Resources
The AI Security & Governance Report
Compliance, privacy, and ethics have always been top priorities for data-driven organizations. But as generative AI advances open new doors and opportunities for innovation,...
How Immuta and Hakkōda Empower Data Sharing in Healthcare & Life Sciences
In this video, Matt Dubay, Director of Client Services for Healthcare and Life Sciences at...
Balancing Speed, Compliance, & Ethics with Life Sciences Data
Data use in the life sciences industry is essential, but highly dependent on data security...
Podcast: Unlocking the Power of Data Sharing with Paul Rankin
Data sharing isn’t a nice-to-have in today’s data-driven world – in order to compete, it’s...
Podcast: Overcoming Data Governance Challenges with Paul Rankin
As companies grow, their demands for data also grow – often exponentially, which may take...
How Snowflake and Immuta Bridge the Security-Utility Gap
From navigating complex data ecosystems to ensuring consistent data policy enforcement, data owners and stewards...
How Snowflake Ensures Governance & Security Throughout the Data Lifecycle
In the healthcare and life sciences industry, data is vital – but so is privacy...
The AI Security & Governance Handbook
As companies race to adopt AI, the question of how to adequately secure its inputs...
How Immuta Enables Media & Entertainment Use Cases
Media and entertainment are central to today’s culture – the leading companies are worth hundreds...
How nib Group Enforces Data Security and Privacy Policies with Immuta
As a leader in health and medical insurance for more than 6 million customers across...
The Importance of AI & Data Security in the Public Sector
Hear from Matthew Rose, Snowflake Industry Principal, Global Public Sector, about how Immuta and Snowflake...
How GM Mitigates Risk Through Data Governance
Hear from Shelly Washington Woodruff, Information Technology Executive at General Motors, about how her team...
DBTA Report: Data Governance & Security for the Cloud & AI Era
As AI and machine learning revolutionize industries, ensuring data security and integrity is paramount. But...
The Amazon S3 Security & Access Handbook
Amazon S3 is one of the most widely used and trusted cloud storage solutions, housing...
The Immuta Data Security Platform Demo
Want to see how the Immuta Data Security Platform works in just five minutes? In...
De-Risk Your Data Sharing
Data sharing is essential for any growth-oriented business, helping to maintain a competitive edge and...
Immuta + AWS for Financial Services
From banking and investing to wealth management and electronic trading, sensitive data is essential to...
Zero Trust at Scale – Data Pillar Demo
Accenture Federal Services built its Zero Trust at Scale asset using Immuta. Together, Accenture Federal...
How Immuta Supports Accenture Federal Services Zero Trust at Scale – Data Pillar
For federal agencies, protecting sensitive data isn’t just a matter of compliance – it could...
2024 Data Security Trendbook
Securing a Changing Data Landscape One of the most exciting aspects of our data-driven world...
Year in Review 2023
The past year saw the continued evolution of data, changing the way organizations approach...
Leadership Spotlight: How AstrumU Achieves Data Security & Compliance
How does a fast-moving startup deliver tailored insights while protecting personal data and complying with...
Immuta + Amazon S3 Overview
Amazon S3 is the most popular object storage platform in modern data stacks, with 340...
Hakkōda + Immuta for Healthcare Data Security
For organizations in the healthcare and life sciences (HCLS) industry, protecting sensitive data is critical....
2024 State of Data Security Report
Our 4th annual report surveyed 700+ data leaders for their perspectives on AI, data security,...
How Do I Integrate Snowflake Security With My Enterprise Security Strategy?
A Deep-Dive with phData and Immuta As we continue to rely increasingly on digital solutions,...
Deriving Value from Data at Scale with Hakkoda + Immuta
Ryan Tucker, Co-Founder and CRO at Hakkoda, shares how the Immuta + Hakkoda partnership enables...
Mitesh Shah Discusses Alation’s Partnership with Immuta
Mitesh Shah, VP of Market Strategy for Alation, discusses Alation’s partnership with Immuta and how...
Signposts on the Road to Data Eutopia – Starting the Journey
In part one of our webinar series Signposts on the Road to Data Eutopia, Editor...
Signposts on the Road to Data Eutopia – The New Rules of the Road
In part three of our webinar series Signposts on the Road to Data Eutopia, Editor...
Signposts on the Road to Data Eutopia – Avoiding the Traffic Jams
In part two of our webinar series Signposts on the Road to Data Eutopia, Editor...
Signposts on the Road to Data Eutopia – Hitting the Accelerator
In part four of our webinar series Signposts on the Road to Data Eutopia, Editor...
Data Security for Data Mesh Architectures
Growing in popularity in recent years, data mesh architectures promise a wide range of benefits...
How Roche Unlocks the Power of Data Through the Data Mesh
Hear from Paul Rankin, Head of Data Management Platforms at Roche Diagnostics, about how his...
