Tag "Secure@Source"

How Mature is your Organization’s Security Program?

Perimeter defense is dead since there is no longer a perimeter. An organization’s data exists everywhere, on premise, in the cloud, and on multiple devices. Availability of data to be accessed from anywhere, any device and any location in the world, allows for maximum productivity, enables business to be conducted from anywhere, and improves customer... more

Who is Accountable for a Breach to Your Data Integration Environment?

Enterprise Data usage has never been higher than it is today; and data usage is continuing to grow as Data fueled applications are the norm. The variety of sources, the volume, the transformations and prolific use of Data makes Data-Integration a critical ‘hub’ of enterprise data that enables critical business processes. In this Golden Age... more

What’s the Cost of a Data Breach in Telecoms?

Now that the European Union has passed the General Data Protection Regulation (GDPR) many Communications Service Providers (CSPs) are taking steps to ensure they are ready for the regulations and protected from the risk of a data breach. In general the telecoms industry has been focused on security for a long time but the focus... more

Secure@Source Version 2: Data Visibility, Risk and Financial Impact

I don’t think I’m overstating anything by calling the next 10 years “The Decade of Data” –  data of every variety, volume and use proliferates to meet the insatiable demands of analysts, executives, marketers and researchers.  Rich data sets provide the means for insights and answers to complex questions that create competitive advantage or research breakthroughs. ... more

Securing Sensitive Information in the Big Data World

The last year have seen a lot of improvements in big data security.  Some are available natively as part of the Apache framework and various Hadoop distributions.  Different distributions have different levels of security capability.  While additional security is offered through distribution-neutral software solutions, like Informatica Data Security.  Let’s review the following security categories and... more

SailPoint Partners with Informatica Secure@Source

As part of the Informatica Secure@Source launch, Data Security Group Director of Business Development, Christophe Hassaine, interviewed our partner SailPoint’s Vice President of Product Management, Paul Trulove.  They discuss the importance of data security intelligence to ensure effective identity and access management Christophe: Tell us a little more about what SailPoint does? Paul: SailPoint is... more

Vormetric Partners with Informatica Secure@Source

Informatica recently launched the industry’s first data security intelligence offering, Secure@Source. Informatica’s Data Security Group Director of Business Development, Christophe Hassaine, interviewed our partner Vormetric’s Vice President of Product Management, Derek Tumulak to get his take on how our complementary solutions address the need for more data centric security. Christophe:  Derek, tell us a little... more

Data Privacy Needs Data Security Intelligence and Controls

In an RSA Conference session entitled IAPP: Engineering Privacy: Why Security Isn’t Enough, Sagi Leizerov, E&Y’s Privacy Practice leader began with a plea: ‘We need effective ways to bring together privacy and security controls in an automated way” Privacy professionals, according to Sagi, essentially need help in determining the use of information – which is... more