Resources

GigaOm Report & Webinar: The Advantage of ABAC Over RBAC
When it comes to data policies, less is more. Static role-based access controls that require new policies for each and every change within the...

Data Security for Data Mesh Architectures
Growing in popularity in recent years, data mesh architectures promise a wide range of benefits...

How Roche Unlocks the Power of Data Through the Data Mesh
Hear from Paul Rankin, Head of Data Management Platforms at Roche Diagnostics, about how his...

IDC InfoBrief: How Data Security Platforms Improve Security Posture
Data security has never been more critical to business operations, but implementing it remains difficult...

Advancing Lifesaving Pharmaceutical Research & Development with Immuta
To improve patient outcomes, scale cost efficiencies, and fuel drug development and innovation, this global...

AstrumU Revolutionizes Data Insights in Higher Education with Immuta
AstrumU is on a mission to enhance workforce development and quantify the value of education...

Sanjeev Mohan on The Role of the Data Security Platform in Modern Data Architectures
Learn what Sanjeev Mohan, Principal at SanjMo and former Gartner analyst, thinks about the growing...

Improving Ease of Use, Scalability, and Innovation for Snowflake Users
Vikas Jain, Senior Technology Alliances Manager at Snowflake, shares the specific ways in which he...

How Snowflake & Immuta Address Data Challenges in Healthcare & Life Sciences
Hear from Murali Gandhirajan, Healthcare and Life Sciences Field CTO at Snowflake, about how Snowflake...

Cross-Platform Policy Enforcement at Instacart: An Interview with Sanjeev Mohan & Kieran Taylor
Sanjeev Mohan, Principal and Founder at SanjMo, and Kieran Taylor, Senior Software Engineer at Instacart,...

How Immuta Simplifies Compliance with Quebec’s Law 25
Quebec’s Law 25 is the latest in a series of major data localization laws seeking...

Immuta + Unity Catalog: The Next Frontier of Scalable Data Security
How exactly does Immuta’s integration with Databricks Unity Catalog work? And more importantly, why do...

Thomson Reuters Secures Snowflake Data and Boosts Productivity
See how this information services provider: Increased data usage by 60x and drove greater productivity...

National Law Enforcement Agency Toughens Fight Against Crime with Immuta
See how this national law enforcement agency: Accelerated data delivery to its 7,000 employees working...

Australian Insurance Provider Strengthens Data Security to Better Serve 1.75M Customers
See how this insurance provider: Quickly onboarded more than 400 users and secured access to...

Swedbank Unlocks Advanced Data Analytics in the Cloud with Immuta
Learn how Swedbank: Saved 3x more time setting up data security and self-service policy authoring...

How Pumpjack Dataworks is Increasing the Value of Fan Data
Learn how Pumpjack Dataworks: Accelerated time to data, insights, and market by automating sensitive data...

Data Security For Dummies
Data security is considered a must-have for modern organizations that want to compete with data...

The Total Economic Impact™ of Immuta
In the world of data, time is money. What could you accomplish with more of...

Data Classification 101
The worlds of data privacy and security are converging. Efficiently implementing controls on sensitive data...

Immuta & Australian Prudential Standards
Financial services firms in Australia are facing increasing regulatory scrutiny as the Australian Prudential Regulation...

Powering Your Data Mesh with Snowflake & Immuta
The popularity of data mesh has skyrocketed in recent years thanks to its ability to...

Data Security Cannot be an Afterthought: A Panel with Alation, EY, Databricks, and Snowflake
Join leaders from Alation (Steve Neat, VP, EMEA), Databricks (Robin Sutara, Field CTO), EY (Oana...

Roche’s Federated Governance and Access Controls for Data Mesh
In this joint presentation, Paul Rankin (Head of Data Management Platforms, Roche Diagnostics) and Claude...

How Swedbank Unlocks Advanced Analytics
Head of Data Lake Engineering at Swedbank Vineeth Menon discusses how Swedbank partnered with Immuta...

2023 Data Access & Security Trendbook
Modern data use can be a complex process, requiring multifaceted tech stacks, adept teams of...

Self-Service Analytics for Data Mesh in the Public Sector
In the past decade, the enactment of both the Data Act and the Evidence-Based Policy...

A Proactive Data Security Panel with EY, Immuta, Databricks, and Alation
Join Anthony Farr (Regional Director for Asia Pacific and Japan, Immuta), Doug Goethel (Senior Sales...

How Data is Helping IAG Make the World a Safer Place
Dave Abrahams, Executive General Manager at IAG, discusses how his team is creating value through...

nib Group’s Modern Data Stack Journey
Hear from Kurt Gardiner, Senior Engineering Manager of Data and ML Engineering at nib Group,...

Thomson Reuters Customer Testimonial
Learn how Immuta’s Data Security Platform helps Peter Jacob, VP of Data Lake at Thomson...

2023 State of Data Engineering Survey
Amid explosive growth in data users and products, high profile data breaches, and rapidly evolving...

