Data Security

Default alt text
September 10, 2024

Simplify Data Security in 3 Steps with Immuta & Concord

With 120 zettabytes of new data generated every day, it’s safe to assume that systems and processes that worked even five years ago are struggling to keep up with the demand for data. But keeping up with new and evolving technologies can be a full-time job. And, it’s clear from...

Default alt text
June 21, 2024

How Data Modernization Fuels Innovation at Booking.com

Maintaining the status quo has never been part of any competitive or innovative business strategy. From startups to large enterprises, data modernization is a priority because of the technological and business benefits it delivers. The modernization process gives teams the opportunity to innovate within their data ecosystem. Whether it be an architectural...

Default alt text
June 13, 2024

What Major Data Breaches Can Teach Us About Layered Security

Recent data breaches at Ticketmaster and Santander have underscored the critical vulnerabilities that exist in enterprise data security strategies. These haven’t just interrupted operations – they’ve impacted hundreds of millions of customers, eroding trust in well-known and widely used brands. This is particularly pronounced for Ticketmaster, given the company’s recent headlines. Since before Immuta existed,...

Default alt text
June 4, 2024

3 Steps for Countering Bias in AI/ML Data Sets

Advancements in Artificial Intelligence (AI) and Machine Learning (ML) are revolutionizing the way we work with data across sectors. By enabling enhanced decision-making and faster operations, these models present us with unparalleled capabilities – but they are not immune to some very human problems. One of the most critical challenges...

Default alt text
June 4, 2024

Snowflake Names Immuta 2024 Data Cloud Product Data Security Partner of the Year

We are thrilled to announce that Immuta has been named Snowflake’s Data Cloud Product Data Security Partner of the Year for the second year in a row. This recognition is deeper than the technical aspects of our product integration – it highlights our shared commitment to de-risking our customers’ data and delivering...

Default alt text
May 31, 2024

How Snowflake’s New Horizon Features Make Your Immuta Integration Even Better

Any leading organization will tell you that data isn’t a nice-to-have – it’s table stakes for competing in today’s environment. So, it’s no wonder that many of these companies rely on the Snowflake Data Cloud to power analytics and AI workloads. Since 2018, Immuta has worked product-to-product with Snowflake to develop a...

Default alt text
May 24, 2024

Combining Data Mesh and Data Fabric for Next-Gen Data Security

While they may be different on a conceptual level, data fabric and data mesh aren’t mutually exclusive concepts. Within the right data strategy, the two frameworks can actually work together, with data fabric providing a unified data access layer for a larger data mesh architecture. The choice of whether it makes sense to leverage...

Default alt text
May 16, 2024

What the Power Grid Can Teach Us About Data Sharing

British mathematician Clive Humby is credited with coining the phrase “data is the new oil.” Respectfully, this statement no longer rings true – and data sharing is one of the main reasons why. A lot has changed since 2006, when Humby first made this comparison. To put it into perspective, Twitter launched...

Default alt text
May 16, 2024

Why Collaboration and Controls are Central to Data Risk Management

We operate in a world of risks. Whenever we get behind the wheel of a car, flip a light switch in our home, or enjoy an alcoholic beverage, we are accepting an inherent level of risk associated with each activity. But this doesn’t stop us from doing them. Similarly, cloud data...

Default alt text
May 9, 2024

Now is the Time for Risk-Aware Data Security & Access Controls

From artificial intelligence and machine learning advancements, to decentralized cloud storage and analysis, and other novel use cases, we’re seeing data innovations happening before our eyes. At the same time, data breaches and noncompliance penalties are increasingly common and costly, and threats to data will only continue to grow. In...

Default alt text
April 22, 2024

Enabling Cloud Infrastructure Security for Storage & Compute

Pushes toward self-service data use, advancements in AI, and the demand for real time, granular data insights have led to a surge in unstructured data volumes and usage. Research shows that 90% of new enterprise data is unstructured, and it is growing at three times the rate of structured data. This begs...

Default alt text
April 5, 2024

A Multi-Pronged Approach to Cybersecurity Risk Management Frameworks

Default alt text
March 14, 2024

Data Leaders’ Top 4 Security Trends for 2024

It’s easy to talk about trends in absolutes. “This new development will affect jobs across every sector,” and “this new platform is going to be everywhere” – these kinds of blanket statements remove nuances that can be incredibly important when discussing trends. Instead, we should focus on questions like “How...

