Simplify Data Security in 3 Steps with Immuta & Concord
With 120 zettabytes of new data generated every day, it’s safe to assume that systems...
Unique Data, Unique Solutions: Customizing Sensitive Data Discovery
In the world of data management, not all sensitive data fits neatly into predefined categories....
Why Is Multi-Cloud Networking So Complicated?
One of the challenges that many SaaS products face as they mature and move into...
How Immuta Earned AWS Data and Analytics Competency Status
We are thrilled to announce that Immuta has achieved the prestigious AWS Data and Analytics...
Snowflake Names Immuta 2024 Data Cloud Product Data Security Partner of the Year
We are thrilled to announce that Immuta has been named Snowflake’s Data Cloud Product Data...
Immuta Introduces Multi-Layered Security for RAG-Based GenAI
How Snowflake’s New Horizon Features Make Your Immuta Integration Even Better
Any leading organization will tell you that data isn’t a nice-to-have – it’s table stakes...
How to Define Data Domains for Distributed Ownership
How much time have you spent sifting through organization-level data trying to find the right...
Scaling Secure Data Access Management and Use with Immuta Domains
One of the most persistent challenges modern data-driven organizations face is the divide between IT...
Why Data Security is the Missing Link to Business Value
The number one performance indicator for most businesses is value. How much value will this...
Enhancing Databricks Unity Catalog for Evolving Data & AI Governance
In the 2024 State of Data Security Report, a vast majority (88%) of data professionals...
Discover Frameworks: Bridging the Gap Between Regulation & Application
“What data do we have?” Data’s entire life cycle – from collection, to analysis, to...
How Immuta’s Data Source List Improves Visibility & Data Use
New Year’s is a time for change, for bettering oneself, for taking that first step...
Enabling Cloud Infrastructure Security for Storage & Compute
Pushes toward self-service data use, advancements in AI, and the demand for real time, granular...
How Immuta’s Native Integration Supports Amazon S3 Security
Over the past year, we’ve witnessed an unprecedented surge in the development and democratization of...
Immuta Discover Provides Accurate & Actionable Metadata for Data Security
Data is more critical than ever. Large Language Models (LLMs) and Generative AI are taking...
Data Security Posture Management With & Without Data Classification
Data Security Posture Management Data security has become a critical concern for organizations of all...
Elevating Data Security for Snowflake and Databricks
Over the past several years, the Immuta team has worked closely with product teams at...
Introducing Immuta’s Scalable Localized Sensitive Data Discovery
Effective sensitive data discovery (SDD) capabilities are essential for data protection, governance, and regulatory compliance....
Inside Immuta’s Databricks Unity Catalog Integration with Row- & Column-Level Controls
Immuta continues to innovate in partnership with Databricks, and we’re excited to announce the general...
How Immuta & Snowflake Unlock Zero Trust Data Security for Government & Education
In today’s tech-driven world, data security is a paramount concern for every industry. But when...
Databricks + Immuta: Powering the Future of the AI-Augmented Enterprise
The modern business is driven by data and AI. Decisions are no longer based on...
How Does Data Classification Help Protect Data Privacy?
As data breaches and cyber attacks become more common, protecting data privacy is an increasingly...
Moving from Legacy BI Extracts to Modern Data Security & Engineering
Before we can talk about modernizing from a legacy Business Intelligence (BI) extract, we need...
Immuta Enhances Starburst & Databricks Integrations, and Introduces Dynamic Query Classification
We are excited to announce Immuta’s latest product updates, including: General availability of our v2...
Building Momentum Through the Google Cloud Ready – BigQuery Designation
We are extremely excited to announce that Immuta has achieved Google Cloud Ready – BigQuery...
Immuta Enables a Seamless Data Security Integration with Snowflake & Starburst
We are excited to announce that Immuta’s latest Data Security Platform release is here, enabling...
8 Reasons to Choose Immuta’s SaaS Data Security Platform
Data is the lifeblood of any organization, and keeping it secure is of the utmost...
