
Bridging AI and Data Governance: How the 51蹤獲 Marketplace Solution Elevates RAG Systems
Technologies like retrieval-augmented generation (RAG) are transforming how organizations apply AI to tackle real-world challenges. By merging generative AI with curated, real-time data retrieval, RAG systems provide accurate, relevant, and actionable results, without the resources needed to build a custom LLM from scratch. However, the data powering these systems is...

Beyond the Basics: How to Expand Your AWS Lake Formation Investment
Organizations increasingly rely on data lakes to store, manage, and analyze vast amounts of information from various data sources. But building a data lake specifically on AWS allows you to leverage a comprehensive cloud ecosystem with a wide array of services. In this blog, well dive deeper into how to...

How to Drive Business Value with Data Sharing & Governance
No one in todays market can or would deny that data is critical to driving business and innovation. But data alone isn’t enough. To truly unlock its potential, organizations need to effectively share and govern their data assets. Clearly, data sharing is fundamental to business as we know it, says...

How to Share Insights & Success with Data Marketplaces
The rise of the internal data marketplace When Clive Humby described data as the new oil back in 2006, he was mainly talking about the huge strategic value that it can deliver. Two decades on, and his assertion holds true. In that time, though, its also become clear theres a...

Driving Change: Automotive Innovation in the Data & AI Era
Autonomous vehicles From basic features like lane assist and self-parking, through to advanced capabilities like sensor fusion and pattern recognition, data is quite literally the driving force behind autonomous vehicles. Self-driving cars also generate a great deal of sensitive information, such as location data and driving habits. Ensure...

How to Maximize Amazon Redshift Spectrum Data with 51蹤獲
Organizations are constantly finding new ways to make their growing datasets work harder for them. Amazon Redshift Spectrum offers a flexible solution, bridging the gap between data lakes and warehouses to eliminate unnecessary complexity. By pairing it with 51蹤獲s robust data governance capabilities, they can move even faster securely...

Managing Big Data, Simplified: Amazon EMR with 51蹤獲
Data has become the cornerstone of modern business success, driving everything from customer personalization to inventory management. But more data means more complexity and organizations need a way to efficiently control access while maintaining compliance, particularly as operations scale. Amazon EMR with Apache Spark gives businesses the tools to...

Making Amazon Athena Work Smarter with 51蹤獲
As AI and other technologies accelerate demand for data and consequently, more users require access to this data to leverage its potential and drive innovation. Leading organizations leverage platforms like Amazon Athena in order to make that data available for analysis. But often, they must navigate the complexity of governing...

AI in Automotive, Explained
As topics go, they dont come much hotter than artificial intelligence (AI). AI isnt just another buzzword or passing trend. Its a technology that promises to have a genuinely transformative impact on the automotive industry. From the supply chain to the powertrain, AI promises to revolutionize everything from design and...

Driving Data: How Smart Cars Collect and Put Data to Work
The car isnt just a car anymore. Its the center of a dynamic and ever-expanding data ecosystem. From design and development through to services and subscriptions, data has become the driving force in automotive today. For manufacturers, that creates challenge and opportunity in equal measure. Extracting the right...

The E-Trade Moment for Data
Before 1992, if you wanted to buy a stock, youd call your stockbroker to place, buy, or sell orders. The stockbroker would then communicate the order to the trading floor or exchange desk. The process created a barrier of entry for average consumers, and the banks involved leveraged manual, people-driven...

Why Internal Data Marketplace Adoption Is Growing Faster Than Ever
At 51蹤獲, we work with the worlds most complex and secure organizations, and almost all have one thing in common: a desire to enable data and analytics through an internal data marketplace. This is quite different from the data space a mere two years ago, which gravitated toward centralized operations....

The 10 Commandments of an Internal Data Marketplace
Like most data initiatives, data marketplaces are meant to deliver value. But unlike those other initiatives, data marketplaces have an edge they increase the potential of the entire business by clearly defining the roles, rules, and capabilities that lead to success. To truly maximize the value that data marketplaces...

Simplify Data Security in 3 Steps with 51蹤獲 & Concord
With 120 zettabytes of new data generated every day, its safe to assume that systems and processes that worked even five years ago are struggling to keep up with the demand for data. But keeping up with new and evolving technologies can be a full-time job. And, its clear from...

Unique Data, Unique Solutions: Customizing Sensitive Data Discovery
In the world of data management, not allsensitive datafits neatly into predefined categories. Many organizations deal with unique data types and formats that standard data discovery frameworks fail to recognize. As data protection regulations become more stringent, the ability to identify and manage sensitive data accurately is crucial. However, the...

Navigating Organizational Change When Implementing a Cloud Data Governance Strategy
The adage that we are a software company is quickly becoming we are a data company. In todays world, software is only as good as the data within it and the ability to deploy it. As the wave of organizations leveraging cloud data platforms likeSnowflakeandDatabrickscontinues to build, enterprises must...

Why Is Multi-Cloud Networking So Complicated?
One of the challenges that many SaaS products face as they mature and move into enterprise markets is a growing demand for private networking. This is because companies may be wary of allowing access to potentially sensitive internal services over the internet and in our experience with 51蹤獲 as...

How 51蹤獲 Earned AWS Data and Analytics Competency Status
We are thrilled to announce that 51蹤獲 has achieved the prestigious AWS Data and Analytics Competency status. This recognition fromAmazon Web Services(AWS) highlights our dedication to delivering top-tierdata securityand analytics solutions for joint customers, and is an exciting next step in our long-standing partnership with AWS. Earning AWS Data and...

Bolstering LLM Security to Protect Against OWASP Top Ten Threats
Were all witness to the buzz around Generative AI (GenAI). These offerings, which convert user prompts into model-generated text, images, and videos, have permeated our professional and personal lives as they become increasingly accessible. One incredibly prevalent type of GenAI is the Large Language Model (LLM), which includes the likes...

Does Your Business Speak Data? An Argument for Data Literacy
In our super-connected world, data is everywhere, influencing every choice, interaction, and experience we have each day. Simply having data isnt a bragging right anymore its table stakes. The real game-changer for a modern company is its knack for turning that raw data into a goldmine of insights. Think...

How Data Modernization Fuels Innovation at Booking.com
Maintaining the status quo has never been part of any competitive or innovative business strategy. From startups to large enterprises,data modernizationis a priority because of the technological and business benefits it delivers. The modernization process gives teams the opportunity to innovate within their data ecosystem. Whether it be an architectural...

What Major Data Breaches Can Teach Us About Layered Security
Recent data breaches atTicketmasterandSantanderhave underscored the critical vulnerabilities that exist in enterprise data security strategies. These havent just interrupted operations theyve impacted hundreds of millions of customers, eroding trust in well-known and widely used brands. This is particularly pronounced for Ticketmaster, given the companysrecent headlines. Since before 51蹤獲 existed,...

How Mercks Governance Strategy Balances Innovation & Security
Many data teams especially at large enterprises fall victim to a difficult paradox: while they generate vast amounts of data across lines of business, actually accessing and using it is incredibly difficult. Take Merck for example, the worldsthird largestpharmaceutical company by revenue. Data flowing in from their R&D,...

3 Steps for Countering Bias in AI/ML Data Sets
Advancements in Artificial Intelligence (AI) and Machine Learning (ML) are revolutionizing the way we work with data across sectors. By enabling enhanced decision-making and faster operations, these models present us with unparalleled capabilities but they are not immune to some very human problems. One of the most critical challenges...

Snowflake Names 51蹤獲 2024 Data Cloud Product Data Security Partner of the Year
We are thrilled to announce that 51蹤獲 has been namedSnowflakes Data Cloud Product Data Security Partner of the Yearfor the second year in a row. This recognition is deeper than the technical aspects of our product integration it highlights our shared commitment to de-risking our customers data and delivering...

51蹤獲 Introduces Multi-Layered Security for RAG-Based GenAI
The rapid rise and evolution of GenAI applications is making quotes like this quite common. In fact,a recent surveyby 51蹤獲 found that 80% of data experts agree that AI is making data security more challenging. Despite this,88% saytheir employees are using AI, regardless of whether the company has officially adopted...