IDC InfoBrief: How Data Security Platforms Improve Data Security Posture
Data security has never been more critical to business operations, but implementing it remains difficult...
Advancing Lifesaving Pharmaceutical Research & Development with Immuta
With more than 10,000 employees worldwide, this global pharmaceutical company takes a patient-first approach to...
AstrumU Revolutionizes Data Insights in Higher Education with Immuta
AstrumU is on a mission to enhance workforce development and quantify the value of education...
Sanjeev Mohan on The Role of the Data Security Platform in Modern Data Architectures
Learn what Sanjeev Mohan, Principal at SanjMo and former Gartner analyst, thinks about the growing...
Improving Ease of Use, Scalability, and Innovation for Snowflake Users
Vikas Jain, Senior Technology Alliances Manager at Snowflake, shares the specific ways in which he...
How Snowflake & Immuta Address Data Challenges in Healthcare & Life Sciences
Hear from Murali Gandhirajan, Healthcare and Life Sciences Field CTO at Snowflake, about how Snowflake...
Cross-Platform Policy Enforcement at Instacart: An Interview with Sanjeev Mohan & Kieran Taylor
Sanjeev Mohan, Principal and Founder at SanjMo, and Kieran Taylor, Senior Software Engineer at Instacart,...
How Immuta Simplifies Compliance with Quebec’s Law 25
Quebec’s Law 25 is the latest in a series of major data localization laws seeking...
Immuta + Unity Catalog: The Next Frontier of Scalable Data Security
The introduction of Databricks Unity Catalog gave Databricks customers a unified governance layer for data...
Thomson Reuters Secures Snowflake Data and Boosts Productivity
See how this information services provider: Increased data usage by 60x and drove greater productivity...
National Law Enforcement Agency Toughens Fight Against Crime with Immuta
See how this national law enforcement agency: Accelerated data delivery to its 7,000 employees working...
Australian Insurance Provider Strengthens Data Security to Better Serve 1.75M Customers
See how this insurance provider: Quickly onboarded more than 400 users and secured access to...
Swedbank Unlocks Data Analytics for Financial Services with Immuta
Data analytics in financial services is key to delivering tailored insights, forecasting market conditions, making...
How Pumpjack Dataworks is Increasing the Value of Fan Data
Learn how Pumpjack Dataworks: Accelerated time to data, insights, and market by automating sensitive data...
Data Security For Dummies
Data security is considered a must-have for modern organizations that want to compete with data...
Forrester Report: The Total Economic Impact™ of Immuta
In the world of data, time is money. What could you accomplish with more of...
Data Classification 101
The worlds of data security and privacy are converging. Efficiently implementing controls on sensitive data...
How to Comply with Australian Data Protection Law Using Immuta
The State of Australian Data Protection Law Australian data protection law is undergoing a sea...
Powering Your Snowflake Data Mesh with Immuta
The popularity of data mesh has skyrocketed in recent years thanks to its ability to...
Data Security Cannot be an Afterthought: A Panel with Alation, EY, Databricks, and Snowflake
Join leaders from Alation (Steve Neat, VP, EMEA), Databricks (Robin Sutara, Field CTO), EY (Oana...
Roche’s Federated Governance and Access Controls for Data Mesh
In this joint presentation, Paul Rankin (Head of Data Management Platforms, Roche Diagnostics) and Claude...
How Swedbank Unlocks Advanced Analytics
Head of Data Lake Engineering at Swedbank Vineeth Menon discusses how Swedbank partnered with Immuta...
2023 Data Access & Security Trendbook
Modern data use can be a complex process, requiring multifaceted tech stacks, adept teams of...
Self-Service Analytics for Data Mesh in the Public Sector
In the past decade, the enactment of both the Data Act and the Evidence-Based Policy...
GigaOm Report & Webinar: The Advantage of ABAC Over RBAC
When it comes to data policies, less is more. Static role-based access controls that require...
How to Protect Sensitive Data: A Panel with EY, Immuta, Databricks, & Alation
Sensitive data usage is ubiquitous in today’s world – from electronic health records to online...
What IAG’s Data Transformation Can Tell Us About Cloud Security
What Is a Data Transformation? Data transformation is the process of converting, restructuring, or manipulating...
nib Group’s Journey to Building a Modern Tech Stack
Building a modern tech stack that’s equipped for speed and scale is not trivial. All...
Thomson Reuters Customer Testimonial
Learn how Immuta’s Data Security Platform helps Peter Jacob, VP of Data Lake at Thomson...
2023 State of Data Engineering Survey
Amid explosive growth in data users and products, high profile data breaches, and rapidly evolving...
Why Automating Data Access Helps Thomson Reuters Gain Competitive Advantage
Hear how the Thomson Reuters team leverages the Immuta Data Security Platform to address their...
