Topic "Product"

Is Your Data Ready to Maximize Value from Your CRM Investments?

A friend of mine recently reached out to me about some advice on CRM solutions in the market.  Though I have not worked for a CRM vendor, I’ve had both direct experience working for companies that implemented such solutions to my current role interacting with large and small organizations regarding their data requirements to support... more

5 Ways to Comply With the New EU Food Information Regulation

On December 13, 2014, the EU food information regulation 1169/2011 took effect. The new legislation requires that consumers be able to make informed purchases by ensuring that they have access to accurate product information. This information includes nutritional values, allergens and ingredients for any pre-packaged food or beverage products prior to purchasing them. Allergy statistics... more

Big Data Driving Data Integration at the NIH

The National Institutes of Health announced new grants to develop big data technologies and strategies. “The NIH multi-institute awards constitute an initial investment of nearly $32 million in fiscal year 2014 by NIH’s Big Data to Knowledge (BD2K) initiative and will support development of new software, tools and training to improve access to these data... more

Informatica’s Response To the POODLE SSL v3 Vulnerability

The information security industry is an “arms race”, with attacks always getting better. To that end, it’s important that security controls and implementations be designed with flexibility and agility in mind. The SSL protocol was originally developed by Netscape Communications, the company that helped fuel the Internet generation. For the past 20 years, we’ve seen... more

Which Method of Controls Should You Use to Protect Sensitive Data in Databases and Enterprise Applications? Part II

To determine what is the appropriate sensitive data protection method to use, you should first answer the following questions regarding the requirements: Do you need to protect data at rest (in storage), during transmission, and/or when accessed? Do some privileged users still need the ability to view the original sensitive data or does sensitive data... more

Which Method of Controls Should You Use to Protect Sensitive Data in Databases and Enterprise Applications? Part I

I’m often asked to share my thoughts about protecting sensitive data. The questions that typically come up include: Which types of data should be protected? Which data should be classified as “sensitive?” Where is this sensitive data located? Which groups of users should have access to this data? Because these questions come up frequently, it... more

Informatica Responsible Disclosure Policy

Notifying Informatica of Security Issues Our team of security experts strive to quickly address security issues involving our products and services. For guidance please see below: Problem or issue Informatica contact or resource How do I report a security problem in an Informatica application, online service, or website? Email Responsible_Disclosure@informatica.com How do I provide feedback... more