Tag "data security"

Critical Capabilities for Detecting Insider Threats and Protecting Sensitive Data

Sensitive data is at the heart of all data breaches and protecting it is among most organizations’ top priorities. But why is protecting the data crown jewels so difficult? Firstly, regardless of controls on how data is exchanged among organizations and countries, data spread is unavoidable. Having visibility to the spread is a first order... more

Receive Expert Data Security Guidance at Informatica World 2017

The dynamic world of hybrid computing creates tremendous opportunity for organizations to share, analyze and monetize their data. Unleashing the wealth of information in vast data stores provides competitive advantage and the ability to forge satisfied and loyal customers. And the new uses and applications for data mean a continuously expanding landscape of users and... more

Challenges in Achieving Continuous Protection and Preserving Compliance

As complexity and scale increases in global computing, corporate executives at large enterprises are confronted with new data security challenges. In particular, CSOs and CXOs seek continuous, contextual and responsive protection for their enterprise data assets. Specifically, they want to providing dynamic protection as new threats or suspicious activities occur. However, despite most efforts, a number... more

2017 Security Awards: A Market Reflection

Informatica received a wealth of attribution and recognition at the 2017 ISPG Awards, held concurrently with RSA 2017. The awards’ list named Informatica as winners in numerous, but related categories:   Grand: Informatica Gold: Risk management Gold: Innovation in enterprise security Gold: Most innovative security software Gold: Best security software Gold: Best security for large... more

The Missing Link for User Behavioral Analytics: Focus on Sensitive Data

Security analytics solutions that rely only on rules to detect violations and potential threats suffer from too many false positives and the inability to identify previously unknown threat patterns. To address these shortcomings, security analytics solutions are starting to incorporate user behavioral analytics (UBA). What is User Behavior Analytics? User Behavioral Analytics has been used... more

Top 3 Data Security KPIs for 2017

It’s that time of year, publications and social are flooded with numerous articles on 2017 security predictions, trends and priorities. Publications such as eWeek, SC Magazine and Dark Reading have predictions ranging from the obvious to the obscure. I find these articles interesting and entertaining; but I would love to see score cards year-to-year on... more