
Data Security Posture Management With & Without Data Classification
Data Security Posture Management Data security has become a critical concern for organizations of all...

Elevating Data Security for Snowflake and Databricks
Over the past several years, the Immuta team has worked closely with product teams at...

Introducing Immuta’s Scalable Localized Sensitive Data Discovery
Effective sensitive data discovery (SDD) capabilities are essential for data protection, governance, and regulatory compliance....

Inside Immuta’s Databricks Unity Catalog Integration with Row- & Column-Level Controls
Immuta continues to innovate in partnership with Databricks, and we’re excited to announce the general...

How Immuta & Snowflake Unlock Zero Trust Data Security for Government & Education
In today’s tech-driven world, data security is a paramount concern for every industry. But when...

Databricks + Immuta: Powering the Future of the AI-Augmented Enterprise
The modern business is driven by data and AI. Decisions are no longer based on...

How Does Data Classification Help Protect Data Privacy?
As data breaches and cyber attacks become more common, protecting data privacy is an increasingly...

Moving from Legacy BI Extracts to Modern Data Security & Engineering
Before we can talk about modernizing from a legacy Business Intelligence (BI) extract, we need...

Immuta Enhances Starburst & Databricks Integrations, and Introduces Dynamic Query Classification
We are excited to announce Immuta’s latest product updates, including: General availability of our v2...

Building Momentum Through the Google Cloud Ready – BigQuery Designation
We are extremely excited to announce that Immuta has achieved Google Cloud Ready – BigQuery...

Immuta Enables a Seamless Data Security Integration with Snowflake & Starburst
We are excited to announce that Immuta’s latest Data Security Platform release is here, enabling...

8 Reasons to Choose Immuta’s SaaS Data Security Platform
Data is the lifeblood of any organization, and keeping it secure is of the utmost...

Immuta’s Continuous Data Security Posture Management & Snowflake Integration Automation
We are excited to announce that Immuta’s latest SaaS release is here, providing customers with...

Immuta Detect Provides Continuous Cloud Data Security Posture Management

The Next Generation of CCPA Compliance Requirements
The 2020 elections not only saw record turnout, but also ushered in a suite of...

Immuta Enhances Databricks & Snowflake Integrations and Performance
We are excited to announce that Immuta’s latest product release is here, offering deeper native...

Scaling Data Access Auditing with Immuta’s Unified Audit Model

Improved Orchestration and Deepened Collaboration from Immuta’s Latest Release
Immuta’s latest release is here, and we are excited to share the new orchestration and...

Immuta Spotlight: Bob Boule on SaaS Data Security Platforms for Enterprise
As more organizations continue to shift their data to the cloud, teams are often confronted...

Google BigQuery Access Control and Other Features from Immuta’s Latest Release
Immuta’s latest release is here, and we are excited to share the new features and...

Sensitive Data Discovery Tools for Modern Data Stacks
As modern data stacks become more complex, data teams need more efficient ways to manage...

Scaling Secure Data Access with Immuta & Databricks Unity Catalog
For data engineers, the effort required to wrangle access policies grows exponentially as the complexity...

Enabling Tableau Row-Level Security with Snowflake & Immuta
The ability to efficiently discover data and visualize it in meaningful ways has never been...

What is Policy-as-Code and Why is it Important?
In the cloud computing era, ensuring data policy is co-created with data is essential. Historically,...

Simplify Data Access for Starburst’s Federated Query Engine and Data Mesh
Immuta + Starburst Integration As market demand for data mesh has grown, the need for...

Immuta Introduces New Capabilities and Integrations to Enhance Security for Cloud Data
The data security and privacy space continues to evolve to keep pace with the constantly...

Immuta’s $100M Series E Funding and Why We’re the Leader in Secure Data Access
I’m excited to announce Immuta’s $100M Series E funding, bringing our total funding to $267M....

What Are the Most Common Types of Data Masking?
What Are the Most Common Types of Data Masking? Data masking is a type of...

How Latch Enables Secure Self-Service Data Analytics with Immuta & Snowflake
A decade ago, having a camera on your doorbell or being able to unlock your...

What is a Data Mesh Architecture and How Does it Work?
Governance and security are hot topics in data mesh, as evidenced by the recent webinar I co-presented...

Simplifying Snowflake Security with Alation & Immuta
This blog was co-authored with Deepak Nelli, Director of Sales Engineering at Alation. The modern...

What Is Policy-Based Access Control?
In daily conversation, we often use umbrella terms to group things together. If someone tells...

Protect Sensitive Data with Key Privacy Enhancing Techniques
According to the Identity Theft Resource Center, there were 1,862 data breaches in 2021, exceeding the...

The Costs of Cloud-Based Access Control: DIY vs. Automated
Organizations are shifting from on-premises data storage to the cloud, with the goal of profiting...

How To Easily Adapt Data Access Management for Table Grants
Attribute-based access control (ABAC) grants or restricts access to data using context-based decisions based on...

