Resources

How Cognoa Improved Data Management Practices for AI-Based Medical Diagnostics with Immuta
As an intangible asset, data is not physically restrained. But data localization laws are changing that notion. The number of global data localization laws...

How Immuta Enables Zero Trust Architectures
Traditional perimeter-based information security can no longer offset the safety risks posed by work-from-home models...

The Ultimate Guide to Data Security for Financial Services
In the Financial Services (FS) industry, data is leveraged constantly in order to derive the...

Building an Agile Data Stack for the Top Data Use Cases
Regardless of size, geography, or industry, organizations are all facing a similar challenge: how to...

Gartner® Report: Innovation Insight for Data Security Platforms
According to this Gartner® report, “at least 70% of data security platform (DSP) expenditure will...

Immuta at Snowflake Summit 2022

Organisational Shifts to Becoming More Data-Driven Now Require a Dynamic Data Governance, Access and Control Strategy
Nearly all European organisations consider a digital-first strategy crucial to achieving business results. Still, less...

Immuta Walkthrough Demo with Snowflake
With our click-through demo, you’ll get to experience step-by-step how to: Connect data sources to...

Immuta Walkthrough Demo with Databricks
With our click-through demo, you’ll get to experience step-by-step how to: Connect data sources to...

How to Design and Implement a Governance, Risk, and Compliance Framework for Enterprise Data Analytics
Designing and implementing a data governance framework that supports data analytics is far from intuitive,...

How WorldQuant Predictive Gives Organizations an AI Decision-Making Edge
Learn how Worldquant Predictive: Gave customers a competitive decision-making advantage during the COVID-19 pandemic by...

How One of the World’s Top Streaming Services Scaled Data Access
Learn how one of the world’s top streaming services: Automated data classification and enforcement across...

How LMI Accelerates Speed to Data Access for Government Agencies with Immuta
Learn how LMI: Increased time to data by 10X, giving users fast and easy access...

How J.B. Hunt Is Driving Freight Transportation Into the Future
Learn how J.B. Hunt: Increased permitted use cases for cloud analytics by 100% with Immuta...

How Billie Simplifies Data Access and Fuels Growth with Immuta
Learn how Billie: Accelerated the time needed to grant proper access to sensitive data in...

How a Top Manufacturer Unlocked Employee Data for HR Analytics
Learn how a top manufacturer: Unlocked up to 80% of HR data for analytics Reduced...

How a Top Bank Saved $50M by Automating Data Access Controls
Learn how one of the world’s top banks used Immuta to: Streamline data use across...

Data Protection by Process: How to Operationalize Data Protection by Design for Machine Learning
“The GDPR has been criticized by many for being too high-level or outdated and therefore...

Immuta’s GDPR Compliance Playbook
The EU’s General Data Privacy Protection Regulation (GDPR) is a sweeping set of privacy regulations...

A Guide to the EU’s Unclear Anonymization Standards
The EU’s General Data Protection Regulation (GDPR) is among the most influential data privacy laws...

GigaOm Data Access Control Report: Immuta ABAC vs. Apache Ranger RBAC
GigaOm cloud data security report finds Immuta’s data access control 75X more efficient than Ranger’s....

How a Health Data Company Revolutionized Research on Sensitive Data with Immuta
Learn how a healthcare non-profit: Saved over $1 million annually in data engineering costs Simplified...

GigaOm Radar Report for Data Governance Solutions
In 2020, the Data Governance market was valued at $1.8 billion. By 2026, that number...

How Immuta Makes Life Easier for Data Architects
Data architects are facing a triad of challenges in the current state of analytics due...

DataOps Dilemma: Survey Reveals Gap in the Data Supply Chain
As the demand for data has grown — alongside constantly evolving rules and regulations dictating...

Snowflake Data Access Governance Guide with Immuta
But as cloud data workloads, regulations, and ecosystems evolve, managing data security at scale has...

Seven Steps for Migrating Sensitive Data to the Cloud: A Guide for Data Teams
Cloud migration doesn’t happen overnight, nor does it happen in a vacuum — it requires...

Large Global Bank Uses Data Controls for Electronic Trading Analytics
Learn how a top global bank achieved breakthrough results with Immuta: Reduced costs while increasing...

2022 Data Access & Analytics Trendbook
Where might the evolution of data access and analytics lead next? There’s no definitive answer...

RBAC vs. ABAC: Future-Proofing Access Control
With data-driven initiatives central to modern success, it’s incredibly important that this data is kept...

Databricks Data Access Governance Guide with Immuta
Sensitive data is the most valuable asset for analytics and data science. But if data...

How to Avoid the Challenges of Cross-Platform Data Access Governance
Within the next two years, 81% of organizations expect to be “primarily” or “entirely” cloud-based, and more...

Compliance Playbook: HIPAA Compliant AI
The Health Insurance Portability and Accountability Act (HIPAA) governs disclosure by medical providers in the...

Enabling Zero Trust for Data Analytics
Yet, as sensitive data use becomes more common, so too are ransomware attacks and state-sponsored...

Automated Data Access Control 101
Data science and data governance programs are inherently at odds. Data scientists need access to...

Best Practices Report: Modern Data Governance
“Data initiatives never live up to their full potential without appropriate governance behind it.” This...

2022 State of Data Engineering Survey
Emerging Challenges with Data Security & Quality Organizations have been investing in data science, analytics,...
Accelerating Data-Driven Insights with Data Mesh
Enterprise products and services create an ever-increasing amount of data, much of which is centered...

