drj logo

"*" indicates required fields

Name*
Zip Code*
Please enter a number from 0 to 100.
Strength indicator
I agree to the Terms of Service and Privacy Policy*
Yes, of course I want to receive emails from DRJ!
This field is for validation purposes and should be left unchanged.

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

x
DRJ Fall 2025 Dallas Show
Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Why Subscribe to DRJ
    • Digital Edition
    • Article Submission
    • DRJ Annual Resource Directories
    • Article Archives
    • Career Spotlight
  • EVENTS
    • DRJ Fall 2025
    • DRJ Spring 2026 Call for Papers
    • DRJ Scholarship
    • Other Industry Events
    • Schedule & Archive
    • Send Your Feedback
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • DRJ ACADEMY
    • DRJ Academy
    • Beginner’s Guide to BC
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • Business Resilience Decoded
    • DRJ Glossary of Business Continuity Terms
    • Careers
  • ABOUT
    • Advertise with DRJ
    • DEI
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • Glossary Committee
      • Rules and Regulations Committee
  • Podcast

Panzura Symphony Delivers First-of-Its-Kind Solution to Combat Permission Sprawl and Fuel AI Readiness

by Jon Seals | July 1, 2025 | | 0 comments

Symphony Hunts Down, Monitors, and Automatically Fixes File Permissions, Slashing Risk Exposure and Laying Groundwork for AI Initiatives in the Enterprise

SAN FRANCISCO – Panzura has introduced Access Control List (ACL) analysis and automated remediation to the Symphony data services platform, addressing the trillion-dollar global crisis of permission sprawl that affects 58% of enterprises and hinders artificial intelligence (AI) readiness. 

This first-of-its-kind capability, which no other provider offers, significantly expands Symphony’s comprehensive “any to any” data management and orchestration across the broad array of modern enterprise file and object storage environments. 

Unlike currently available file data security tools that simply react to incidents, Symphony continuously tracks down, monitors, and automatically fixes bloated permissions before they can be exploited by malicious actors. This slashes risk exposure and allows IT teams to report on and prove compliance with regulations, service level agreements (SLAs), and board-level mandates. 

Permission sprawl is a real and present epidemic that reaches into every corner of the enterprise, with 74% of data breaches involving privileged credential abuse. Because sysadmins and security teams can’t see – nor easily resolve – overly permissioned files, the average organization has more than 802,000 data files at risk due to oversharing. This figure is accelerating year-over-year by 34%. 

A recent report revealed the staggering scale of the problem with 91% of employees still having access to company files since offboarding. The financial impact is also alarming, with the average cost per insider incident reaching $16.2 million. These issues stem from multiple factors including the proliferation of shadow IT, inability to control excessive or unrevoked access, shared credentials, and complex organizational changes from mergers, acquisitions, and restructuring. 

The stakes have never been higher as AI exponentially amplifies the problem. While files buried deep within directory structures may be challenging for users to locate, large language models (LLMs) can surface sensitive data to users with inappropriate permissions in seconds. Analysts estimate that 80% of organizations seeking to scale their digital business will fail without modern data governance. 

“Manual permission audits are a nightmare – teams are constantly chasing inheritance chains, investigating anomalies, and trying to resolve violations. Automated remediation is the difference between organizational chaos and strategic control. It delivers the precision that separates leaders from the 80% that will fail,” said Sundar Kanthadai, Chief Technology Officer, Panzura. 

Revolutionary Approach to Data Governance 

Symphony now identifies and remediates anomalous permissions across entire file system estates regardless of the underlying infrastructure, providing full visibility into who can access what and enabling fast resolution of problematic access. The platform enables automated detection and mass permission changes, eliminating the need to deploy another limited toolset while reducing tool sprawl that creates IT friction and operational budget pressures. 

Beyond ACL remediation, Symphony provides the ability to apply custom metadata to files, enabling advanced policy automation and fueling AI pipelines based on file attributes without content scanning. Support has been extended to Windows Alternate Data Streams (ADS) and Extended Attributes (EA) for greater visibility and automation. 

Symphony provides actionable metadata insights, automating data movement between file systems, object stores, and cloud storage for petabyte-scale data orchestration, storage cost optimization, and AI workload placement. The platform uses and preserves metadata during data movement while simultaneously addressing challenges in permission hygiene and compliance – crucial for preparing the data landscape for AI initiatives. 

It ensures organizations are always audit-ready and compliant with regulations like GDPR, CCPA, SOX, and HIPAA. Unlike solutions that merely provide a global namespace without true access governance, Symphony orchestrates and optimizes file and object data across any infrastructure while ensuring data quality, accessibility, and proper categorization, delivering proactive security and compliance with clean, well-governed data. 