Default alt text
February 28, 2024

Discover Frameworks: Bridging the Gap Between Regulation & Application

“What data do we have?” Data’s entire life cycle – from collection, to analysis, to insights and business-driving application – begins with this question. Understanding your organization’s data remains critical to effectively using and protecting it, especially as platforms, users, and data sets constantly evolve. But gaining a contextual understanding...

Default alt text
January 20, 2024

Immuta & Snowflake Horizon: Integrated Solutions for Data Governance Use Cases

For organizations like Thomson Reuters and Instacart, which rely on Snowflake to execute advanced analytics on complex workloads, the Immuta Data Security Platform provides peace of mind through end-to-end data security and access control. Immuta’s native integration with Snowflake delivers automated, scalable data discovery, security, and monitoring, and the seamless user experience and close collaboration earned Immuta the title...

Default alt text
January 17, 2024

3 Emerging Data Security Laws and What They Mean for You

The past few months have been particularly hectic for lawmakers across the European Union (EU). With Ursula von der Leyen’s leadership of the European Commission set to conclude after the 2024 elections, lawmakers have felt the pressure to advance critical files and policies as quickly as possible. Amid this legal...

Default alt text
January 11, 2024

The Intersection of Data Security and IAM

As more capabilities become automated as part of cloud services, we find that our customers are reluctant to give up control over data security. The complexity of managing policies and granting access involves a degree of hands-on management, and customers want to own that responsibility. In the Gartner report, Predicts 2024: IAM and Data...

Default alt text
December 22, 2023

How Booking.com Streamlines Snowflake & AWS Data Security

If there’s one lesson from the constant advancement of data use and technology, it’s that there’s always room for improvement. Even the most sophisticated data infrastructure can be tuned up with new and improved capabilities that streamline data access and use. This was the case for Booking.com, which recently decided...

Default alt text
December 19, 2023

How Snowflake, phData, and Immuta Approach Data Mesh Challenges

Moving from concept to execution can be a complicated process – especially with data mesh architectures. But by understanding and preparing for obstacles, you can make the implementation process as streamlined as possible. In our recent webinar Data Mesh vs. Data Security: Can You Have Both?, Immuta Senior Product Manager Claude...

Default alt text
November 28, 2023

The “One Policy” Approach to Policy-Based Access Management

In his Lord of the Rings series, J.R.R. Tolkien writes of 19 rings of power that give their bearers wealth, dominion, and control. Of these, the most powerful is the “One Ring,” which affords its bearer control over all other rings and, by extension, the entire  world. What do rings have to...

Default alt text
November 9, 2023

4 Simple Steps to Mature Your Data Security Strategy

In today’s digital landscape, safeguarding your data is more important than ever. Whether you’re a data platform owner, a data engineer on a busy team, or just a concerned professional who values an improved data security posture, taking steps to secure your data is crucial. But where do you start?...

Default alt text
September 21, 2023

Report Finds Data Security is a Priority for Over 40% of CEOs

With data at the root of business-driving initiatives, the need to maintain data security and compliance is becoming imperative for leaders across industries. Security measures, however, are facing an increasingly daunting landscape of potential threats. According to a new survey by the International Data Corporation (IDC), 54% of European organisations experienced an increase in...

Default alt text
July 31, 2023

How to Assess and Defend Against the Cyber Threat Landscape

According to the United States’ Cybersecurity & Infrastructure Security Agency (CISA), 47% of American adults have had some amount of their personal information exposed by cyber criminals. With the volume of data that today’s organizations collect, store, and leverage on a day-to-day basis, no one wants to be responsible for...

Default alt text
July 24, 2023

How Thomson Reuters’ Cloud Data Protection Unlocks Snowflake Data

As modern organizations look to innovate with agility, migrating to the cloud enables them to unlock data’s value at scale. Leading cloud data platforms like Snowflake allow data teams to store and analyze mass amounts of data, all while providing access for an ever-increasing number of users and use cases. And while...

Default alt text
July 11, 2023

What is Sensitive Data and How Should I Protect It?

If you’ve done any work with data, you’ve likely heard the term “sensitive data.” Data compliance regulations like the GDPR, HIPAA, CCPA, and more make repeated mentions of “sensitive personal data” and “sensitive personal information,” and many privacy statements include similar language. A quick search of the term “sensitive data” returns more...