The Five Data Localization Strategies for Building Data Architectures
As an intangible asset, data is not physically restrained. But data localization laws are changing...

DBTA Report: Meeting the Growing Challenges of Data Security & Governance
Risks to data are at an all-time high, with the average data breach now costing...
Zero Trust for Federal Agencies
This Executive Order, and the subsequent memo M-22-09, outlined the federal government’s plans to implement...
Data Sharing Solutions Brief
Product professionals in every industry rely on data sharing to derive insights and maximize value...

Modern Data Governance: a Conversation with Immuta CEO Matt Carroll (Part 2)

Modern Data Governance: a Conversation with Immuta CEO Matt Carroll (Part 1)

The Ultimate Guide to Cloud Data Access Control in Snowflake
With Snowflake and Immuta, data teams are able to harness the power of the Snowflake...

The Guide to Enforcing Access Control Policies with Your Data Catalog’s Metadata
You’ve invested in a data catalog to reap the benefits of self-service data discovery and...

The Ultimate Guide to Cloud Data Access Control in Databricks
J.B. Hunt saved $2.7M in infrastructure costs and productivity gains. WorldQuant Predictive enabled secure data...

How Immuta Makes Life Easier for Data Architects
Data architects are facing a triad of challenges in the current state of analytics due...

IAG Customer Testimonial
Watch this video to learn how Dave Abrahams, Executive General Manager of Data at IAG,...

A Data Protection Grammar
The data protection landscape is complex and constantly evolving. Most organizations’ data exists in multiple...
Data Access Controls for Mergers & Acquisitions
Merger and acquisition processes are one of the primary ways that firms can quickly increase...
Injecting Software Engineering Practices and Rigor into Data Governance
The Data Exchange Podcast: Steve Touw on why data governance needs to go from the...

Databricks and Immuta: Data Security for Financial Services

Aggregation, Synthesisation, and Anonymisation: A Call for a Risk-Based Assessment of Anonymisation Approaches
The data transformation process is not trivial, and assessing its outputs can be equally complex....

The Technical Fix for International Data Transfers: A Word of Caution
In today’s interconnected world, data sharing has never been more essential. So, when the EU’s...

Beyond Cosmetic Compliance in Data Analytics: A Guide to CPRA
Research shows that more than 90% of organizations are subject to one or more data...

Implementing & Auditing ICD 501 Using Immuta
As sensitive data’s role in the intelligence community (IC) becomes more prominent, protecting that data...

Why a Good Additional Technical Safeguard is Hard to Find
A recent ruling by the Court of Justice of the European Union (CJEU) essentially made...

Applying Access Controls Across Multiple Cloud Services
Immuta Data Engineering Survey: 2021 Impact Report
We’re on the verge of a perfect storm for modern data access governance. As organizations...

The Guide to Reducing Re-Identification Risk with Data Masking
Data privacy techniques, while thorough and advanced, are often not sufficient to ensure privacy on...

RBAC vs. ABAC: Future-Proofing Access Control
With data-driven initiatives central to modern success, it’s incredibly important that this data is kept...

RBAC vs. ABAC: Future-Proofing Access Control
With data-driven initiatives central to modern success, it’s incredibly important that this data is kept...

Demystifying Legal Automation
Legal automation is usually regarded with suspicion. When a law enforcement process substitutes a technological...

Layers of Trust
Data security is a driving force, particularly for organizations making the move from on-premises databases...

Is RBAC Still Working for Your Organisation?
Is role-based access control (RBAC) still working for you? Or are you starting to hit...

Warning Signs: The Future of Privacy and Security in the Age of Machine Learning
Originally released in partnership with The Future of Privacy Forum (FPF), this paper: Presents a...

How to Enhance Privacy in Data Science
In the last two decades, the ability to collect personal information on individuals has opened...
Data Protection by Design and Data Analytics: Can We Have Both?
In her second article for the Privacy & Data Protection Journal, Immuta’s Senior Privacy Counsel...

Why Homomorphic Encryption Alone is Security, Not Privacy
Steve Touw, Immuta co-founder and CTO, addresses the critical and nuanced differences between privacy and...

Why Differential Privacy Should Be Top of Mind for Data Science and Governance Teams
In this paper, Sophie Stalla-Bourdillon, a leading expert on the EU GDPR and Senior Privacy...
Immuta & Data Protection by Design: Making the GDPR Work for Your Data Analytics Environments
Data Protection by Design (DPbD) is the core data protection requirement in the General Data Protection...

Immuta Wins 451 Research Innovation Award
Immuta has been named a “451 Firestarter” by leading technology research and advisory firm 451...

Anonymizing Personal Data: Where Do We Stand Now?
In this exclusive Privacy & Data Protection Journal article, Sophie Stalla-Bourdillon, Senior Privacy Counsel and...
Compliance Playbook: HIPAA Compliant AI
The Health Insurance Portability and Accountability Act (HIPAA) governs disclosure by medical providers in the...

Beyond Explainability: A Practical Guide to Managing Risk in Machine Learning Models
Can enterprises govern machine learning at scale? As organizations continue to adopt innovative technologies, traditional...

Immuta’s GDPR Compliance Playbook
Achieving GDPR compliance doesn’t have to be a challenge. The EU’s General Data Privacy Protection...

Automating GDPR for Data Science and Advanced Analytics
This solution sheet details how Immuta provides the most advanced data protection policies on the...

Sample Memo: GDPR-Compliant Data Usage for a Data Science Team
Immuta makes it incredibly easy to comply with a range of complex regulatory regimes. This...