Informatica advances data security intelligence

Latest Informatica Secure@Source release solves complex enterprise data security challenges for cloud, data lakes and compliance.

  • 7 years ago Posted in
Informatica has ushered in modern data security intelligence with the addition of powerful and innovative data-focused user behavioral analytics to detect higher sensitive data risk and protect by orchestration of remediation capabilities to its award-winning data security offering, Informatica Secure@Source®.  
 
Seemingly every day, a new onslaught of fresh challenges to data security arise. This is, in part, because of the increasing proliferation of sensitive data in cloud and mobile environments, data lakes and other big data repositories. According to Gartner, “data security governance and the orchestration of data security policies across disparate data silos and platforms will be critical challenges for organisations during the next decade.[1]” The latest version of Secure@Source, dubbed “Detect and Protect,” brings next generation data security intelligence to bear on these cascading challenges by providing:
 
·         Automated and integrated sensitive data discovery, proliferation analysis, detection of anomalous user activities, multi-factor data risk analytics, and automated orchestration of remediation in a single platform.
·         Broad coverage across cloud, Hadoop and legacy environments.
·         Unique capabilities supporting diverse and complex data classifications, proliferation and risk analytics, user access and activity correlation, user behavior analytics (UBA) and orchestration support for a full range of data protection technologies.
 
Secure@Source helps businesses achieve several successful outcomes, including:
·         Reduced risk of data breaches and misuse through more proactive and intelligent sensitive data risk monitoring, investment prioritisation and protection,
·         Increased support for data privacy compliance mandates such as GDPR, HIPAA and FINRA, and
·         Low total cost of ownership due to a comprehensive single platform.
 
Intelligent detection and protection
Secure@Source provides the strongest set of detection and protection capabilities presently available to power the entire data security cycle. Secure@Source customers gain the ability to:
·         Know where sensitive data resides – Global visibility, classification, discovery and reporting of an enterprise’s sensitive data and where it is proliferating.
·         Recognise what is at risk – Continuous multi-factor risk scoring based on data sensitivity, protection status, risk cost and more, leveraging Informatica’s innovative interactive risk analytics technologies.
·         Understand who is using the data – Visibility into users with access to sensitive data, with usage monitoring and highly accurate anomalous behavior detection.
·         Orchestrate effective remediation actions – Risk-based remediation recommendations and orchestration of data security measures including dynamic or persistent data masking, encryption, blocking and other solutions from Informatica and third-party providers.
 
Secure@Source is part of Informatica’s family of data-centric security offerings for today’s data-centric world. Secure@Source recently was awarded a total of 11 medals, including a grand prize and five golds in Info Security Product Guide’s prestigious 2017 Global Excellence Awards program. This included medals for Risk Management, Innovation in Enterprise Security, Best Security Software, Cloud Security, UBA, Compliance, Data Lake Security (Best New Product) and more.
 
According to Gartner, “security spending on detection and response to attacks on systems and services must be refocused to monitor and protect applications and data. Security and risk management leaders should use data security governance to prepare risk-based security strategies and infonomics to reset budgets.
Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
73% of organizations lack automated patch management, and 62% experienced incidents involving...
Quest Software has signed a definitive agreement with Clearlake Capital Group, L.P. (together with...
Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to...
Aqua’s cloud native application protection platform becomes the only solution that protects cloud...
54% of organisations working on a security transformation project now or in the next 12 months.
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Zscaler Zero Trust exchange cloud-based architecture enables superior green security capabilities...