How Snowflakes New Horizon Features Make Your 51蹤獲 Integration Even Better
Any leading organization will tell you that data isnt a nice-to-have its table stakes for competing in todays environment. So, its no wonder that many of these companies rely on the Snowflake Data Cloud to power analytics and AI workloads. Since 2018, 51蹤獲 has worked product-to-product withSnowflaketo develop a...

Combining Data Mesh and Data Fabric for Next-Gen Data Security
While theymay be different on a conceptual level, data fabric anddata mesharent mutually exclusive concepts. Within the right data strategy, the two frameworks can actually work together, with data fabric providing a unified data access layer for a largerdata mesh architecture. The choice of whether it makes sense to leverage...

How to Secure Your Data in the Snowflake Financial Services Data Cloud
The world of financial services never sleeps and in this always-on industry, delays, mistakes, or indecision can literally cost millions. But speed cant come at the expense of compliance, which puts data teams in a unique and complex position. Do you grant access to data at the speed of...

What the Power Grid Can Teach Us About Data Sharing
British mathematician Clive Humby is credited with coining the phrase data is the new oil. Respectfully, this statement no longer rings true anddata sharingis one of the main reasons why. A lot has changed since 2006, when Humby first made this comparison. To put it into perspective, Twitter launched...

Why Collaboration and Controls are Central to Data Risk Management
We operate in a world of risks. Whenever we get behind the wheel of a car, flip a light switch in our home, or enjoy an alcoholic beverage, we are accepting an inherent level of risk associated with each activity. But this doesnt stop us from doing them. Similarly,cloud data...

How Vizient Delegates Data Ownership to Optimize Operations
Vizientis the nations largest provider-driven healthcare performance improvement company, serving more than 65% of the nations acute-care hospitals. The company provides analytics-enabled solutions to improve care quality, as well as spend management. To ensure efficient control of how data is managed and accessed, while also complying with legal, industry, and...

Now is the Time for Risk-Aware Data Security & Access Controls
From artificial intelligence and machine learning advancements, to decentralized cloud storage and analysis, and other novel use cases, were seeing data innovations happening before our eyes. At the same time, data breaches and noncompliance penalties are increasingly common and costly, and threats to data will only continue to grow. In...

How to Define Data Domains for Distributed Ownership
How much time have you spent sifting through organization-level data trying to find the right data sets for your specific needs? Not to mention that once you find what youre looking for, you may find yourself waiting for a centralized IT team to approve your access request which could...

The AI Security & Governance Report
Nearly 700 data leaders share how AI impacts their approach to data security andgovernance.

Enabling Cloud Infrastructure Security for Storage & Compute
Pushes toward self-service data use, advancements in AI, and the demand for real time, granular data insights have led to a surge in unstructured data volumes and usage.Research showsthat 90% of new enterprise data is unstructured, and it is growing at three times the rate of structured data. This begs...

Clinical Trials Reimagined: The Impact of Secure Data Sharing on Pharma R&D
Life sciences organizations have traditionally been early adopters of data science and analytics practices, which have revolutionized how they conduct research, develop life-saving therapies, deliver personalized medicine, and optimize their operations. Central to these advances is the ability to share data among healthcare providers, researchers, regulators, and more. Data sharingfosters...

A Guide to Enabling Inter-Domain Data Sharing
For many, the appeal of a decentralized data architecture relates to its potential for enhanced collaboration. But to achieve this kind of streamlined collaboration, your team must first establish a system of secure, self-service domains. In aprevious blog, we explored how to make decentralizeddata mesh architecturesa reality based on phDatas...

Balancing Collaboration and Compliance with Data Marketplaces
Although we are living in an age of unprecedented data generation, none of it matters if we cant make that data available for analysis in a secure and timely manner. In order for users to analyze and derive insights from data, it must be discoverable and accessible. Streamlining accessibility has...

Implementing Privacy Controls for Genomics
Genomic data holds significant promise in advancing personalized medicine, streamlining disease treatments, and improving health outcomes. By leveraging individual genetic profiles and biomarkers, genomic data allows researchers to improve treatment accuracy and efficacy. But this promise carries significant privacy risks. The volume and high dimensionality of genetic data introduces a...

Scaling Secure Data Access Management and Use with 51蹤獲 Domains
One of the most persistent challenges modern data-driven organizations face is the divide between IT teams and business units. With data ownership largely in one camp and data use in the other, this gap hinders effective data collaboration, resulting in disjointed efforts and missed business opportunities. At the heart of...

3 Best Practices for Maximizing Data Management Efficiency
In 2020, global spending on cloud data services reached $312 billion. In 2022, Gartner estimates that this number will rise to a staggering $482 billion. This immense increase proves that the migration to and adoption of cloud platforms is the bona fide standard for contemporary information services and analysis. With...

A Multi-Pronged Approach to Cybersecurity Risk Management Frameworks
The federal governments Risk Management Framework (RMF) offers agencies guidelines, standards, and processes to help secure information systems. According to senior cybersecurity leaders speaking at theAFCEA TechNet Augustaconference, however, the RMF does not in itself make government networks more secure. The RMF provides agencies with a process to evaluate their...

Data Leaders Top 4 Security Trends for 2024
Its easy to talk about trends in absolutes. This new development will affect jobs across every sector, and this new platform is going to be everywhere these kinds of blanket statements remove nuances that can be incredibly important when discussing trends. Instead, we should focus on questions like How...

Enhancing Databricks Unity Catalog for Evolving Data & AI Governance
In the2024 State of Data Security Report, a vast majority (88%) of data professionals reported that employees at their organizations are using artificial intelligence (AI). But, only 50% said that their organizationsdata security strategyis keeping up with AIs rate of evolution. This exemplifies a growing challenge were facing with contemporary...

Discover Frameworks: Bridging the Gap Between Regulation & Application
What data do we have? Datas entire life cycle from collection, to analysis, to insights and business-driving application begins with this question. Understanding your organizations data remains critical to effectively using and protecting it, especially as platforms, users, and data sets constantly evolve. But gaining a contextual understanding...

How to Make Data Mesh a Reality: An Implementation Roadmap
We recently conducted an intriguingwebinarexploring the data mesh concept, and how its transforming the way enterprises decentralize data to enable cross-functional, self-service products tailored to users needs. Though appealing for most organizations, executing adata meshposes real complexities. At phData, weve implemented several successful data mesh platforms for our customers, and...

How 51蹤獲s Data Source List Improves Visibility & Data Use
New Years is a time for change, for bettering oneself, for taking that first step towards the future. Its no different at 51蹤獲 weve resolved to make ourData Security Platformeven better for ourcustomers. And just like our New Years fitness goals start with simple habits, our new and improved...

51蹤獲 & Snowflake Horizon: Integrated Solutions for Data Governance Use Cases
For organizations likeThomson ReutersandInstacart, which rely onSnowflaketo execute advanced analytics on complex workloads, the 51蹤獲Data Security Platformprovides peace of mind through end-to-enddata securityand access control. 51蹤獲s native integration with Snowflake delivers automated, scalable data discovery, security, and monitoring, and the seamless user experience and close collaboration earned 51蹤獲 the title...

3 Emerging Data Security Laws and What They Mean for You
The past few months have been particularly hectic for lawmakers across the European Union (EU). With Ursula von der Leyens leadership of the European Commission set to conclude after the 2024 elections, lawmakers have felt the pressure to advance critical files and policies as quickly as possible. Amid this legal...

Unlocking Education Data Analytics for the Future of Work
It goes without saying that employee engagement is a key indicator of organizational performance Harvard Business Reviewreports that having happy, engaged employees increases productivity by 13%, not to mention its impact on retention and culture. Yet,studies showthat employees are more dissatisfied and apathetic than before the pandemic. While many different...

The Intersection of Data Security and IAM
As more capabilities become automated as part of cloud services, we find that ourcustomersare reluctant to give up control overdata security. The complexity of managing policies and granting access involves a degree of hands-on management, and customers want to own that responsibility. In the Gartner report,Predicts 2024: IAM and Data...

How Booking.com Streamlines Snowflake & AWS Data Security
If theres one lesson from the constant advancement of data use and technology, its that theres always room for improvement. Even the most sophisticated data infrastructure can be tuned up with new and improved capabilities that streamline data access and use. This was the case for Booking.com, which recently decided...

