What Lurks Within: Combat Insider Threats with BigID

…information beforehand is a necessity. After aligning the sensitivity classifications, leveraging the File Labeling application is the next step. In the File Labeling application, users can configure the application with…

Architecting Privacy: Identity Data As-A-Service

APIs are a reach multiplier. They can make data and applications programmatically accessible across the extended enterprise or the wider Internet. By making data and application functionality open, they have…

DSARs: The Essential Privacy Problem

…collected in all manner of data stores and then processed in all manner of application. And while organizations have developed technology for enumerating their data stores and applications they have…

Managing Risk is the Name of the Game for Data Security

…and managed by a myriad of applications. Organizations often struggle to stay on top of location, formats, access, compliance and security of all their data; whether structured or unstructured. IDC…

Data Governance 2021: Is Your Data Steward Equipped?

…building out a new application system, or a business data steward who needs to locate golden copies of data from multiple sources, a metadata-first approach enables data professionals to accelerate…

Rethinking Data Classification For The New Era of Privacy

…values and correlated identities even before classification is applied avoids one of the fundamental shortcomings of legacy classification that gets stuck on data that looks the same, but has no…

The Role of AI, ML, and Deep Learning in Privacy

…data based on relationships, and not just similarity, in ways that humans cannot. ML and Deep Learning provide a set of approaches that can be applied to specific data challenges,…