What is ABAC? Attribute-Based Access Control 101
There’s a lot of confusion in the market about attribute-based access control (ABAC) and what it actually...

The Myth of Vendor Lock-In: Building vs. Buying in the Federal Market
Recently, across the social media spectrum there has been an uptick in government program leaders,...

3 Best Practices for Maximizing Data Management Efficiency
In 2020, global spending on cloud data services reached $312 billion. In 2022, Gartner estimates...

How to Implement Immuta with Collibra
Immuta is the universal cloud data access control platform that gives data engineering and operations...

Why a Data Management Framework is Essential
Is it possible to manage a successful business or organization if you’re not successfully managing...

5 Steps for Building a GDPR-Compliant Data Strategy
A modern analytics environment is typically built to reduce time to data, leaving compliance as...

Understanding Differential Privacy
Collecting and analyzing aggregated data is essential in today’s connected world, but are you doing...

Understanding Differential Data Privacy
In today’s day and age, we’re accustomed to technological advances and capabilities being uncovered all...

GigaOm Report Positions Immuta as the Leader in Data Access Control
Data access control and governance are central tenets of a strong cloud data strategy. As...

Cloud Data Security: A Complete Overview
With cloud data platforms becoming the most common way for companies to store and access...

What Is a Data Clean Room?
As data has become one of the most prized resources for companies around the world,...

What is Data Orchestration?
Data orchestration is the process of bringing together data from various storage locations, combining it...

What is Metadata Management?
Metadata management is the collection of policies, processes, and software/hardware platforms used to manage and...

Immuta vs. Ranger: Research Comparison Finds Immuta’s ABAC Reduces Policy Burden by 75x
The role-based access control versus attribute-based access control debate has been going on for decades....

What Is Data Redaction?
There’s an old adage that all press is good press, but one kind of attention...

Why You Need a Data Audit Trail
Data leaks are everywhere in the news. Is your company safe and readily able to...

Data Masking Tools and Solutions
Data masking is one of the most important tasks in data governance. It may seem...

SQL Is Your Data Mesh API
What Is a Data Mesh? As Zhamak Dehghani describes in her original article, “How to...

What is Data Generalization? A Complete Overview
Data generalization is the process of creating a more broad categorization of data in a...

Data Lake Governance: What Is It and Do You Need It?
Data lakes have become essential tools for businesses in the era of Big Data. But...

Enabling Third Party Sharing with Databricks Data Sharing
Would you like to monetize your internal data by sharing it externally with third parties?...

Immuta’s Universal Data Access Control for Lakehouse Architectures
As companies started moving data to the cloud and separating compute and storage for added...

What is Data De-identification and Why is It Important?
Data de-identification is a form of dynamic data masking that refers to breaking the link between data...

Taking Policies the Last Mile with Looker & Immuta
“Don’t Repeat Yourself” is a powerful principle for software engineers and data professionals. But staying...

What is Fine-Grained Access Control? (And Why It’s So Important)
One of the most traditional methods of determining who can and cannot access certain data...

Dogfooding Data Access Control
Data access control: quixotic enterprise initiative, or the top priority of a startup’s first data...

5 Important Things to Look For in a Data Governance Tool
A data governance tool can help your organization automate data governance at scale, increase data...

How The Center for New Data Saved $1 Million with Immuta
By the time COVID-19 was classified as a pandemic, it was already spreading like wildfire....

How To: Access Controls in Databricks Using Immuta
The pros and cons of role-based access control (RBAC) and attribute-based access control (ABAC) have...

Immuta’s Latest Release: Unlocking the Power of the Cloud Data Ecosystem
As data teams modernize their data stacks for the cloud and adopt multiple cloud data...

Data Engineering is Critical to Driving Data and Analytics Success
Organizations are increasingly relying on data analytics to mine insights that drive business results. Data-driven...

Role-Based Access Control vs. Attribute-Based Access Control
The terms role-based access control and attribute-based access control are well known, but not necessarily well understood — or...

How to Avoid the Most Common Cloud Migration Challenges
Cloud provider capabilities are evolving faster than ever, and enterprises are taking notice. With all...

A Low-Risk, Low-Cost Cloud Migration Roadmap
Lifting and shifting data science operations to the cloud can be expensive and risky. From...

New Release: Native Snowflake Policy Enforcement, Dynamic k-anonymization, External Masking
As I prepared to write this blog about the value provided by our latest Immuta...

Immuta Named One of World’s 50 Most Innovative Companies by Fast Company
Today, Immuta was named to Fast Company’s annual list of the World’s 50 Most Innovative...

A Former Chief Operational Risk Officer for a Global Fortune 300 Bank on Why He Joined Immuta
“How does working for a software start-up compare to working for a massive financial institution?”...

5 Ways Immuta Promotes Ethical Data Science & Customer Trust
Amazon’s Alexa. Apple’s Siri. Bank of America’s Erica. These are all examples of marquee “digital...

Spark Is Now In Immuta!
Announcement Immuta is happy to announce our 2.1 release which includes native SparkSQL policy enforcement....