The Snowflake Data Security Guide
Security is a primary concern in most aspects of our lives – so why should...
The Data Policy Management Report
Data is an essential resource for most organizations today, yet policy management can be riddled...
Scaling Dynamic Policies at JPMorgan Chase
Yarik Chinskiy, Chief Architect of JPMorgan Chase & Co., talks about how his company is...
The Ultimate Guide to Data Privacy in Healthcare and Life Sciences
For Healthcare and Life Sciences (HLS) organizations, data plays a critical role in providing the...
Five Best Practices for Data Security in Modern Cloud Platforms
How secure is your data? Despite data security and privacy ranking among the top data...
Best Practices for Securing Sensitive Data: A Guide for Data Teams
Data security strategies and tactics are not one-size-fits-all. The resources needed to protect sensitive data...
Data Masking 101: A Comprehensive Guide
Organizations have both a legal and ethical responsibility to protect sensitive data. According to various...
How Immuta Enables a Zero Trust Architecture
Traditional perimeter-based information security can no longer offset the safety risks posed by work-from-home models...
The Ultimate Guide to Data Security for Financial Services
In the Financial Services industry, data is leveraged constantly in order to derive the most...
Building an Agile Data Stack for the Top Data Governance Use Cases
Regardless of size, geography, or industry, organizations are all facing a similar challenge: how to...
Immuta at Snowflake Summit 2022
Becoming More Data-Driven Now Requires a Dynamic Data Governance Strategy
Nearly all European organisations consider a digital-first strategy crucial to achieving business results. Still, less...
Take a Product Tour of Immuta with Snowflake
With our product tour, you’ll get to experience step-by-step how to: Connect data sources to...
Immuta Self-Guided Demo with Databricks
With our self-guided demo, you’ll get to experience step-by-step how to: Connect data sources to...
How to Build a Governance, Risk, and Compliance Framework for Enterprise Data Analytics
Designing and implementing a governance, risk, and compliance framework that supports data analytics is far...
How WorldQuant Predictive Gives Organizations an AI Decision-Making Edge
Learn how Worldquant Predictive: Gave customers a competitive decision-making advantage during the COVID-19 pandemic by...
How One of the World’s Top Streaming Services Scaled Data Access
Learn how one of the world’s top streaming services: Automated data classification and enforcement across...
How LMI Accelerates Speed to Data Access for Government Agencies with Immuta
Learn how LMI: Increased time to data by 10X, giving users fast and easy access...
How J.B. Hunt Is Driving Freight Transportation Into the Future
Learn how J.B. Hunt: Increased permitted use cases for cloud analytics by 100% with Immuta...
How a Top Bank Saved $50M by Automating Data Access Controls
In the world of financial services, two factors are non-negotiable: efficiency and security. As one...
How to Operationalize Data Protection by Design for Machine Learning
“The GDPR has been criticized by many for being too high-level or outdated and therefore...
Immuta’s GDPR Compliance Playbook
The EU’s General Data Privacy Protection Regulation (GDPR) is a sweeping set of privacy regulations...
A Guide to EU Data Anonymization Standards
The EU’s General Data Protection Regulation (GDPR) is among the most influential data compliance laws...
GigaOm Data Access Control Report: Immuta ABAC vs. Apache Ranger RBAC
GigaOm cloud data security report finds Immuta’s data access control 75X more efficient than Ranger’s....
How Immuta Unlocked Public Health Data Analysis for a Non-Profit
Public health data analysis can be complicated due to the volume of sensitive information involved....
How to Make Life Easier for Enterprise Data Architects
Enterprise data architects are facing a triad of challenges in the current state of analytics...
Data Governance & Management Report: The Data Supply Chain
The Growing Complexity of Data Governance & Management As the demand for data has grown...
Securing the Snowflake Data Cloud with Immuta
As cloud data workloads, regulations, and ecosystems evolve, managing data security at scale can be...
Seven Steps for Migrating Data to the Cloud
Migrating data to the cloud doesn’t happen overnight, nor does it happen in a vacuum...
How a Global Bank Secures Electronic Trading Analytics
Electronic trading analytics are crucial to financial services firms’ success, by providing real-time insights into...
2022 Data Access & Analytics Trendbook
Where might the evolution of data access and analytics lead next? There’s no definitive answer...
RBAC vs. ABAC: Future-Proofing Access Control Models
Is the access control model you choose really that important? It turns out, the answer...
A Guide to Databricks Data Governance & Security with Immuta
Sensitive data is the most valuable asset for analytics and data science. But if data...
How to Avoid the Top Data Access Governance Challenges
The vast majority of organizations – an estimated 90% – now leverage a multi-cloud architecture...
HIPAA Security Compliance Playbook
The Health Insurance Portability and Accountability Act (HIPAA) governs disclosure by medical providers in the...
