Skip to content

Blog

4 Ways to Mature Your DCAM Capabilities with BigID

April 30, 2021

By Peggy Tsai

…step from “developmental” to “defined” is known as “the capability chasm,” and presents challenges for organizations that include: monitoring new business and data models, data inventory, and data sets continuously…

Blog

SOAR & BigID

December 19, 2022

By Tyler Young

…security workflows, prevent attacks, reduce risks, and enable the business. Top SOAR vendors include Demisto, Phantom, and Torq. How to Accelerate SOAR Results with BigID Over the last quarter, the…

Blog

Architecting Privacy: Identity Data As-A-Service

November 28, 2016

By Dimitri Sirota

…design. So while BigID’s identity data APIs provides a springboard to identity data as-a-service, it simultaneously promotes a future of enhanced identity data protection and privacy.        …

Blog

Privacy and Security Metadata Enrichment

June 1, 2020

By Sarah Hospelhorn

…discovered, collected, and imported privacy and security metadata. Capture purpose-of-use for collected data. Flag Opt-in and Opt-out consent. Detect open access and over-permissioned data for structured and unstructured data.  …