that it doesn't have its own ML. What they did was integrate with Co-pilot as an extended feature. From the organization's perspective, organizations can simply do the scanning and everything from Co-pilot itself rather than going to the tool itself. From an AI use case, the threat intelligence covers more gaps and can detect an anomaly from a user perspective. If a person has regularly been using a particular folder, it detects those patterns. Earlier, an analyst would have had to write those rules, but now AI and ML in the system can actually detect those anomalies.

    User behavior analytics in Varonis Platform is helpful for my company's security posture. UBA  is an excellent feature and a classic example of integrating AI with the data security posture. There would be many actions done from a user end that you cannot treat manually. The AI capability and user behavior analytics understand how exactly a user is working on a day-to-day basis and how it normally goes. If there is anything abnormal, it should trigger an alert or an automated response action, which Varonis Platform has this capability inside the data alert module.

    What needs improvement?

    The potential areas of improvement I see for Varonis Platform are that it doesn't have a SIEM  or SOAR  console where you can see your incidents or a native style incident case management where you can see all your incidents and do the tracking of all those things. The endpoint part is also missing in Varonis Platform. It cannot inspect the DLP  things. For example, when somebody is trying to print something, Varonis Platform cannot block that action. That is also one major use case that I see is missing from Varonis Platform.

    For how long have I used the solution?

    I have been working with the solution for about seven years.

    How are customer service and support?

    I would rate the technical support from the vendor between six and seven. I rate the technical support at this level because there are times when people are not skillful enough to understand the issue. You need to speak to them again and again and let them know about the process and what exactly the issue is. Then they understand and conduct what I would call an inside connect investigation. They do a lot of investigation and then come back to us. This takes a lot of time. The matter of how much time it will take is something I wish was faster, as sometimes you need a quick response. However, I do get my resolution every time.

    How was the initial setup?

    Varonis Platform's initial setup is simple because whatever the requirements are for implementing a solution inside an organization, all those features are enabled. A service account is required to navigate through the platform, which I believe is ultimately the same for each tool for their agent to run on. The setup is not complicated.

    What other advice do I have?

    The main benefits for me as an end user of Varonis Platform include its excellent performance from a security point of view. There is also a very good feature in its capability for basic IAM  features where you can manage the ownership and file permissions. Earlier, you had to go into that particular folder to manage it, but now from Varonis Platform, you only have to go inside the console and see where exactly the open areas are and conduct those IAM  activities rather than using a classical IAM  tool such as Active Directory or an intranet. This means all you can do is just access it from Varonis Platform, which is a classical benefit I have received. I rate this product as an eight overall.

    Sunday O.

    Actionable Data Visibility That Accelerates SOC Investigations

    Reviewed on Feb 10, 2026
    Review provided by G2
    What do you like best about the product?
    The biggest value is the deep visibility into data access and user behavior across file shares, cloud storage, and sensitive repositories. The platform makes it easy to identify overexposed data, excessive permissions, and abnormal access patterns that would otherwise go unnoticed. The alerting, audit trails, and behavioral analytics significantly improve our incident response time and help us quickly investigate insider risk, ransomware activity, and data exfiltration attempts. It provides actionable insights rather than just raw logs, which saves time for the SOC team.
    What do you dislike about the product?
    Initial deployment and tuning can be resource intensive, especially in large or complex environments. Some alerts require careful baselining to reduce noise, and reporting customization can take time to master. Improvements in dashboard flexibility and faster onboarding for new admins would make the platform even more efficient.
    What problems is the product solving and how is that benefiting you?
    Varonis gives our security team visibility into who is accessing sensitive data, what they are doing with it, and whether the activity is normal or risky. It helps us quickly identify excessive permissions, exposed shares, insider threats, and abnormal behavior that could indicate data exfiltration or ransomware. Instead of manually reviewing logs across multiple systems, we get centralized alerts, audit trails, and actionable context, which significantly reduces investigation time and improves our incident response effectiveness.
    Retail