Default alt text
July 7, 2023

Data Leak Prevention for Modern Tech Stacks

When we think of threats to data, malicious hackers who are out to profit off our information tend to come to mind. But what about the risks that are hiding in plain sight? Outdated systems, shared passwords, and lax controls may all seem like low grade issues – until they...

Default alt text
July 3, 2023

How to Mitigate Risk by Mastering Cloud Storage Security

The volume of cloud data is increasing at an exponential rate. But with this growth comes an increased attack surface, heightening the risk of dangerous data breaches or leaks. To support the operations of modern businesses and agencies across the world, data resources require storage that can remain secure at...

Default alt text
June 22, 2023

Securing Success: Immuta is Snowflake’s 2023 Data Security Partner of the Year

It’s no exaggeration to say that virtually any contemporary organization relies on data. And as data assets and use cases multiply, teams need to be able to store, access, and analyze their data securely and at the speed of business. Platforms like the Snowflake Data Cloud have met this need head-on, offering...

Default alt text
June 6, 2023

What is Data Modernization? Guiding Data into the Future

In a fast-moving field, established frameworks can often benefit from strategic updates. Think of your cell phone or laptop: do they still function using the same operating system that they had when you first bought them? No, they require regular updates–some more significant than others–that routinely improve their functionality and...

Default alt text
May 31, 2023

Data Mesh vs. Data Fabric: What’s the Difference?

When two different concepts sound or act alike, it can be easy to conflate them. We see this in everyday life: jelly vs. jam, weather vs. climate, latitude vs. longitude, concrete vs. cement, the list goes on. In the ever-expanding world of data jargon, this kind of problem can easily...

Default alt text
May 22, 2023

How Immuta’s ISO 27001/27701 Compliance is Enhancing Data Security

As the world becomes increasingly digital, data security has become a critical concern for businesses of all sizes. Threats to data are evolving as technology and bad actors become more sophisticated, which makes the challenge of protecting sensitive information that much more complicated. Ensuring that data protection processes and policies...

Default alt text
May 12, 2023

5 Steps for an Effective Data Breach Response

With global business and operations so heavily reliant on data collection, sharing, and analysis, data breaches can seem inevitable. In fact, the Identity Theft Resource Center (ITRC) reports that there were 445 publicly-reported data compromises in Q1 of FY23 that affected 89,140,686 individuals worldwide. While organizations often take a proactive approach to...

Default alt text
April 12, 2023

4 Steps to Improve Security Posture in Your Data Stack

As organizations look to migrate and optimize their data resources, cloud data platforms are continuing to evolve. But while these platforms offer enhanced storage, compute, and analysis capabilities for the modern data stack, they may also broaden the attack surface of data ecosystems. More platforms–combined with more users and more data–can...

Default alt text
March 17, 2023

Why Data Breach Detection is Crucial for Data Security

When a data breach occurs, time is of the essence. On one level, modern compliance laws and regulations have set standards for the window of reporting data breaches, often requiring organizations to do so within 72 hours to avoid penalization. But monetary and legal penalties are not the most important outcomes of...

Default alt text
March 6, 2023

Multi-Cloud Data Security: An Overview

Why settle for one cloud when you can have a whole buffet of platforms to keep your data safe and sound? With more and more sensitive information being stored in the cloud, having a comprehensive cloud data security strategy is absolutely critical to prevent your data from being hacked, leaked, or stolen....

Default alt text
February 13, 2023

8 Reasons to Choose Immuta’s SaaS Data Security Platform

Data is the lifeblood of any organization, and keeping it secure is of the utmost importance. With the ever-increasing amount of data being generated and shared, organizations are facing more challenging data security threats than ever before. The rise of cyber-attacks, data breaches, and regulatory compliance requirements has made data security a...

Default alt text
December 12, 2022

The 3 Most Common Data Engineering Challenges

Today’s data engineering teams face various challenges wrangling massive volumes of data, dispersed stakeholders with competing priorities, and distributed data architectures. But of all these variables, which is the most taxing? In this blog, we’ll delve into the most common data engineering challenges as reported by 600 data engineers, and how...

Default alt text
November 30, 2022

Best Practices for Data Security in Modern Cloud Platforms

As the volume of data generated, transformed, stored, and accessed has increased, digital transformation has significantly altered how companies do business and use data to create value. To deal with increasingly complex unstructured and semi-structured data, organizations are looking to build their analytics to stay competitive. Along with this, the...