How Snowflake, phData, and 51蹤獲 Approach Data Mesh Challenges
Moving from concept to execution can be a complicated process especially with data mesh architectures. But by understanding and preparing for obstacles, you can make the implementation process as streamlined as possible. In our recent webinarData Mesh vs. Data Security: Can You Have Both?, 51蹤獲 Senior Product Manager Claude...

The Complete Guide to Data Security Compliance Laws and Regulations
Compliance regulations in the data security space are constantly changing and evolving, with more new acronyms for regulatory standards being introduced every year. In our global economy, staying compliant with government and industry regulations can be challenging, but with the right strategies, it doesnt have to be a major burden....

What Is the EU-US Data Privacy Framework & How Should You Plan?
The General Data Protection Regulation (GDPR) is one of the most wide-reaching and stringent datacompliance laws and regulations, with penalties for violating its terms reaching 4% of an organizations prior year worldwide turnover. Although some of its provisions, such asChapter 5, have fed more debate and litigation than others, its...

The One Policy Approach to Policy-Based Access Management
In hisLord of the Ringsseries, J.R.R. Tolkien writes of 19 rings of power that give their bearers wealth, dominion, and control. Of these, the most powerful is the One Ring, which affords its bearer control over all other rings and, by extension, the entire world. What do rings have to...

How 51蹤獲s Native Integration Supports Amazon S3 Security
Over the past year, weve witnessed an unprecedented surge in the development and democratization of AI technologies. Companies are building proprietary models, while the average person regardless of technical expertise has tools like ChatGPT at their fingertips. AI is not just changing the waywework, its changing the wayour...

AI Acceptable Use Policy: Where to Start?
Generative artificial intelligence (AI) are prediction algorithms that are able to create any type of content, be it text, code, images, audio, or video thinkChatGPT,Bing Chat,Bard,Stable Diffusion,Midjourney, andDALL-E, for example. With the emergence of generative AI-as-a-Service which has lowered barriers to entry generative AI is spreading tomost...

Why Is GDPR Compliance Important and How Do I Achieve It?
A modern analytics environment is typically built to reduce time to data, leaving compliance as an afterthought. Yet, without a compliance-by-design approach, the analytics environment is likely to break in weeks because safeguards like purpose-based access control are missing; data minimization and de-identification techniques are inadequate and data access requests...

4 Simple Steps to Mature Your Data Security Strategy
In todays digital landscape, safeguarding your data is more important than ever. Whether youre a data platform owner, a data engineer on a busy team, or just a concerned professional who values an improved data security posture, taking steps to secure your data is crucial. But where do you start?...

Social vs. Technical: Leaders Weigh in on Data Mesh Challenges
51蹤獲 CTO and Co-Founder Steve Touw sat down with Paul Rankin, Head of Data Management Platforms atRoche, and Sanjeev Mohan, Principal atSanjMo, for an in-depth discussion about data mesh architectures. Below is an edited transcript from a portion of their conversation. To listen to the full recording,click here. Steve Touw:This...

SQL: The Forgotten API
Data meshhas become a hot topic as organizations look to foster self-service analytics to make evidence-based decisions. There are plenty of articles discussing data mesh, includingZhamak Dehghanis original blog postintroducing the topic from 2019. To get back to basics, data mesh is a socio-technical approach to creating a decentralized analytical...

Is Data Mesh Feasible for Highly Regulated Industries?
The concept of thedata mesharchitecture is widely recognized and often sought after by data teams across a variety of industries. Given its range of promising benefits including enhanceddata democratizationand business-driving data products this should come as no surprise. But with the technical, structural, and organizational overhauls required to...

Report Finds Data Security is a Priority for Over 40% ofCEOs
With data at the root of business-driving initiatives, the need to maintaindata security and complianceis becoming imperative for leaders across industries. Security measures, however, are facing an increasingly daunting landscape of potential threats. According to a new survey by theInternational Data Corporation(IDC), 54% of European organisations experienced an increase in...

Securing AI Systems: AI Threat Knowledge Bases
Artificial Intelligence (AI) systems have recently gained significantly greater visibility and use by the general public. In the next five years, the AI market isexpected to grow by 368%, reaching more than $400 billion by 2027. Numerous industries are exploring new ways to monetize AI in the form of AI-as-a-Service...

3 Key Components to Mastering Federated Data Mesh Governance
Like other modern advancements in data use, the data mesh concept is rooted in a central goal: give more users easier access to business-driving data. But like many data initiatives, implementation can be much more difficult than it seems. Adata mesh architectureis an amalgamation of moving parts, decentralizing data away...

3 Solution Patterns for Data Security Success
Youve just adopted a data security solution congratulations! Now what? As with any new piece of technology, it can be tempting to jump in feet first to solve all your problems. After all, the sooner you achieve ROI, the better right? Not necessarily. Often, we see customers struggle...

Whats the Worst That Could Happen? A Guide to AI Risks
While generative artificial intelligence (AI), foundation models, and Large Language Models (LLMs) are often described as the future of AI as we know it, their mass adoption is not necessarily straightforward. The emergence of these types of AI models has sparked concerns recently, leading to a series ofopen letters,enforcement orders(against...

Types of AI and Input Models Explained
ChatGPT is one of the fastest-growing artificial intelligence (AI)-powered apps of all time, but it is just the tip of the generative AI iceberg. The pace of AIs advancements makes it difficult to keep up with the latest terminology, let alone understand how it may impact your day-to-day responsibilities. In...

How Instacart Streamlined Its Approach to Data Policy Authoring
As organizations continuemigrating data to the cloud, they often focus on the anticipated benefits: enhanced analytics, scalability, anddata democratization, to name a few. With a results-driven focus, the challenges associated with this transformation can sometimes be overlooked. One such challenge is the need to maintain anaccess managementframework that streamlines comprehensive...

How to Assess and Defend Against the Cyber Threat Landscape
According to the United States Cybersecurity & Infrastructure Security Agency (CISA), 47% of American adults have had some amount of their personal information exposed by cyber criminals. With the volume of data that todays organizations collect, store, and leverage on a day-to-day basis, no one wants to be responsible for...

5 Best Practices for Secure Data Sharing
In our globalized world, data sharing is table stakes for organizations that want to innovate and compete.Gartnerhas predicted that enterprises that share information will outperform those that do not on most business metrics, and leading organizations likeSnowflakeandAWSare already offering data exchanges to simplify the process. But as consumers become increasingly...

How Thomson Reuters Cloud Data Protection Unlocks Snowflake Data
As modern organizations look to innovate with agility, migrating to the cloud enables them to unlock datas value at scale. Leading cloud data platforms likeSnowflakeallow data teams to store and analyze mass amounts of data, all while providing access for an ever-increasing number of users and use cases. And while...

Exploring Data Democratization: Pros, Cons, and Real-World Impact
As data is being analyzed in new ways to deliver better insights, organizations across industries are focusing on democratizing its use in order to capitalize on its business-driving capabilities. In fact,one surveyfound that 90% of data professionals are prioritizing data democratization at their companies. This sentiment is also present in...

What is Sensitive Data and How Should I Protect It?
If youve done any work with data, youve likely heard the term sensitive data.Data compliance regulationslike the GDPR, HIPAA, CCPA, and more make repeated mentions of sensitive personal data and sensitive personal information, and many privacy statements include similar language. A quick search of the term sensitive data returns more...

Data Leak Prevention for Modern Tech Stacks
When we think of threats to data, malicious hackers who are out to profit off our information tend to come to mind. But what about the risks that are hiding in plain sight? Outdated systems, shared passwords, and lax controls may all seem like low grade issues until they...

How to Mitigate Risk by Mastering Cloud Storage Security
The volume of cloud data is increasing at an exponential rate. But with this growth comes an increased attack surface, heightening the risk of dangerous data breaches or leaks. To support the operations of modern businesses and agencies across the world, data resources require storage that can remain secure at...

Elevating Data Security for Snowflake and Databricks
Over the past several years, the 51蹤獲 team has worked closely with product teams atSnowflakeandDatabricksto ensure that joint customers are able to leverage the full power of their cloud investments, while ensuring their valuable data assets remain secure. We are excited to introduce our newest suite of features that strengthen...

