Data Privacy’s Role in Scaling Data Governance
…they try to simultaneously meet reactive needs – such as compliance – as well as more proactive ones, such as analytics initiatives. What’s standing in the way of operationalization and…
Showing 1117 results
…they try to simultaneously meet reactive needs – such as compliance – as well as more proactive ones, such as analytics initiatives. What’s standing in the way of operationalization and…
…Policy Heather Federman on what approaches can be effective at establishing that common ground, facilitating collaboration and aligning a company’s data governance protocols with its data protection policies. Join the…
…such an important juncture in the company’s evolution,” said Michael Trites, SVP, global sales, BigID. “With privacy becoming a global challenge, I look forward to enhancing BigID’s strong position in…
…AON, the largest insurance and reinsurance company in the world. The More Things Change, the More They Stay the Same When it comes to the type of security threats facing…
…said. The social network said it discovered the attack earlier this week. The company has informed the FBI and the Irish Data Protection Commission. Facebook said the investigation is in…
…to TrustArc clients can leverage this partnership to: Take action on privacy based on analysis of cloud software, files, Big Data, traditional data stores and of data platforms Automate their…
Enterprise data discovery and intelligence provider BigID has raised $30m in a Series D financing extension, bringing the total raised in the round to $100m, and valuing the company at…
…on surveying stakeholders is time-consuming, manual and impressionistic at best. Because the output is also divorced from the data, enterprises that are required to produce documentation for regulators and auditors…
…learning. Identify duplicate, redundant, and similar data. Categorize and automatically label using BigID. Reduce security and privacy risk with minimization. Rationalize infrastructure and cloud costs through data and system consolidation.…
Whether SaaS or IaaS, every enterprise has embarked on one cloud initiative or another. Most enterprises, however, still have data locked inside the data center in different databases, files shares,…
Delegate security remediation to data owners: Change access privileges. Delete or tombstone files. Orchestrate encryption.…