Immuta’s Continuous Data Security Posture Management & Snowflake Integration Automation
We are excited to announce that Immuta’s latest SaaS release is here, providing customers with...
Immuta Detect Provides Continuous Cloud Data Security Posture Management
Immuta Enhances Databricks & Snowflake Integrations and Performance
We are excited to announce that Immuta’s latest product release is here, offering deeper native...
Scaling Data Access Auditing with Immuta’s Unified Audit Model
With massive amounts of data being generated each day, and an increasing number of people...
Improved Orchestration and Deepened Collaboration from Immuta’s Latest Release
Immuta’s latest release is here, and we are excited to share the new orchestration and...
Immuta Spotlight: Bob Boule on SaaS Data Security Platforms for Enterprise
As more organizations continue to shift their data to the cloud, teams are often confronted...
Google BigQuery Access Control and Other Features from Immuta’s Latest Release
Immuta’s latest release is here, and we are excited to share the new features and...
Sensitive Data Discovery Tools for Modern Data Stacks
As modern data stacks become more complex, data teams need more efficient ways to manage...
Scaling Secure Data Access with Immuta & Databricks Unity Catalog
For data engineers, the effort required to wrangle access policies grows exponentially as the complexity...
Enabling Tableau Row-Level Security with Snowflake & Immuta
The ability to efficiently discover data and visualize it in meaningful ways has never been...
What is Policy-as-Code and Why is it Important?
In the cloud computing era, ensuring data policy is co-created with data is essential. Historically,...
Simplify Data Access for Starburst’s Federated Query Engine and Data Mesh
Immuta + Starburst Integration As market demand for data mesh has grown, the need for...
Immuta Introduces New Capabilities and Integrations to Enhance Security for Cloud Data
The data security and privacy space continues to evolve to keep pace with the constantly...
Immuta’s $100M Series E Funding and Why We’re the Leader in Secure Data Access
I’m excited to announce Immuta’s $100M Series E funding, bringing our total funding to $267M....
How Latch Enables Secure Self-Service Data Analytics with Immuta & Snowflake
A decade ago, having a camera on your doorbell or being able to unlock your...
What is a Data Mesh Architecture and How Does it Work?
Governance and security are hot topics in data mesh, as evidenced by the recent webinar I co-presented...
Simplifying Snowflake Security with Alation & Immuta
This blog was co-authored with Deepak Nelli, Director of Sales Engineering at Alation. The modern...
Protect Sensitive Data with Key Privacy Enhancing Techniques
According to the Identity Theft Resource Center, there were 1,862 data breaches in 2021, exceeding the...
The Costs of Cloud-Based Access Control: DIY vs. Automated
It’s no surprise that nearly 90% of organizations rely on a multi-cloud strategy to get...
How To Easily Adapt Data Access Management for Table Grants
Attribute-based access control (ABAC) grants or restricts access to data using context-based decisions based on...
What is ABAC? Attribute-Based Access Control 101
There’s a lot of confusion in the market about attribute-based access control (ABAC) and what it actually...
The Myth of Vendor Lock-In: Building vs. Buying in the Federal Market
Recently, across the social media spectrum there has been an uptick in government program leaders,...
3 Best Practices for Maximizing Data Management Efficiency
In 2020, global spending on cloud data services reached $312 billion. In 2022, Gartner estimates...
How to Implement Immuta with Collibra
Immuta is the universal cloud data access control platform that gives data engineering and operations...
Why a Data Management Framework is Essential
Is it possible to manage a successful business or organization if you’re not successfully managing...
Why Is GDPR Compliance Important and How Do I Achieve It?
A modern analytics environment is typically built to reduce time to data, leaving compliance as...
Understanding Differential Privacy
Collecting and analyzing aggregated data is essential in today’s connected world, but are you doing...
Understanding Differential Data Privacy
In today’s day and age, we’re accustomed to technological advances and capabilities being uncovered all...
GigaOm Report Positions Immuta as the Leader in Data Access Control
Data access control and governance are central tenets of a strong cloud data strategy. As...