Inside 51蹤獲s Databricks Unity Catalog Integration with Row- & Column-Level Controls
51蹤獲 continues to innovate in partnership withDatabricks, and were excited to announce the general availability of 51蹤獲s native integration withDatabricks Unity Catalogto secure workloads on the Databricks Lakehouse Platform. With this integration, the 51蹤獲Data Security Platformnatively orchestrates security and offers the same user experience across the Databricks Lakehouse Platform using...

Securing Success: 51蹤獲 is Snowflakes 2023 Data Security Partner of the Year
Its no exaggeration to say that virtually any contemporary organization relies on data. And as data assets and use cases multiply, teams need to be able to store, access, and analyze their data securely and at the speed of business. Platforms like theSnowflakeData Cloud have met this need head-on, offering...

Updating Australian Privacy Law: The Big Shift
On February 16, 2023, Australias Attorney-Generals Department (AGD) publicised itsReview Report, the latest output in the Privacy Act 1988 review process that began in 2020. The report seeks to strengthen the Act, while retaining the flexibility of its principles-basis. One core motivation is to bring the Privacy Act closer to...

How 51蹤獲 & Snowflake Unlock Zero Trust Data Security for Government & Education
In todays tech-driven world, data security is a paramount concern for every industry. But when sensitive government or educational data is involved, the stakes become even higher. The need to protect this information, ensure citizen and student privacy, and mitigate threats to their data has never been more critical. Thats...

What is Data Modernization? Guiding Data into the Future
In a fast-moving field, established frameworks can often benefit from strategic updates. Think of your cell phone or laptop: do they still function using the same operating system that they had when you first bought them? No, they require regular updatessome more significant than othersthat routinely improve their functionality and...

Data Mesh vs. Data Fabric: Whats the Difference?
When two different concepts sound or act alike, it can be easy to conflate them. We see this in everyday life: jelly vs. jam, weather vs. climate, latitude vs. longitude, concrete vs. cement, the list goes on. In the ever-expanding world of data jargon, this kind of problem can easily...

How 51蹤獲s ISO 27001/27701 Compliance is Enhancing Data Security
As the world becomes increasingly digital, data security has become a critical concern for businesses of all sizes. Threats to data are evolving as technology and bad actors become more sophisticated, which makes the challenge of protecting sensitive information that much more complicated. Ensuring that data protection processes and policies...

5 Steps for an Effective Data Breach Response
With global business and operations so heavily reliant on data collection, sharing, and analysis, data breaches can seem inevitable. In fact, the Identity Theft Resource Center (ITRC) reports that there were445 publicly-reported data compromisesin Q1 of FY23 that affected 89,140,686 individuals worldwide. While organizations often take a proactive approach to...

Databricks + 51蹤獲: Powering the Future of the AI-Augmented Enterprise
The modern business is driven by data and AI. Decisions are no longer based on institutional knowledge or gut feel, and theyre not being made solely in the boardroom. Managers and individual contributors are expected to leverage data to make the day-to-day decisions they need to do their jobs, but...

Why Tech Companies Should Care About Healthcare Data Breaches
Health data is one of the most valuable assets organizations in the healthcare and life sciences industry can possess. Its also one of the most vulnerable. Over the years, legal steps have been taken to protecthealthcare data securityand patient privacy. The Health Insurance Portability and Accountability Act (HIPAA), passed by...

How Does Data Classification Help Protect Data Privacy?
As data breaches and cyber attacks become more common, protecting data privacy is an increasingly important concern for companies that use data to compete.According to Cybercrime Magazine, the total cost of cybercrimes is an estimated $8 trillion, and is expected to climb more than 30% in the next two years....

How Snowflake & 51蹤獲 Power Healthcare Data Sharing & Analytics
From providing quality patient care and correctly diagnosing medical issues, to developing vaccines and monitoring public health trends, efficient data use in the healthcare and life sciences industry could literally be a matter of life and death. But data use in healthcare and life sciences ishighly regulated, and patients are...

Forrester TEI Study Shows How 51蹤獲 Can Drive 175% ROI Over 3 Years
Forresters newTotal Economic Impact (TEI) study provides a detailed financial model based on interviews with six 51蹤獲 customers in order to assess the ROI of the 51蹤獲Data Security Platform. The study concludes that 51蹤獲 can provide benefits totaling $6.08M, an ROI of 175% over three years, and a payback period...

What Is Purpose-Based Access Control (PBAC)?
When it comes to making decisions, context is essential. Imagine your neighbor asks for a key to your house. If theyve agreed to watch your dog while youre away on an upcoming business trip, this question should present no issues or concerns. If theyre asking because they want to throw...

4 Steps to Improve Security Posture in Your Data Stack
As organizations look to migrate and optimize their data resources, cloud data platforms are continuing to evolve. But while these platforms offer enhanced storage, compute, and analysis capabilities for themodern data stack, they may also broaden the attack surface of data ecosystems. More platformscombined with more users and more datacan...

What is CMMC? Cybersecurity Maturity Model Certification Overview
If youve heard the term CMMC being used more frequently, youre not alone. This upcoming change in certification requirements for Department of Defense contractors and subcontractors will have major implications and require significant changes for organizations in order to continue landing government contracts Here are all the basics of CMMC,...

Cloud Data Security: A Complete Overview
With cloud data platforms becoming the most common way for companies to store and access data from anywhere, questions about the clouds security have been top of mind for leaders in every industry. Skepticism about the security of cloud-based solutions can even delay or prevent organizations from moving workloads to...

Moving from Legacy BI Extracts to Modern Data Security & Engineering
Before we can talk about modernizing from a legacy Business Intelligence (BI) extract, we need to answer the questions: why are they used? And what are they? The why behind extracts boils down toimproved query performanceon published dashboards. You can see more details about the why for data extracts in...

5 Tools for Secure Data Analytics in Okta
More organizations than ever are leveraging the power of multiple cloud data platforms for business-driving analytics. In fact,93% of organizationshave a multi-cloud strategy for analytics and data science, and 87% have a hybrid cloud strategy. In the next two years, the trend toward diverse cloud data ecosystems will continue,as more...

How to Implement Databricks Access Control with R and Scala
Databricks table ACLs let data engineers programmatically grant and revoke access to tables. With table ACLs enabled, users have no access to data stored in the clusters managed tables by default until granted access, thereby improving sensitive data security. With Databricks runtime 3.5 or above, table ACLs allow authorized users...

Building Momentum Through the Google Cloud Ready BigQuery Designation
We are extremely excited to announce that 51蹤獲 has achievedGoogle Cloud Ready BigQuerydesignation, validating our native integration withBigQueryand providing joint customers with confidence in our partnership. As part of the validation process, Google Cloud engineering teams run a series of data integration tests, compare results against benchmarks, work closely...

Scaling Identity Management in Healthcare
The average hospital has seen a90% turnoverof its workforce in the last five years, and 83% of RN staff. Nurses are not just protesting about their inability to deliver great care they are leaving the healthcare field altogether. And theyre not the only ones. From the doctors to those...

Why Data Breach Detection is Crucial for Data Security
When a data breach occurs, time is of the essence. On one level, moderncompliance laws and regulationshave set standards for the window of reporting data breaches, often requiring organizations to do so within 72 hours to avoid penalization. But monetary and legal penalties are not the most important outcomes of...

Multi-Cloud Data Security: An Overview
Why settle for one cloud when you can have a whole buffet of platforms to keep your data safe and sound? With more and more sensitive information being stored in the cloud, having a comprehensivecloud data securitystrategy is absolutely critical to prevent your data from being hacked, leaked, or stolen....

8 Reasons to Choose 51蹤獲s SaaS Data Security Platform
Data is the lifeblood of any organization, and keeping it secure is of the utmost importance. With the ever-increasing amount of data being generated and shared, organizations are facing more challengingdata securitythreats than ever before. The rise of cyber-attacks, data breaches, and regulatory compliance requirements has made data security a...

Survey Reveals 5 Insights for Implementing Zero Trust
The concept ofZero Trustis not new, but it is gaining traction asdata securitybecomes more scrutinized. Also referred to as perimeter-less security, Zero Trust has traditionally focused on employing network-centric tools that enable automated access controls, network microsegmentation, and continuous monitoring of connected devices. Following a 2021Zero Trust executive order, government...

