Skip to content

Blog

Bridge the Data Center and Cloud

March 16, 2020

β€’ By Dimitri Sirota

Whether SaaS or IaaS, every enterprise has embarked on one cloud initiative or another. Most enterprises, however, still have data locked inside the data center in different databases, files shares,…

Blog

Simplify Security Self-service Remediation

June 1, 2020

β€’ By Dimitri Sirota

Delegate security remediation to data owners: Change access privileges. Delete or tombstone files. Orchestrate encryption….

Blog

BigID + Atakama: Data-Centric File Encryption

February 17, 2022

β€’ By Neil Patel

…innovative multi-factor encryption and distributed key architecture optimized around a data asset’s level of sensitivity. Per defined policies, Atakama protects files by automatically applying file-level encryption without relying on usernames…

Blog

BigID + MIP: Data Labeling Redefined

March 8, 2022

β€’ By Neil Patel

…different environments. Import labels from MIP into the BigID catalog, and then trigger the same labels to apply to similar files across other disparate data environments, such as AWS Lake…

Blog

How to Prevent Data Leaks in Amazon S3

September 15, 2020

β€’ By BigID

…Uncover overexposed data, easily find over-permissioned and open access files at a glance, and protect sensitive data across the organization to minimize the risk of data leaks and data breaches….