Default alt text
November 29, 2022

What Is Privacy Engineering – And Do You Need It?

Do you have complete confidence in your organization’s privacy law compliance? If your answer is no, you’re in the majority. According to the International Association of Privacy Professionals (IAPP), only 20% of respondents report being fully confident in their company’s approach to data privacy compliance. But data privacy concerns aren’t subsiding anytime soon...

Default alt text
October 22, 2022

Why Data Monitoring is Key to Sensitive Data Protection

According to one 2022 report, 89% of companies claim that their organization is taking a multi-cloud approach to data storage and analysis. This means the data they collect lives in at least two different cloud databases, if not more. The data must be accessible to the variety of tools meant to...

Default alt text
July 8, 2022

Implementing a Data Security Platform for Cloud Storage Security

As data storage and analysis continue to migrate from on-premises frameworks to those based in the cloud, the market for cloud storage and data security platforms (DSPs) has expanded. In fact, the global cloud security market is projected to grow from $29.3 billion in 2021 to $106 billion by 2029. This highlights...

Default alt text
June 20, 2022

Demystifying Data Security and Privacy in the Digital Age

As data evolves, so does the threat landscape. Facing the possibilities of targeted breaches from external players, risky or negligent activity from insiders, and mounting pressure from the informed public, organizations need to be more intentional than ever with how they protect their data. At the same time, both data...

Default alt text
May 13, 2022

What Are the Most Common Types of Data Masking?

Data masking replaces sensitive information with fake but convincing versions of the original data. Given the necessity for sensitive data protection, data masking must be adaptable to any data environment. Regardless of the size, purpose, or tools in your data stack, there is a type of data masking that fits your...

Default alt text
May 10, 2022

What Is Data Masking?

What Is Data Masking? Why Do I Need Data Masking? What Are Some Data Masking Techniques? When Do I Need Data Masking? Top Use Cases How Do I Apply Dynamic Data Masking?

Default alt text
April 27, 2022

Data Leaders’ Top 4 Enterprise Data Security Challenges

There’s no disputing the importance of data in driving cutting edge insights and business outcomes. However, for many organizations, the gap between raw data collection and data-driven results is wide and difficult to navigate. Colin Mitchell, Immuta’s GM of Sales for EMEA and APJ, recently met with data leaders from...

Default alt text
January 27, 2022

What is Data Obfuscation? Everything You Should Know

As data use has become ubiquitous, data breaches have followed suit. Though down from a peak of 125 million compromised data sets in late 2020 – which was at least partly attributable to the sudden shift to remote work during the pandemic – data breaches still expose millions of data assets every...

Default alt text
April 29, 2021

Why Clarifying De-Identification Concepts is Key to Sufficient Data Protection

Data protection law emerged in the 1970’s in Europe as a means to protect against the risks posed by automated or computer-based data processing. As a concept, it thus goes far beyond protecting individuals against the disclosure of nonpublic information, a concern that is still very much at the center...

Default alt text
November 12, 2020

Immuta & Starburst Trino: Powering Faster, Safer Analytics & Data Science

Access to sensitive data is more critical to data analytics and data science than ever before. But in today’s environment, speed to data access is contingent upon how secure that data is. To help data teams achieve faster, safer, more cost efficient analytics and data science initiatives, we have formed a...

Default alt text
September 25, 2020

4 Reasons to Start Your Cloud Migration Process with Data Security

The vast majority of organizations now utilize the cloud in some form or another, yet there is no single process data teams follow when migrating data to their cloud platform. This may not seem like a red flag on the surface — if all the data gets from point A...

Default alt text
May 6, 2020

Security and Privacy Layers in Snowflake for Highly Sensitive Data

“Over the past few years, data privacy has evolved from ‘nice to have’ to a business imperative and critical boardroom issue,” warns a Cisco benchmarking report. Security and privacy are colliding in the cloud and creating challenges like we’ve never seen before. This is particularly true for organizations making the move...

Default alt text
December 19, 2019

Differentiating Data Security in the GDPR from Privacy

The European Union’s General Data Protection Regulation — one of the most forward-leaning privacy regulations on the planet — was praised by Tim Cook in a recent speech in the EU because our personal data is “being weaponized against us with military efficiency.” Those are strong words, and frankly, accurate:...

Ready to get started?