The Next Generation of CCPA Compliance Requirements
The 2020 elections not only saw record turnout, but also ushered in a suite of new laws and lawmakers. Voters in California had a dozen propositions on the ballot, but one that has far reaching implications for citizens and organizations alike is Proposition 24, theCalifornia Privacy Rights Act(CPRA) or...

51蹤獲 Enhances Databricks & Snowflake Integrations and Performance
We are excited to announce that 51蹤獲s latest product release is here, offering deeper native integrations withDatabricksandSnowflakealongside overall performance enhancements. In this blog, well highlight our new key capabilities: Databricks Spark Integration with Unity Catalog Customers can use 51蹤獲s Databricks Spark integration to enforcefine-grained access controlon clusters inDatabricks Unity Catalog-enabled...

The 3 Most Common Data Engineering Challenges
Todays data engineering teams face various challenges wrangling massive volumes of data, dispersed stakeholders with competing priorities, and distributed data architectures. But of all these variables, which is the most taxing? In this blog, well delve into the most common data engineering challenges as reported by600 data engineers, and how...

Best Practices for Data Security in Modern Cloud Platforms
As the volume of data generated, transformed, stored, and accessed has increased, digital transformation has significantly altered how companies do business and use data to create value. To deal with increasingly complex unstructured and semi-structured data, organizations are looking to build their analytics to stay competitive. Along with this, the...

What Is Privacy Engineering And Do You Need It?
Do you have complete confidence in your organizations privacy law compliance? If your answer is no, youre in the majority. According to theInternational Association of Privacy Professionals(IAPP), only 20% of respondents report being fully confident in their companys approach todata privacy compliance. But data privacy concerns arent subsiding anytime soon...

Scaling Data Access Auditing with 51蹤獲s Unified Audit Model
With massive amounts of data being generated each day, and an increasing number of people accessing, analyzing, and sharing that data, understanding all data access activity is more than a full-time job. In fact, it can feel downright unmanageable. The good news? With the right tools, you can get the...

Why Data Monitoring is Key to Sensitive Data Protection
According toone 2022 report, 89% of companies claim that their organization is taking a multi-cloud approach to data storage and analysis. This means the data they collect lives in at least two different cloud databases, if not more. The data must be accessible to the variety of tools meant to...

3 Key Obstacles of Military Data Ops and What They Indicate
There are many lessons that I learned throughout my civilian and military careers, but one that continues to hold true is that obstacles to accessing the data national and strategic analysts need are not caused by a lack of reporting in the field. Rather, it is the technical burdens, lack...

What is Data Governance in Healthcare and Why is it Essential?
According to the U.S. Department of Health and Human Services Office for Civil Rights, there were4,419 reported healthcare data breaches between 2009-2021. As a result of these breaches, roughly 314,063,186 health data records were exposed to those with no right or legitimate purpose to access them. In the first half...

Google BigQuery Access Control and Other Features from 51蹤獲s Latest Release
51蹤獲s latest release is here, and we are excited to share the new features and integrations weve been working on: Google BigQuery Native Integration enables seamless fine-grained access controls without being in the data path Snowflake External OAuth provides secure delegated access and allows customers who use their own IdP...

Distributed Stewardship for Data Mesh Architecture
Modern enterprises rely on data to deliver insights across every line of business, from sales and marketing to finance and HR. Gone are the days when data use was limited in scope todays increasingly decentralized data initiatives and architectures require decentralized access management. Continuing to consolidate data stewardship within...

What is Data Access Management?
Virtually all modern organizations prioritize the collection and storage of insight-fueling data. As these groups strive towards more data-driven initiatives, they are collecting increasingly large amounts of data. In turn, this data needs to be accessible to a growing number of data users in order to maximize the impact on...

IDC Report Highlights Cloud Data Management Challenges
Digital-first cloud data management is the future. A survey by theInternational Data Corporation(IDC) found that 90% of European organizations consider it crucial to have a digital-first strategy to achieve business value from more of their data. However, only 32% of data available to enterprises is put to work. This leaves...

How to Harness the Power of The Modern Data Stack
For Dave DeWalt, Founder and Managing Director of advisory firm (and51蹤獲 investor)NightDragon, the modern data stacklike dragonshas a compelling dual nature. Balancing power with danger, both evolving data stacks and dragons contain immense potential strength that can (quite literally) go up in flames if not managed properly. DeWalt, John Cordo,...

Sensitive Data Discovery Tools for Modern Data Stacks
As modern data stacks become more complex, data teams need more efficient ways to manage sensitive data. When more data sources are added or more platforms leveraged for storage and analysis, understanding what kind of data lives in your data ecosystem can become increasingly difficult. This difficulty becomes more of...

51蹤獲 and Snowflake: A Winning Partnership
Whats really critical to Snowflake customers is that宇o use the data that they have, they have to make sure that its secure and governed correctly.And 51蹤獲 helps them to make sure that it is. Paul Gancz, Partner Solutions Architect, Snowflake AtSnowflake Summit 2022in Las Vegas, 51蹤獲 had the chance...

The Data Privacy Regulation Roundup: What Data Teams Need to Know
When the General Data Protection Regulation (GDPR) entered into force, US privacy law was still in its infancy. Though enforced by the European Union (EU), the GDPR had wide-ranging implications for organizations well beyond Europe. And though it has become the regulatory standard in data privacy since it became applicable...

RBAC vs. ABAC for Data Access Control Use Cases
As important as data analysis is to modern businesses, enforcing the proper access control on that data will always be paramount. This remains true as organizations in every industry continuemigrating sensitive data to the cloudfrom legacy data storage systems. Regardless of which tools and platforms are used for storage and...

Scaling Secure Data Access with 51蹤獲 & Databricks Unity Catalog
For data engineers, the effort required to wrangle access policies grows exponentially as the complexity ofdata securityincreases. High table access segmentation necessitates managing a correspondingly large number of roles and grants. Data that is segmented down to the row level, for example, may require a series of transforms or view...

Enabling Tableau Row-Level Security with Snowflake & 51蹤獲
The ability to efficientlydiscover dataand visualize it in meaningful ways has never been more important. Tools like Tableau allow users to see data in an easily interpretable, shareable way that empowers data-driven decision making. However, with more organizations now collecting, storing, and analyzing sensitive data, the onus is on data...

Better Together: 51蹤獲 and Databricks at the 2022 Data+AI Summit
Databricks is what I think has thrust this community into a whole new stage of cloud compute. Matt Carroll, CEO, 51蹤獲 At June 2022sDatabricksData+AI Summit in San Francisco, 51蹤獲 had the chance to meet with a range of customers, partners, and other attendees to talk about the next generation...

Redefining Data Sharing for Financial Services
As business continues to shift to increasingly digital environments, the aggregation and sharing of financial data is predicted to have a staggering impact on the global economic future. According toresearch by McKinsey, economies that embrace data sharing for finance could see GDP gains of between 1 and 5 percent by...

What is Policy-as-Code and Why is it Important?
In the cloud computing era, ensuring data policy is co-created with data is essential. Historically,data access and security policieswere an afterthought, leading to sub-optimal implementations. These implementations give rise to confusion, data leaks, and unsustainable maintenance burdens. In order to be effective, organizations need to separate policy from cloud platforms....

Implementing a Data Security Platform for Cloud Storage Security
As data storage and analysis continue to migrate from on-premises frameworks to those based in the cloud, the market for cloud storage and data security platforms (DSPs) has expanded. In fact, the global cloud security market isprojected to growfrom $29.3 billion in 2021 to $106 billion by 2029. This highlights...

Simplify Data Access for Starbursts Federated Query Engine and Data Mesh
As market demand for data mesh has grown, the need for dynamicattribute-based access control(ABAC) on Starbursts popular data mesh architectures has increased as well. Therefore, were proud to announce 51蹤獲s native integration with theStarburst(Trino) federated query engine for data mesh architectures. Organizations eager to leverage 51蹤獲s integration with Starburst to...

