Webinar: Join Immuta, HP, & NightDragon to learn why managing access is critical for the future of data use.

Sign Up
July 12, 2022
What is Policy-as-Code and Why is it Important?

In the cloud computing era, ensuring data policy is co-created with data is essential. Historically,...

July 6, 2022
Simplify Data Access for Starburst’s Federated Query Engine and Data Mesh

Immuta + Starburst Integration As market demand for data mesh has grown, the need for...

July 5, 2022
Immuta Introduces New Capabilities and Integrations to Enhance Security for Cloud Data

The data security and privacy space continues to evolve to keep pace with the constantly...

Immuta’s $100M Series E Funding and Why We’re the Leader in Secure Data Access
June 8, 2022
Immuta’s $100M Series E Funding and Why We’re the Leader in Secure Data Access

I’m excited to announce Immuta’s $100M Series E funding, bringing our total funding to $267M....

May 13, 2022
What Are the Most Common Types of Data Masking?

What Are the Most Common Types of Data Masking? Data masking is a type of...

May 9, 2022
How Latch Enables Secure Self-Service Data Analytics with Immuta & Snowflake

A decade ago, having a camera on your doorbell or being able to unlock your...

April 29, 2022
How to Decentralize Data Access Policies in the Data Mesh Architecture

Governance and security are hot topics in data mesh, as evidenced by the recent webinar I co-presented...

April 27, 2022
How to Simplify Snowflake Security with Alation and Immuta

This blog was co-authored with Deepak Nelli, Director of Sales Engineering at Alation. The modern...

April 27, 2022
What Is Policy-Based Access Control?

In daily conversation, we often use umbrella terms to group things together. If someone tells...

April 24, 2022
How to Mask PII Data: A Guide to Data Masking Techniques

According to the Identity Theft Resource Center, there were 1,862 data breaches in 2021, exceeding the...

April 6, 2022
The Costs of Cloud-Based Access Control: DIY vs. Automated

Organizations are shifting from on-premises data storage to the cloud, with the goal of profiting...

Data Access Management
April 4, 2022
How To Easily Adapt Data Access Management for Table Grants

Attribute-based access control (ABAC) grants or restricts access to data using context-based decisions based on...

February 22, 2022
What is ABAC? Attribute-Based Access Control 101

There’s a lot of confusion in the market about attribute-based access control (ABAC) and what it actually...

The Myth of Vendor Lock-In: Building vs. Buying in the Federal Market
January 31, 2022
The Myth of Vendor Lock-In: Building vs. Buying in the Federal Market

Recently, across the social media spectrum there has been an uptick in government program leaders,...

3 Best Practices for Maximizing Data Management Efficiency
January 20, 2022
3 Best Practices for Maximizing Data Management Efficiency

In 2020, global spending on cloud data services reached $312 billion. In 2022, Gartner estimates...

December 10, 2021
How to Implement Immuta with Collibra

Immuta is the universal cloud data access control platform that gives data engineering and operations...

November 12, 2021
Why a Data Management Framework is Essential

Is it possible to manage a successful business or organization if you’re not successfully managing...

October 22, 2021
5 Essential Steps for Building a GDPR-Compliant Data Strategy

A modern analytics environment is typically built to reduce time to data, leaving compliance as...

October 18, 2021
Understanding Differential Data Privacy

Collecting and analyzing aggregated data is essential in today’s connected world, but are you doing...

Understanding Differential Data Privacy
October 18, 2021
Understanding Differential Data Privacy

In today’s day and age, we’re accustomed to technological advances and capabilities being uncovered all...

October 13, 2021
GigaOm Report Positions Immuta as the Leader in Data Access Control

Data access control and governance are central tenets of a strong cloud data strategy. As...

September 17, 2021
Cloud Data Security: A Complete Overview

With cloud data platforms becoming the most common way for companies to store and access...

September 13, 2021
What Is a Data Clean Room?

As data has become one of the most prized resources for companies around the world,...

August 16, 2021
What Is a Data Mesh?

A data mesh is a relatively new data platform architecture that moves away from the...

August 9, 2021
What is Data Orchestration?

Data orchestration is the process of bringing together data from various storage locations, combining it...

July 21, 2021
What is Metadata Management?

Metadata management is the collection of policies, processes, and software/hardware platforms used to manage and...