Why Automating Data Access Helps Thomson Reuters Gain Competitive Advantage
Hear how the Thomson Reuters team leverages the Immuta Data Security Platform to address their...

The Snowflake Data Security Guide
Security is a primary concern in most aspects of our lives – so why should...

The Data Policy Management Report
Data is an essential resource for most organizations today, yet managing how it is used...

Scaling Dynamic Policies at JPMorgan Chase
Yarik Chinskiy, Chief Architect of JPMorgan Chase & Co., talks about how his company is...

The Ultimate Guide to Data Privacy for Healthcare and Life Sciences
For Healthcare and Life Sciences (HLS) organizations, data plays a critical role in providing the...

Five Best Practices for Data Security in Modern Cloud Platforms
How secure is your data? Despite data security and privacy ranking among the top data...

Best Practices for Securing Sensitive Data: A Guide for Data Teams
Data security strategies and tactics are not one-size-fits-all. The resources needed to protect sensitive data...

Data Masking 101: A Comprehensive Guide
Contemporary organizations have both a legal and ethical responsibility to protect sensitive customer data. Are...

How Immuta Enables a Zero Trust Architecture
Traditional perimeter-based information security can no longer offset the safety risks posed by work-from-home models...

The Ultimate Guide to Data Security for Financial Services
In the Financial Services (FS) industry, data is leveraged constantly in order to derive the...

Building an Agile Data Stack for the Top Data Use Cases
Regardless of size, geography, or industry, organizations are all facing a similar challenge: how to...

Immuta at Snowflake Summit 2022

Organisational Shifts to Becoming More Data-Driven Now Require a Dynamic Data Governance, Access and Control Strategy
Nearly all European organisations consider a digital-first strategy crucial to achieving business results. Still, less...

Take a Product Tour of Immuta with Snowflake
With our product tour, you’ll get to experience step-by-step how to: Connect data sources to...

Immuta Self-Guided Demo with Databricks
With our self-guided demo, you’ll get to experience step-by-step how to: Connect data sources to...

How to Design and Implement a Governance, Risk, and Compliance Framework for Enterprise Data Analytics
Designing and implementing a data governance framework that supports data analytics is far from intuitive,...

How WorldQuant Predictive Gives Organizations an AI Decision-Making Edge
Learn how Worldquant Predictive: Gave customers a competitive decision-making advantage during the COVID-19 pandemic by...

How One of the World’s Top Streaming Services Scaled Data Access
Learn how one of the world’s top streaming services: Automated data classification and enforcement across...

How LMI Accelerates Speed to Data Access for Government Agencies with Immuta
Learn how LMI: Increased time to data by 10X, giving users fast and easy access...

How J.B. Hunt Is Driving Freight Transportation Into the Future
Learn how J.B. Hunt: Increased permitted use cases for cloud analytics by 100% with Immuta...

How a Top Bank Saved $50M by Automating Data Access Controls
Learn how one of the world’s top banks used Immuta to: Streamline data use across...

Data Protection by Process: How to Operationalize Data Protection by Design for Machine Learning
“The GDPR has been criticized by many for being too high-level or outdated and therefore...

Immuta’s GDPR Compliance Playbook
The EU’s General Data Privacy Protection Regulation (GDPR) is a sweeping set of privacy regulations...

A Guide to the EU’s Unclear Anonymization Standards
The EU’s General Data Protection Regulation (GDPR) is among the most influential data privacy laws...

GigaOm Data Access Control Report: Immuta ABAC vs. Apache Ranger RBAC
GigaOm cloud data security report finds Immuta’s data access control 75X more efficient than Ranger’s....

How a Health Data Company Revolutionized Research on Sensitive Data with Immuta
Learn how a healthcare non-profit: Saved over $1 million annually in data engineering costs Simplified...

How Immuta Makes Life Easier for Data Architects
Data architects are facing a triad of challenges in the current state of analytics due...

DataOps Dilemma: Survey Reveals Gap in the Data Supply Chain
As the demand for data has grown — alongside constantly evolving rules and regulations dictating...

The Data Platform Owner’s Guide to Data Security with Snowflake & Immuta
As cloud data workloads, regulations, and ecosystems evolve, managing data security at scale has overwhelmed...

Seven Steps for Migrating Data to the Cloud
Cloud migration doesn’t happen overnight, nor does it happen in a vacuum — it requires...

Large Global Bank Uses Data Controls for Electronic Trading Analytics
Learn how a top global bank achieved breakthrough results with Immuta: Reduced costs while increasing...

2022 Data Access & Analytics Trendbook
Where might the evolution of data access and analytics lead next? There’s no definitive answer...

RBAC vs. ABAC: Future-Proofing Security and Access Control
With data-driven initiatives central to modern success, it’s incredibly important that this data is kept...

A Guide to Automated Data Security in Databricks Using Immuta
Sensitive data is the most valuable asset for analytics and data science. But if data...

How to Avoid the Challenges of Cross-Platform Data Access Governance
Within the next two years, 81% of organizations expect to be “primarily” or “entirely” cloud-based, and more...