51蹤獲 Introduces New Capabilities and Integrations to Enhance Security for Cloud Data
Thedata security and privacyspace continues to evolve to keep pace with theconstantly changing data regulations, an evolving threat landscape, and increasing amounts of data and users with access to that data. Data security and privacy vendors need to be constantly innovating to keep pace with all the aforementioned changes. With...

What Types of Data Controls Are There?
Data controls refer to the tactics, policies, and procedures that organizations use to meet their data governance and data management objectives. Put another way, they are the rules and systems that businesses rely on to ensure that only authorized users can access their data, ensuring its security and integrity. Data...

How to Create a Data Governance Framework
By 2025, experts anticipate that there will be around175 zettabytesof data in the world, up from only 44 zettabytes in 2022. While those numbers are incomprehensibly large (a zettabyte is the equivalent of a trillion gigabytes), they help demonstrate that theres an enormous and rapidly growing amount of data in...

Data Masking vs. Tokenization: Whats the Difference?
Data protection measures are only as strong as their ability to outsmart increasingly advanced technology and bad actors, while still preserving the utility and value of the underlying data. With it taking an average ofnearly 300 daysto catch a data breach, being proactive about how data is protected is more...

How to Achieve Data Security Governance and Compliance
As data further cements itself as an essential resource for modern businesses, more steps must be taken to guarantee its security. Why? These measures may be related to how and why data access is governed, ensuring that proper data access controls are in place to maintain the necessary security of...

Demystifying Data Security and Privacy in the Digital Age
As data evolves, so does the threat landscape. Facing the possibilities of targeted breaches from external players, risky or negligent activity from insiders, and mounting pressure from the informed public, organizations need to be more intentional than ever with how they protect their data. At the same time, both data...

How 51蹤獲 Simplifies Sensitive Data Tagging for Snowflake Data Lineage
Data is essential to modern business, thanks to its ability to improve insights and drive competitive decision-making. Yet, while many organizations are adopting cloud data platforms to simplify seamless onboarding of new data sources, managing access to data can significantly slow time-to-value. Should this stop you from adding more data...

Resilient, Agile, and Future-Ready: A Roundtable on the Modern Data Stack
The modern data stack bears the immense responsibility of storing, protecting, analyzing, and operationalizing a resource that is constantly in flux. As data continues to increase and evolve, these tools need to make sure it is both being used effectively and kept safe from leaks. This issue and potential solutions...

How to Comply with the Zero Trust Executive Order
Since the White House released itsExecutive Order (EO) on Improving the Nations Cybersecurityin 2021, federal agencies have begun developing long-termzero trustsecurity architectures across their networks while also adopting near-term goals. Officials from the Office of Management and Budget (OMB), the Cybersecurity and Infrastructure Security Agency (CISA), and the White Houses...

51蹤獲s $100M Series E Funding and Why Were the Leader in Secure Data Access
Im excited to announce 51蹤獲s $100M Series E funding, bringing our total funding to $267M. The funding round includes new investorsNightDragonand cloud data leaderSnowflake, as well as participation from existing investors Dell Technologies Capital, DFJ Growth, IAG, Intel Capital, March Capital, StepStone, Ten Eleven Ventures, and Wipro Ventures. (read thepress...

How to Mask Sensitive Financial Data with Databricks and 51蹤獲
As data moves among the storage, compute, and analysis layers of a data stack, there is constant need for measures to ensure its security andprotect personally identifiable information(PII). This security is often required by law, as is evident through financial regulations like PCI-DSS, the Gramm-Leach-Bliley Act, andmore. 51蹤獲s integration withDatabrickshelps...

SQL-Based Enforcement of k-Anonymization
Privacy preserving analytics attempt to enable the exploitation of data sets that include private and sensitive data in a manner which protects the disclosure and linkage of sensitive data to individuals. At a minimum, this means removing or obscuring all directly identifying attributes (DIs), which are defined as publicly known...

How to Enable SaaS Data Governance on Snowflake Partner Connect
Have you wondered how to protect yourSnowflakedata warehouse with column-, row-, and cell-level protection while accelerating time to your cloud data? With 51蹤獲 SaaS on Snowflake Partner Connect, access to data is faster and more secure than ever. 51蹤獲 provides data teams with one universal platform to control access to...

What Are Data Masking Best Practices?
Before diving into best practices for data masking, its integral to answer the question:what is data masking? Data masking is a form ofdata access controlthat alters existing data in a data set to make a fakebut ultimately convincingversion of it. This allows sensitive data like social security numbers, credit card...

How to Define a Data Masking Standard for Compliant Analytics
Data maskingis adata access controland security measure that involves creating a fake but highly convincing version of secure data that cant be reverse-engineered to reveal the original data points. It allows organizations to use functional data sets for demonstration, training, or testing, while protecting actual user data from breaches or...

What is Data Tokenization and Why is it Important?
What Is Data Tokenization? Why Is Data Tokenization Important for Data Security? When Should I Use Data Tokenization? Top Tokenization Use Cases Whats the Difference Between Tokenization and Encryption? Applying Data Tokenization for Secure Analytics

What Are the Most Common Types of Data Masking?
Data maskingreplaces sensitive information with fake but convincing versions of the original data. Given the necessity for sensitive data protection, data masking must be adaptable to any data environment. Regardless of the size, purpose, or tools in your data stack, there is a type of data masking that fits your...

What Are the Top Data Anonymization Techniques?
The explosion of organizations that collect and store data for analytics use has led to an inevitable rise in data breaches and leaks, in which attackers or otherwise unauthorized users are able to gain access to sensitive data. It makes sense, then, that individuals and organizations alike are more cognizant...

What Is Data Masking?
What Is Data Masking? Why Do I Need Data Masking? What Are Some Data Masking Techniques? When Do I Need Data Masking? Top Use Cases How Do I Apply Dynamic Data Masking?

What is Data Anonymization?
Data anonymization is the process of transforming information by removing or encrypting personally identifiable information (PII), protected health information (PHI), sensitive commercial data, and other sensitive data from a data set, in order to protect data subjects privacy and confidentiality. This allows data to be retained and used, by breaking...

The Top 5 Data Anonymization Best Practices
The data anonymization landscape is broad and constantly evolving as new technology comes online, regulations are passed, and the limits of what can and cant be done with data expand. This constant state of flux begs the question: where should you begin when it comes to anonymizing sensitive data? Regardless...

What is a Data Mesh Architecture and How Does it Work?
Governance and security are hot topics in data mesh, as evidenced by therecent webinarI co-presented withAndy Mott at Starburstthat landed 350+ registrants, including the whos who of industry luminaries on the topic. Its easy to see why without proper planning, decentralization can become the wild west of data management....

What Is Policy-Based Access Control?
In daily conversation, we often use umbrella terms to simplify communication. For instance, if someone tells you they work for the government, you get a general understanding of what type of work they do without necessarily knowing their exact agency, office, or role. Categorization allows us to easily discuss a...

Data Leaders Top 4 Enterprise Data Security Challenges
Theres no disputing the importance of data in driving cutting edge insights and business outcomes. However, for many organizations, the gap between raw data collection and data-driven results is wide and difficult to navigate. Colin Mitchell, 51蹤獲s GM of Sales for EMEA and APJ, recently met with data leaders from...

Simplifying Snowflake Security with Alation & 51蹤獲
This blog was co-authored with Deepak Nelli, Director of Sales Engineering at Alation. The modern data environment is changing. Cloud data platforms provide data-driven organizations with advanced analytics capabilities alongside much-needed simplicity; yet, greater demand for data, more data consumers and use cases, and a growing body of data use...

Protect Sensitive Data with Key Privacy Enhancing Techniques
According to theIdentity Theft Resource Center, there were 1,862 data breaches in 2021, exceeding the previous record of 1,506 in 2017. Of these breaches, 83% contained sensitive information that became available to the attackers. The exposure of large swaths of raw data, especially when sensitive, can have dangerous consequences. In...

5 Steps to Make Data a Strategic Asset for Geospatial Intelligence
In 2021, the National Geospatial-Intelligence Agency (NGA) published itsnew data strategy, which seeks to improve how data is developed, managed, accessed, and shared to maintain an advantage in geospatial intelligence. In its strategy, the organization pinpoints goals and action plans that the NGA, the Department of Defense (DoD)/Intelligence Community (IC),...