July 20, 2021
Immuta vs. Ranger: Research Comparison Finds Immuta’s ABAC Reduces Policy Burden by 75x

The role-based access control versus attribute-based access control debate has been going on for decades....

June 28, 2021
What Is Data Redaction?

There’s an old adage that all press is good press, but one kind of attention...

June 28, 2021
Why You Need a Data Audit Trail

Data leaks are everywhere in the news. Is your company safe and readily able to...

Data Masking Tools and Solutions: 2022 Buyer’s Guide
June 10, 2021
Data Masking Tools and Solutions: 2022 Buyer’s Guide

Data masking is one of the most important tasks in data governance. It may seem...

June 9, 2021
SQL Is Your Data Mesh API

What Is a Data Mesh? As Zhamak Dehghani describes in her original article, “How to...

June 8, 2021
What is Data Generalization? A Complete Overview

Data generalization is the process of creating a more broad categorization of data in a...

June 7, 2021
Data Lake Security: What Is It, and Do You Need It?

Data lakes have become essential tools for businesses in the era of Big Data. But...

May 26, 2021
Enabling Third Party Data Sharing with Databricks Delta Sharing

Would you like to monetize your internal data by sharing it externally with third parties?...

Data Localization: A Complete Overview
May 19, 2021
Immuta’s Universal Data Access Control for Lakehouse Architectures

As companies started moving data to the cloud and separating compute and storage for added...

May 7, 2021
What is Data De-identification and Why is It Important?

Data de-identification is a form of dynamic data masking that refers to breaking the link between data...

April 9, 2021
Taking Policies the Last Mile with Looker & Immuta

“Don’t Repeat Yourself” is a powerful principle for software engineers and data professionals. But staying...

March 17, 2021
What is Fine-Grained Access Control? (And Why It’s So Important)

One of the most traditional methods of determining who can and cannot access certain data,...

March 10, 2021
Dogfooding Data Access Control

Data access control: quixotic enterprise initiative, or the top priority of a startup’s first data...

March 3, 2021
5 Important Things to Look For in a Data Governance Tool

A data governance tool can help your organization automate data governance at scale, increase data...

February 7, 2021
How The Center for New Data Saved $1 Million with Immuta

By the time COVID-19 was classified as a pandemic, it was already spreading like wildfire....

January 20, 2021
How To: Access Controls in Databricks Using Immuta

The pros and cons of role-based access control (RBAC) and attribute-based access control (ABAC) have...

December 10, 2020
Immuta’s Latest Release: Unlocking the Power of the Cloud Data Ecosystem

As data teams modernize their data stacks for the cloud and adopt multiple cloud data...

November 18, 2020
CCPA 2.0: What It Means for Protecting Your Data

The 2020 elections not only saw record turnout, but also ushered in a suite of...

October 20, 2020
Data Engineering is Critical to Driving Data and Analytics Success

Organizations are increasingly relying on data analytics to mine insights that drive business results. Data-driven...

October 16, 2020
Role-Based Access Control (RBAC) vs. Attribute-Based Access Control (ABAC) Explained

The terms role-based access control and attribute-based access control are well known, but not necessarily well understood — or...

October 2, 2020
How to Avoid the Most Common Cloud Migration Challenges

Cloud provider capabilities are evolving faster than ever, and enterprises are taking notice. With all...

September 18, 2020
A Low-Risk, Low-Cost Cloud Migration Roadmap

Lifting and shifting data science operations to the cloud can be expensive and risky. From...

May 3, 2020
New Release: Native Snowflake Policy Enforcement, Dynamic k-anonymization, External Masking

As I prepared to write this blog about the value provided by our latest Immuta...

March 10, 2020
Immuta Named One of World’s 50 Most Innovative Companies by Fast Company

Today, Immuta was named to Fast Company’s annual list of the World’s 50 Most Innovative...

January 16, 2019
A Former Chief Operational Risk Officer for a Global Fortune 300 Bank on Why He Joined Immuta

“How does working for a software start-up compare to working for a massive financial institution?”...

Ethical Data Science
January 15, 2019
5 Ways Immuta Promotes Ethical Data Science & Customer Trust

Amazon’s Alexa. Apple’s Siri. Bank of America’s Erica. These are all examples of marquee “digital...

April 9, 2018
Spark Is Now In Immuta!

Announcement Immuta is happy to announce our 2.1 release which includes native SparkSQL policy enforcement....