Cloud Data Security: A Complete Overview
With cloud data platforms becoming the most common way for companies to store and access...
What Is a Data Clean Room?
As data has become one of the most prized resources for companies around the world,...
What is Data Orchestration?
Data orchestration is the process of bringing together data from various storage locations, combining it...
What is Metadata Management?
Metadata management is the collection of policies, processes, and software/hardware platforms used to manage and...
Immuta vs. Ranger: Research Comparison Finds Immuta’s ABAC Reduces Policy Burden by 75x
The role-based access control versus attribute-based access control debate has been going on for decades....
What Is Data Redaction?
There’s an old adage that all press is good press, but one kind of attention...
Why You Need a Data Audit Trail
Data leaks are everywhere in the news. Is your company safe and readily able to...
How Policy-as-Code Automates Fine-Grained Access Controls
Writing or modifying scripts, managing templates, or creating policy for cloud data platforms is historically...
Data Masking Tools and Solutions
Data masking is one of the most important tasks in data governance. It may seem...
SQL Is Your Data Mesh API
What Is a Data Mesh? As Zhamak Dehghani describes in her original article, “How to...
What is Data Generalization? A Complete Overview
Data generalization is the process of creating a more broad categorization of data in a...
Data Lake Governance: What Is It and Do You Need It?
Data lakes have become essential tools for businesses in the era of Big Data. But...
Enabling Third Party Sharing with Databricks Data Sharing
Would you like to monetize your internal data by sharing it externally with third parties?...
Immuta’s Universal Data Access Control for Lakehouse Architectures
As companies started moving data to the cloud and separating compute and storage for added...
What is Data De-identification and Why is It Important?
Data de-identification is a form of dynamic data masking that refers to breaking the link between data...
Taking Policies the Last Mile with Looker & Immuta
“Don’t Repeat Yourself” is a powerful principle for software engineers and data professionals. But staying...
What is Fine-Grained Access Control? (And Why It’s So Important)
One of the most traditional methods of determining who can and cannot access certain data...
Dogfooding Data Access Control
Data access control: quixotic enterprise initiative, or the top priority of a startup’s first data...
5 Important Things to Look For in a Data Governance Tool
A data governance tool can help your organization automate data governance at scale, increase data...
How The Center for New Data Saved $1 Million with Immuta
By the time COVID-19 was classified as a pandemic, it was already spreading like wildfire....
How To: Access Controls in Databricks Using Immuta
The pros and cons of role-based access control (RBAC) and attribute-based access control (ABAC) have...
Immuta’s Latest Release: Unlocking the Power of the Cloud Data Ecosystem
As data teams modernize their data stacks for the cloud and adopt multiple cloud data...
Data Engineering is Critical to Driving Data and Analytics Success
Organizations are increasingly relying on data analytics to mine insights that drive business results. Data-driven...
Role-Based Access Control vs. Attribute-Based Access Control
The terms role-based access control and attribute-based access control are well known, but not necessarily well understood — or...
How to Avoid the Most Common Cloud Migration Challenges
Cloud provider capabilities are evolving faster than ever, and enterprises are taking notice. With all...
A Low-Risk, Low-Cost Cloud Migration Roadmap
Lifting and shifting data science operations to the cloud can be expensive and risky. From...
New Release: Native Snowflake Policy Enforcement, Dynamic k-anonymization, External Masking
As I prepared to write this blog about the value provided by our latest Immuta...
Immuta Named One of World’s 50 Most Innovative Companies by Fast Company
Today, Immuta was named to Fast Company’s annual list of the World’s 50 Most Innovative...
A Former Chief Operational Risk Officer for a Global Fortune 300 Bank on Why He Joined Immuta
“How does working for a software start-up compare to working for a massive financial institution?”...
5 Ways Immuta Promotes Ethical Data Science & Customer Trust
Amazon’s Alexa. Apple’s Siri. Bank of America’s Erica. These are all examples of marquee “digital...
Spark Is Now In Immuta!
Announcement Immuta is happy to announce our 2.1 release which includes native SparkSQL policy enforcement....