The Costs of Cloud-Based Access Control: DIY vs. Automated
Its no surprise that nearly90% of organizationsrely on a multi-cloud strategy to get value from their data. Yet, despite budgets for data management solutions continuing to increase,57% of data leaderssay that their tools and tech definitely need improvement. This may indicate a lack of cohesion across cloud platforms, but it...

How To Easily Adapt Data Access Management for Table Grants
Attribute-based access control(ABAC) grants or restricts access to data using context-based decisions based on information about the user, the data itself, the intended action, and the environment generally. Its well-documented that ABAC is the more flexible, scalable access control option when compared to static role-based access control NISThas formally supported...

What Are the Key APRA Data Security Standards?
Financial data is among the most sensitive information an organization can possess, yet its use is essential to the health of global markets. Its no secret, therefore, thatdata security in financial servicesis a highly scrutinized topic and one that is subject to a plethora ofdata compliance regulations. The Australian...

Data Buzzwords: 15 Trending Terms to Know
The world of data is full of interesting language, complex terms, and more acronyms than a bowl of alphabet soup. Being such a dynamic field, these terms are always being developed, adopted, and adapted to describe new and exciting advances. That said, its easy to feel out of the loop...

5-Steps to Automating Cloud Data Protection
Successful data platform teams and championship sports teams have a handful of things in common strong baseline skill sets, effective coaching and training, and good communication skills. But as people come and go, whats the secret of those that remain on the top over years or even decades? I...

SaaS Data Security: Faster, More Flexible Data Access Control
As cloud adoption accelerates, SaaS-based products have also exploded to fill the agility, scalability, and flexibility gaps of legacy solutions.McKinseyestimates that by 2024, the market for SaaS products will reach $200 billion, and according toBMC, more than three-quarters of SMBs have already adopted a SaaS product. While certain SaaS-based services...

What is ABAC? Attribute-Based Access Control 101
Theres a lot of confusion in the market aboutattribute-based access control(ABAC) and what it actually is. This short blog will use a handy analogy to explain ABAC.

The Myth of Vendor Lock-In: Building vs. Buying in the Federal Market
Recently, across thesocial media spectrumthere has been an uptick in government program leaders, technology salespeople, and systems integrators all sharing opinions on how best to deploy new technology quickly, cost effectively, and with the proper architecture to support both short- and long-term federal program goals. Unsurprisingly, theres little consensus, with...

What is Data Obfuscation? Everything You Should Know
As data use has become ubiquitous, data breaches have followed suit. Though down from apeak of 125 millioncompromised data sets in late 2020 which was at least partly attributable to the sudden shift to remote work during the pandemic data breaches still expose millions of data assets every...

Data Localization: A Complete Overview
Scientists predict that by 2025, the world will produce a staggering463 exabytes of dataeach day. Thats the amount of data youd accumulate if you initiated a video call right now and let it run for the next110 million years. Of course, weve been producing vast amounts of data for quite...

How to Integrate Identity and Access Management Across Cloud Platforms
Identity and access management (IAM) systems have become essential components of organizational workflows, allowing users to access the appropriate tools without requiring admin privileges. But when it comes todata access control, organizations are often left wondering why the user information stored in their IAM software cant also be leveraged to...

Automated Policy Enforcement is the Key to Self-Service Analytics
Data can deliver an important strategic advantage if organizations can make it simple and safe to consume and share. However, legacy systems and processes that are slow to change means this is often easier said than done. To realize the full potential of data-driven modernization, automated policy enforcement is...

How to Implement 51蹤獲 with Collibra
51蹤獲 is the universal cloud data access control platform that gives data engineering and operations teams the power to automate access control across their entire cloud data infrastructure. By leveraging metadata to build and automatically enforce data access policies at query time, 51蹤獲 allows organizations to unlock the full value...

51蹤獲 SaaS Now Generally Available to Control Access to Modern Data Stacks
To deliver on the need to manage and secure software across modern data stacks, 51蹤獲 has announced the general availability of SaaS deployment. This includesSOC 2 Type 2 Certification, enabling data teams toautomate data access controlwhile eliminating the need to self-manage and maintain the deployment. 51蹤獲s SaaS deployment enables data...

Industry Leaders Share Perspectives on the State of Cloud Adoption
With the world of data analytics and governance constantly changing, it is critical for organizations to stay on the cutting edge. The sharing of ideas between innovators and industry leaders help provide a glimpse into the dynamic core of this field, highlighting the trends central to staying competitive both today...

Snowflake and 51蹤獲 Pair Up to Provide an Industry-Leading Data Governance Solution
For Data Engineers responsible for delivering data to consumers, the effort needed to wrangle policies can quickly get out of hand as the complexity of data access controls increases. High segmentation of table access necessitates the management of a correspondingly high number of roles and grants. For example, if data...

Why a Data Management Framework is Essential
Is it possible to manage a successful business or organization if youre not successfully managing your data? Data management in business can be perceived as both an essential task and an annoying nuisance. The fact is that if your organization deals with data of any kind, you need a system...

Understanding Differential Privacy
Collecting and analyzing aggregated data is essential in todays connected world, but are you doing everything necessary to ensure the privacy of the individuals behind that data? Not only is it ethical and moral to take necessary security precautions when dealing with consumer data, but its also a legal requirement...

GigaOm Report Positions 51蹤獲 as the Leader in Data Access Control
Data access control and governance are central tenets of a strong cloud data strategy. As demand for data grows, so do the number of platforms touting cutting edge access control management capabilities. The data governance landscape is rapidly evolving and data access control a subset of the overall market...

Announcing SOC 2 Type 2 Attestation at 51蹤獲
At 51蹤獲, the security of our customers data is of paramount importance. We are thrilled to announce that our SaaS deployment option has achieved Service Control Organization (SOC 2) Type 2 attestation as part of our ongoing commitment to providing the highest level of security and assurance.

Modernizing From an RBAC to ABAC Model: Is It Hard?
The good news is no. The better news is you are already 90% of the way there and probably dont even know it!

What Is a Data Clean Room?
As data has become one of the most prized resources for companies around the world, two vital imperatives have increasingly butted up against each other in conversations among private companies, consumers, and government regulators the desire to harness customer data for profit and the need to keep that data...

The Secrets of Highly Regulated Data-Drive Organizations
GDPR, CCPA, and PIPEDA are just a few examples of the growing number of strict data privacy laws around the world that are impacting virtually every aspect of how companies do business. While regulatory hurdles certainly add complexity to any businesss operations, that doesnt mean that theyre a limiting factor....

Data Privacy Technology Is No Longer Optional Heres Why
The average person doesnt go through life wondering which data privacy regulations are protecting their personal data. Data privacy as a concept is well-known and desirable, but the specific laws, such as GDPR, HIPAA, and COPPA, rarely receive the same attention. Yet, by 2024 data privacy regulations will dictate how...

How to Put Zero Trust Principles to Work for National Security
It is something along the lines of common wisdom to describe cybersecurity as one of the biggest strategic challenges confronting the United States. And that challenge is growing in scope; In 2023, US federal agencies experienced a 5% increase in cybersecurity incidents totaling over 32,000 compared to the...

The Top 3 Data Supply Chain Challenges And Their Business Impacts
Increasing demand for data and its evolving uses particularly personal and sensitive data are turning traditional data supply chains upside down. Todays environment necessitates real-time data access to drive decision-making, which in turn requires a continuous, efficient flow of data throughout organizations. Its clear why manual processes and...

What Is a Data Mesh?
A data mesh is an increasingly populardata architectureframework that moves away from the monolithic approach of data warehouses and data lakes in favor of a more decentralized method ofcloud data management. This approach distributes data ownership to individual business domains, so that data access and management decisions are context-aware. As...

What is a Data Supply Chain?
Were all familiar with supply chains in the realm of manufacturing. Well, the same concept applies to data management. In data management, there are data supply chains that involve raw inputs from source data systems that go through a number of processing steps and emerge at the end as a...

What is Data Orchestration?
Data orchestration is the process of bringing together data from various storage locations, combining it in a coherent form, and then making it available for use by an organizations data analysis and data management tools. This process is usually software-driven, connecting multiple storage systems and allowing your data analysis platforms...