Features and Capabilities for Better Data Control  

In complex enterprise environments, managing file permissions – including Discretionary Access Control Lists (DACLs) and System Access Control Lists (SACLs) – has become a challenge for IT administrators and security teams. The core problems are orphaned files from deleted users, overly permissive ACLs, broken inheritance, and shadow IT. These issues create security risks, trigger compliance violations, and undermine operational efficiency.  

This latest Symphony release addresses challenges like broken permission inheritance, over-privileged access, and compliance blind spots. By adding rich metadata that can later be interpreted – including ownership and comprehensive ACLs – across the entire data environment, Symphony brings much-needed structure to unstructured data, offering a level of fine-grained control and automation often missing in legacy data movers. 

“Security through obscurity is no longer an option. The latest capabilities of Symphony specifically address the daily challenges sysadmins face in maintaining secure and compliant data storage and preparing data for AI workloads including agentic AI,” said Kanthadai. 

Administrators can access the platform through the Symphony AdminCenter – a centralized web-based interface for policy management, task scheduling, server monitoring, and file reporting. Alternatively, integration is straightforward with comprehensive ReST API, JDBC database support, and webhooks for seamless DevOps workflows. It also enables enterprises to crawl their systems, tag their data, report on the veracity of potential large language model (LLM) data, and offer categorized data for specific enterprise functions. 

See the Problem with Interactive ACL Analysis 

Interactive ACL Analysis in Symphony enables administrators to identify exactly where permissions change in the directory tree. This capability provides: 

  • Clear, drill-down views of complex permission inheritance 
  • Human-readable DACLs and SACLs with adjustable detail levels 
  • Change tracking from previous scans to spot potential suspicious activity 
  • Export to database, CSV, or JSON for further analysis 

Moving beyond identification, Symphony has introduced the capability to automatically remediate ACL anomalies with the Repair ACLs Policy. The system analyzes and repairs broken ACL inheritance for both DACLs and SACLs automatically using administrator-defined policies. This saves hundreds of hours of manual remediation while eliminating human error and is vital for maintaining permission symmetry where granted access rights precisely match actual business needs. Proactive remediation is a crucial differentiator for Symphony, moving beyond visibility to actual problem resolution that other solutions lack. 

Moreover, the platform retains previous report versions, improving auditing and historical analysis with clear records of permission states over time. This versioning capability allows each ACL scan to be compared to a previous scan, enabling trend analysis and supporting security audits and investigation while helping teams to demonstrate policy adherence. 

Enhancements Include Windows ADS & EA Management 

Symphony delivers enhanced handling of named metadata – like Windows ADS and EA – ensuring metadata preservation during data movement and enabling advanced policy automation through named metadata rule matching. It also provides flexible options for setting and managing EA values. Advanced metadata management provides a deeper level of data insight and control than found in solutions focused mostly on high-speed access. 

  • Dataset selection based on metadata presence or content 
  • Comprehensive EA reporting in Scan Policies 
  • Export to database, CSV, and JSON formats 
  • Set or remove EAs 
  • Set EA values directly from database and catalog sources 

New support for NetApp FlexGroup Volumes expands Panzura Symphony’s capabilities for large-scale, high-performance file system environments. This support enables Symphony to work with NetApp’s scale-out Network Attached Storage (NAS) solution, providing enhanced performance and scalability for enterprise file workloads. This increased scalability and performance directly supports the data demands of future AI workloads. 

The platform also includes support for IBM Storage Deep Archive for cold data, enabling on-premises archiving of massive datasets using an S3 Glacier compatible interface, saving customers on expensive cloud fees and egress charges. Moreover, policy-based data lifecycle management intelligently tiers and moves data based on business rules, regulatory mandates, and named metadata, ensuring data resides on the most cost-effective and resource-efficient storage infrastructure.  

These New Features are Available Now 

Symphony is immediately available to existing customers for both Enterprise and Insights editions of the platform through standard updates and to new customers through direct sales and Panzura’s global partner network. Comprehensive migration services and training programs ensure rapid time to value. Special “prep and production” pricing is available to reduce initial hurdles and allow organizations to lay the groundwork for their AI initiatives. 

Organizations seeking to transform their unstructured data governance posture can schedule a personalized demo of Symphony to see ACL analysis and automated remediation in action. Contact Panzura to speed up your journey toward intelligent, automated data security, and a foundation for AI innovation. 

About Panzura 

Panzura empowers modern enterprises to unlock the full potential of their unstructured data, aligning it with strategic business goals. Our solutions ensure data visibility, accessibility, and control, seamlessly preparing organizations for a digitally transformed, AI-driven future. With Panzura, organizations can enhance data resilience, optimize costs, and deliver data instantly to users and processes – anywhere, anytime. Discover how Panzura can drive your success at panzura.com. 