HIPAA Security Compliance Playbook
The Health Insurance Portability and Accountability Act (HIPAA) governs disclosure by medical providers in the...

Enabling Zero Trust for Data Analytics
Yet, as sensitive data use becomes more common, so too are ransomware attacks and state-sponsored...

Data Security & Access Control 101
Data science and data security programs are inherently at odds. Data scientists need access to...

TDWI’s Data Governance Best Practices Report
“Data initiatives never live up to their full potential without appropriate governance behind it.” This...

2022 State of Data Engineering Survey
Emerging Challenges with Data Security & Quality Organizations have been investing in data science, analytics,...

How Cognoa Improved Data Management Practices for AI-Based Medical Diagnostics with Immuta
As an intangible asset, data is not physically restrained. But data localization laws are changing...

Accelerating Data-Driven Insights with Data Mesh
Enterprise products and services create an ever-increasing amount of data, much of which is centered...

The Five Data Localization Strategies for Building Data Architectures
As an intangible asset, data is not physically restrained. But data localization laws are changing...

DBTA Report: Meeting the Growing Challenges of Data Security & Governance
Risks to data are at an all-time high, with the average data breach now costing...

Zero Trust Solutions for Federal Agencies
This Executive Order, and the subsequent memo M-22-09, outlined the federal government’s plans to implement...

Modern Data Governance: a Conversation with Immuta CEO Matt Carroll (Part 2)

Modern Data Governance: a Conversation with Immuta CEO Matt Carroll (Part 1)

The Ultimate Guide to Cloud Data Access Control in Snowflake
With Snowflake and Immuta, data teams are able to harness the power of the Snowflake...

The Guide to Enforcing Access Control Policies with Your Data Catalog’s Metadata
You’ve invested in a data catalog to reap the benefits of self-service data discovery and...

The Databricks Security & Access Handbook
J.B. Hunt saved $2.7M in infrastructure costs and productivity gains. Swedbank doubled its number of...

IAG Customer Testimonial
Watch this video to learn how Dave Abrahams, Executive General Manager of Data at IAG,...

A Data Protection Grammar
The data protection landscape is complex and constantly evolving. Most organizations’ data exists in multiple...

Injecting Software Engineering Practices and Rigor into Data Governance
The Data Exchange Podcast: Steve Touw on why data governance needs to go from the...

Databricks and Immuta: Data Security for Financial Services

Aggregation, Synthesisation, and Anonymisation: A Call for a Risk-Based Assessment of Anonymisation Approaches
The data transformation process is not trivial, and assessing its outputs can be equally complex....

The Technical Fix for International Data Transfers: A Word of Caution
In today’s interconnected world, data sharing has never been more essential. So, when the EU’s...

Beyond Cosmetic Compliance in Data Analytics: A Guide to CPRA
Research shows that more than 90% of organizations are subject to one or more data...

Implementing & Auditing ICD 501 Using Immuta
As sensitive data’s role in the intelligence community (IC) becomes more prominent, protecting that data...

Why a Good Additional Technical Safeguard is Hard to Find
A recent ruling by the Court of Justice of the European Union (CJEU) essentially made...

Applying Access Controls Across Multiple Cloud Services

Immuta Data Engineering Survey: 2021 Impact Report
We’re on the verge of a perfect storm for modern data access governance. As organizations...

Why LMI Securely Controls Data Access with Immuta
Hear from Josh Wilson, VP of Advanced Analytics at LMI, on how Immuta helped his...

Reducing Re-Identification Risk in Health Data
Data privacy techniques, while thorough and advanced, are often not sufficient to ensure privacy on...

Demystifying Legal Automation
Legal automation is usually regarded with suspicion. When a law enforcement process substitutes a technological...

Layers of Trust
Data security is a driving force, particularly for organizations making the move from on-premises databases...

Warning Signs: The Future of Privacy and Security in the Age of Machine Learning
Originally released in partnership with The Future of Privacy Forum (FPF), this paper: Presents a...

How to Enhance Privacy in Data Science
In the last two decades, the ability to collect personal information on individuals has opened...

Why Homomorphic Computing Alone is Security, Not Privacy
Steve Touw, Immuta co-founder and CTO, addresses the critical and nuanced differences between privacy and...

Immuta & Data Protection by Design: Making the GDPR Work for Your Data Analytics Environments
Data Protection by Design (DPbD) is the core data protection requirement in the General Data Protection...

Immuta Wins 451 Research Innovation Award
Immuta has been named a “451 Firestarter” by leading technology research and advisory firm 451...

Anonymizing Personal Data: Where Do We Stand Now?
In this exclusive Privacy & Data Protection Journal article, Sophie Stalla-Bourdillon, Senior Privacy Counsel and...

Beyond Explainability: A Practical Guide to Managing Risk in Machine Learning Models
Can enterprises govern machine learning at scale? As organizations continue to adopt innovative technologies, traditional...

Automating GDPR for Data Science and Advanced Analytics
This solution sheet details how Immuta provides the most advanced data protection policies on the...