Enabling a Zero Trust Model for Data Analytics
For organizations in the public and private sectors, zero trust is the future of data...
Data Security & Access Control 101
Data access control regulates and restricts the access, permissions, and privileges granted to users or...
TDWI’s Modern Data Governance Best Practices Report
What Is Modern Data Governance? Modern data governance refers to a framework that orchestrates an...
2022 State of Data Engineering Survey
Emerging Challenges with Data Security & Quality Organizations have been investing in data science, analytics,...
Accelerating Data-Driven Insights with Data Mesh
Enterprise products and services create an ever-increasing amount of data, which becomes part of every...
The Five Data Localization Strategies for Building Data Architectures
As an intangible asset, data is not physically restrained. But data localization laws are changing...
DBTA Report: Meeting the Growing Challenges of Data Security & Governance
Risks to data are at an all-time high, with the global average data breach now...
Zero Trust Solutions for Federal Agencies
This Executive Order, and the subsequent memo M-22-09, outlined the federal government’s plans to implement...
The Keys to Enterprise Digital Transformation with Immuta & Intel
An enterprise digital transformation refers to the integration of digital technologies and strategies into all...
Managing Modern Data Infrastructure: A Conversation with Immuta & Intel
As organizations migrate to the cloud, the way we think about data and how it’s...
The Ultimate Guide to Cloud Data Access Control in Snowflake
With Snowflake and Immuta, data teams are able to harness the power of the Snowflake...
The Guide to Enforcing Access Control Policies with Your Data Catalog’s Metadata
You’ve invested in a data catalog to reap the benefits of self-service data discovery and...
The Databricks Security & Access Handbook
J.B. Hunt saved $2.7M in infrastructure costs and productivity gains. Swedbank doubled its number of...
How IAG Scales Secure Insurance Data Management with Immuta
Insurance Australia Group (IAG) is Australia and New Zealand’s largest general insurance company, with more...
A Data Protection Grammar
The data protection landscape is complex and constantly evolving. Most organizations’ data exists in multiple...
Injecting Software Engineering Practices and Rigor into Data Governance
The Data Exchange Podcast: Steve Touw on why data governance needs to go from the...
Databricks and Immuta: Data Security for Financial Services
Aggregation, Synthesisation, and Anonymisation: A Call for a Risk-Based Assessment of Anonymisation Approaches
The data transformation process is not trivial, and assessing its outputs can be equally complex....
The Technical Fix for International Data Transfers: A Word of Caution
In today’s interconnected world, data sharing has never been more essential. So, when the EU’s...
Beyond Cosmetic Compliance in Data Analytics: A Guide to CPRA
Research shows that more than 90% of organizations are subject to one or more data...
Implementing & Auditing ICD 501 Using Immuta
As sensitive data’s role in the intelligence community (IC) becomes more prominent, protecting that data...
Why a Good Additional Technical Safeguard is Hard to Find
A recent ruling by the Court of Justice of the European Union (CJEU) essentially made...
Applying Access Controls Across Multiple Cloud Services
Immuta Data Engineering Survey: 2021 Impact Report
We’re on the verge of a perfect storm for modern data access governance. As organizations...
Why LMI Securely Controls Data Access with Immuta
Hear from Josh Wilson, VP of Advanced Analytics at LMI, on how Immuta helped his...
How to Securely Use De-Identified Health Information
In today’s data ecosystem, threats are abundant. From unintentional data leaks to orchestrated external attacks,...
Demystifying Legal Automation
Legal automation is usually regarded with suspicion. When a law enforcement process substitutes a technological...
Layers of Trust
Data security is a driving force, particularly for organizations making the move from on-premises databases...
Warning Signs: The Future of Privacy and Security in the Age of Machine Learning
Originally released in partnership with The Future of Privacy Forum (FPF), this paper: Presents a...
How to Enhance Privacy in Data Science
In the last two decades, the ability to collect personal information on individuals has opened...
Why Homomorphic Computing Alone is Security, Not Privacy
Steve Touw, Immuta co-founder and CTO, addresses the critical and nuanced differences between privacy and...
Immuta & Data Protection by Design: Making the GDPR Work for Your Data Analytics Environments
Data Protection by Design (DPbD) is the core data protection requirement in the General Data Protection...
Immuta Wins 451 Research Innovation Award
Immuta has been named a “451 Firestarter” by leading technology research and advisory firm 451...
Anonymizing Personal Data: Where Do We Stand Now?
In this exclusive Privacy & Data Protection Journal article, Sophie Stalla-Bourdillon, Senior Privacy Counsel and...
Beyond Explainability: A Practical Guide to Managing Risk in Machine Learning Models
Can enterprises govern machine learning at scale? As organizations continue to adopt innovative technologies, traditional...
Automating GDPR for Data Science and Advanced Analytics
This solution sheet details how Immuta provides the most advanced data protection policies on the...