Panzura is a trademark or registered trademark of Panzura LLC in the U.S. and/or other countries. All other trademarks, registered trademarks and/or logos are the property of their respective owners.

Related Content

  1. NAS solutions for enterprise workloads
    NAS Solutions Ramp Up to Take on Today’s Enterprise Workloads
  2. Tips to Selecting the Right BaaS Solution to Protect Your IT Environment
  3. Disaster Recovery Journal
    Exhibitors Guide

Recent Posts

Abstract Security Delivers 4X Operational Efficiency at Juul Labs

July 9, 2025

Fortinet Report: OT Cybersecurity Risk Elevates within Executive Leadership Ranks

July 9, 2025

EGGER Group Achieves 99.99% Uptime Across Global Operations with SIOS LifeKeeper for Linux

July 9, 2025

Aligned’s Phoenix Data Center Earns Three Green Globes Certification

July 9, 2025

Portnox Unleashes Fast, Frictionless, Cloud-Native ZTNA

July 8, 2025

Blue Mantis to Empower Massachusetts Agencies with Advanced Cybersecurity Preparedness

July 8, 2025

Archives

  • July 2025 (15)
  • June 2025 (54)
  • May 2025 (59)
  • April 2025 (91)
  • March 2025 (57)
  • February 2025 (47)
  • January 2025 (73)
  • December 2024 (82)
  • November 2024 (41)
  • October 2024 (87)
  • September 2024 (61)
  • August 2024 (65)
  • July 2024 (48)
  • June 2024 (55)
  • May 2024 (70)
  • April 2024 (79)
  • March 2024 (65)
  • February 2024 (73)
  • January 2024 (66)
  • December 2023 (49)
  • November 2023 (80)
  • October 2023 (67)
  • September 2023 (53)
  • August 2023 (72)
  • July 2023 (45)
  • June 2023 (61)
  • May 2023 (50)
  • April 2023 (60)
  • March 2023 (69)
  • February 2023 (54)
  • January 2023 (71)
  • December 2022 (54)
  • November 2022 (59)
  • October 2022 (66)
  • September 2022 (72)
  • August 2022 (65)
  • July 2022 (66)
  • June 2022 (53)
  • May 2022 (55)
  • April 2022 (60)
  • March 2022 (65)
  • February 2022 (50)
  • January 2022 (46)
  • December 2021 (39)
  • November 2021 (38)
  • October 2021 (39)
  • September 2021 (50)
  • August 2021 (77)
  • July 2021 (63)
  • June 2021 (42)
  • May 2021 (43)
  • April 2021 (50)
  • March 2021 (60)
  • February 2021 (16)
  • January 2021 (554)
  • December 2020 (30)
  • November 2020 (35)
  • October 2020 (48)
  • September 2020 (57)
  • August 2020 (52)
  • July 2020 (40)
  • June 2020 (72)
  • May 2020 (46)
  • April 2020 (59)
  • March 2020 (46)
  • February 2020 (28)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (11)
  • October 2019 (36)
  • September 2019 (44)
  • August 2019 (77)
  • July 2019 (117)
  • June 2019 (106)
  • May 2019 (49)
  • April 2019 (47)
  • March 2019 (24)
  • February 2019 (37)
  • January 2019 (12)
  • ARTICLES & NEWS

    • Business Continuity
    • Disaster Recovery
    • Crisis Management & Communications
    • Risk Management
    • Article Archives
    • Industry News

    THE JOURNAL

    • Digital Edition
    • Advertising & Media Kit
    • Submit an Article
    • Career Spotlight

    RESOURCES

    • White Papers
    • Rules & Regulations
    • FAQs
    • Glossary of Terms
    • Industry Groups
    • Business & Resource Directory
    • Business Resilience Decoded
    • Careers

    EVENTS

    • Fall 2025
    • Spring 2025

    WEBINARS

    • Watch Now
    • Upcoming

    CONTACT

    • Article Submission
    • Media Kit
    • Contact Us

    ABOUT DRJ

    Disaster Recovery Journal is the industry’s largest resource for business continuity, disaster recovery, crisis management, and risk management, reaching a global network of more than 138,000 professionals. Offering weekly webinars, the latest industry news, rules and regulations, podcasts, the industry’s only official mentoring program, a quarterly magazine, and two annual live conferences, DRJ is leading the way to keep professionals up-to-date and connected in an ever-changing world.

    LEARN MORE

    LINKEDIN AND TWITTER

    Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

    Follow us for daily updates

    LinkedIn

    @drjournal

    Newsletter

    The Journal, right in your inbox.

    Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

    Subscribe Now
    Copyright 2025 Disaster Recovery Journal
    • Terms of Use
    • Privacy Policy