    Accurate Sensitive Data Detection, but Pricing Can Strain Larger Budgets

    Reviewed on Jan 28, 2026
    Review provided by G2
    What do you like best about the product?
    Varonis has come a long way from 15 years ago when I was using it to detect credit numbers. It is easy to roll out and their detection mechanisms are very accurate. Varonis helps manage and monitor non-structured data to determine if documents contain sensitive data and need to be moved to provide better protection.
    What do you dislike about the product?
    I feel Varonis is a bit expensive, and if you have a large footprint, it may put some added stress on your budget.
    What problems is the product solving and how is that benefiting you?
    Within our PII environment, we needed to better identify where associates were storing data and what PII data that were keeping in different types of documents.
    Mechanical or Industrial Engineering

    Varonis: Powerful Data Security with Automated Discovery, Classification, and Fast Support

    Reviewed on Jan 27, 2026
    Review provided by G2
    What do you like best about the product?
    We’ve been using Varonis for a ove a year in our mid-size environment, and find its it’s one of the strongest tools we have for data security. What function s stands out most are how easily it is to automatically discovers and classifies sensitive data across our environment (we use it on prem and in the cloud) and flags risks before they become issues and it's use in investigative processes. It has significantly reduced the amount of manual investigation required and has materially lowered our overall exposure.

    Ease of Use:
    Pretty good once you get past the initial learning curve. The dashboards are clean, the visuals are intuitive, and you don’t need to be a power user to get meaningful insights. Also the onboading team will walk you through the process. 8/10

    Ease of Implementation:
    Implementation will takes a few weeks, especially when scanning large data sets, but the documentation and professional services support make it manageable. Starting small and expanding gradually worked well for us and avoided a painful “big bang” rollout. 7/10

    Customer Support:
    Excellent. Response times are quick, and the support team is knowledgeable and genuinely invested in helping you succeed. It feels more like working with a partner than a vendor. 10/10

    Frequency of Use:
    Daily. Between alerts, dashboards, and reporting, it’s fully embedded into our security and operations workflow.

    Number of Features:
    Very feature-rich without feeling bloated. Data classification, access remediation, threat detection, and automated cleanup all work together well. We’ve seen a noticeable reduction in our attack surface. 9/10

    Ease of Integration:
    Integrates cleanly with Active Directory, AWS, and our SIEM. The available connectors and APIs are straightforward, and we didn’t run into major integration challenges. 8/10
    What do you dislike about the product?
    The setup process is not something that happens at once. You'll configure the application, integrate it, and then it scans the data. Depending on the size of your data set, this scanning can take a few hours, days or a week or more. This wasn't an issue, and the process went clean, but you'll have others (Management, etc) hoping to see immediate results. You'll see more and more data appear on the dashboard each day, but you'll need to let them know that the scan will take some time.
    What problems is the product solving and how is that benefiting you?
    One place to monitor alerts and events on my on-prem and cloud based data. We have setup rules that we were not able to do within our SIEM for alerts, and Varonis also allows you to configure automated responses (such as endpoint disconnect, removal of shares, or disabling of user account). We needed a classification system, but I use it more for security and monitoring than I would have expected.
    Jorge G.

    High Visibility and Exceptional Support

    Reviewed on Dec 01, 2025
    Review provided by G2
    What do you like best about the product?
    I greatly appreciate the ease of use of the Varonis Data Security Platform, as its environment is quite interactive and provides a clear visualization, which significantly facilitates the operation of the platform. Additionally, the ease of integration is excellent, as the tool offers a detailed step-by-step guide on how to integrate with various environments, which greatly simplifies the process. Customer support is also a strong point for me, being extremely interactive; conversations flow quickly and objectively, demonstrating the efficiency and readiness of the support team in resolving the issues presented.
    What do you dislike about the product?
    During the time of use, what made it most difficult was the removal of some features without prior notice. We had some automations and reports configured in the environment, and due to changes in the platform, they were removed.
    What problems is the product solving and how is that benefiting you?
    The Varonis Data Security Platform solved the lack of visibility in Active Directory and File Server, allowing you to configure remediations for breaches in the environment.
    View all reviews