The Evolution of the Modern Cloud Data Warehouse
Someone starting a small business think custom t-shirts, candlemaking, etc. could probably operate out of their home, keeping their basic supplies and inventory in a spare room, closet, or garage. If their business were to take off and experience exponential growth, however, this type of operation would quickly...

Secure Access to Databricks Without Compromising Performance & Scalability
Scalability and performance go hand-in-hand. If you have great performance, but not a scalable solution, you havent solved much. The inverse is also true. This is why the cloud is so successful, and tools likeDatabrickswork so well they can scale on the cloud by spinning up performance-appropriate compute to...

What is Metadata Management?
Metadata management is the collection of policies, processes, and software/hardware platforms used to manage and store metadata for your organizations data assets. The larger and more complex the stockpile of data assets, the more critical proper metadata management is for ensuring that data is usable, secure, and available for individuals...

Data Intelligence vs. Data Analytics
The terms data intelligence and data analytics may as well be enshrined in marble for any modern business looking to capitalize on the power of information. But does your business have a handle on what data intelligence and data analytics are, and more importantly, what they mean for your company?...

51蹤獲 vs. Ranger: Research Comparison Finds 51蹤獲s ABAC Reduces Policy Burden by 75x
The role-based access control versusattribute-based access controldebate has been going on for decades. Now, as organizations move away from on-prem and Hadoop-era technologies in favor of modern, cloud-based data environments, the differences between the two security approaches are coming into sharper view. Anew study from GigaOmcomparing the two approaches head-to-head,...

The Top 5 Barriers to Data Sharing and How to Overcome Them
Technology has made our world increasingly interconnected and interdependent, and as a result, the need to share data to remain competitive is more important than ever. Yet, despite the competitive advantages associated withdata sharing, many organizations still treat it strictly as a data function instead of a business priority. According...

Why You Need a Data Audit Trail
Data leaks are everywhere in the news. Is your company safe and readily able to prove compliance? While advanced security measures have become increasingly important for protecting businesses against data breaches, lost data, or other security threats, one simple and straightforward tool is often overlooked the data audit trail.

What Is Data Redaction?
Theres an old adage that all press is good press, but one kind of attention thats been showered on companies both large and small in recent months is the type that no organization wants scorn after an inadvertent data leak. While keeping customer data safe from leaks may seem...

Data Owners: Privacy is YOUR Problem
Data has been called the new gold for its ability to transform and automate business processes; it has also been called the new uranium for its ability to violate the human right to privacy on a massive scale. And just as nuclear engineers could effortlessly enumerate fundamental differences in gold...

How Policy-as-Code Automates Fine-Grained Access Controls
Writing or modifying scripts, managing templates, or creating policy for cloud data platforms is historically a manual process. Assuming there is very little maintenance, doing this process once may be sufficient but that assumption is never realistic. Complicating this further is the need to manually replicate this environment at...

Maximize Financial Data Security with 51蹤獲
For more than 160 years,Credit Suissehas been providing customers with best-in-class wealth management, investment banking, and financial services. As one of the largest multinational financial firms, technology is critical to the companys global operations and with nearly 50,000 employees worldwide, there is a high standard for efficient, adaptable IT...

Data Masking Tools and Solutions
Data masking is one of the most important tasks in data governance. It may seem simple in practice, but getting it right can be the difference between a straightforward path to properly secured data, and a complex, confusing experience that leaves your data exposed to breaches. To add to the...

SQL Is Your Data Mesh API
As Zhamak Dehghani describes in her original article, How to Move Beyond a Monolithic Data Lake to a Distributed Data Mesh: [a Data Mesh] is the convergence of Distributed Domain Driven Architecture, Self-serve Platform Design, and Product Thinking with Data. What does that really mean? Rather than putting one team...

What is Data Generalization? A Complete Overview
Data generalization is the process of creating a more broad categorization of data in a database, essentially zooming out from the data to create a more general picture of trends or insights it provides. If you have a data set that includes the ages of a group of people, the...

Data Lake Governance: What Is It and Do You Need It?
Data lakes have become essential tools for businesses in the era of Big Data. But keeping those data lakes secure has never been more important as cyberthreats are constantly on the rise. Heres everything you need to know about data lake security and how 51蹤獲 can be an essential partner...

Layers of Data Policy Enforcement in Cloud Ecosystems
Organizations expanding their cloud data ecosystems (multi- and cross-cloud services for building data products) are faced with a number of options on where to enforce fine-grained access control policies on sensitive data, including security and privacy controls. As modern cloud architectures decouple compute and storage layers, the policy tier that...

Enabling Third Party Sharing with Databricks Data Sharing
Would you like to monetize your internal data by sharing it externally with third parties? Do you see the power of joining your data with data from other organizations to drive stronger and better insights? The desire to share data with third parties is fueled by the realization that: The...

How 51蹤獲 Addresses the Department of Defense Data Strategy Goals
51蹤獲 was born out of the Intelligence Community in 2015 to help organizations solve the most complexdata access controlchallenges. These challenges have only grown since that time as our dependency on sharing sensitive data across platforms and groups to support decision makers has increased. To meet the needs of this...

51蹤獲s $90M in Series D Funding & Our Vision for Cloud Data Access Control
When we founded 51蹤獲 in 2015, the data landscape barely resembled what it is today. Then, organizations were focused on big data management and few were primarily cloud-based. Hiring for data scientists and analysts skyrocketed as leaders realized the value of data-driven insights, and DevOps was becoming a popular paradigm....

51蹤獲s Universal Data Access Control for Lakehouse Architectures
As companies started moving data to the cloud and separating compute and storage for added efficiency, cost savings, and flexibility, data platforms became more advanced and diverse, introducing new categories for best-of-breed technologies. With data engineering and operations teams now accelerating adoption of more than one cloud data platform, according...

What is Data De-identification and Why is It Important?
Data de-identification is a form ofdynamic data maskingthat refers to breaking the link between data and the individual with whom the data is initially associated. Essentially, this requires removing or transforming personal identifiers. Once personal identifiers are removed or transformed using the data de-identification process, it is much easier to...

How AstrumU Maximizes Data Privacy & Utility with 51蹤獲 & Databricks
Kaj Pedersen, Chief Technical Officer atAstrumU, joined 51蹤獲 and Databricks at a recent Amazon Web Services Machine Learning Dev Day. This blog recaps his presentation on building a data governance and compliance strategy. Before founding AstrumU, Adam Wray identified a crucial and costly problem plaguing the American employment...

Why Clarifying De-Identification Concepts is Key to Sufficient Data Protection
Data protection law emerged in the 1970s in Europe as a means to protect against the risks posed by automated or computer-based data processing. As a concept, it thus goes far beyond protecting individuals against the disclosure of nonpublic information, a concern that is still very much at the center...

Everything You Need to Know About K-Anonymity
Businesses and organizations hold more personal data now than ever before. In general, this data is used to better serve customers and more effectively run business operations. But with plenty of malicious parties eager to access personal data and track sensitive information back to its source, finding a way to...

This Is Why Your Data Governance Strategy Is Failing
The first step of goal achievement is goal setting, and the first rule of goal setting is to make SMART goals specific, measurable, attainable, relevant, and time-based. This best practice is well known by teams across industries and has been implemented for decades. However, as Gartners reportThe State of...

How To: Reporting & Auditing in Databricks Using 51蹤獲
As a data engineer or architect, your organizations security and compliance teams look to you for answers about who is accessing your companys data. But in the wake of data privacy regulations like theCCPAand EuropesGDPR not to mention a growing array of other state, federal, and industry rules requests...
What It Means To Be A Snowflake Premier Partner
Whether your organization has 50 people or 50,000, one common denominator remains: Data analytics is no longer a nice-to-have, its a need-to-have. But what value are your analytics, data science, or BI initiatives providing if youre unable to fully leverage all your data including the most sensitive? When 51蹤獲...

51蹤獲 Introduces Support for Databricks SQL Analytics & Google Cloud
51蹤獲 andDatabrickshave deepened our strategic partnership and augmented our native product integration by announcing 51蹤獲s support for DatabricksSQL Analyticsand deployment onGoogle Cloud. These are the latest capabilities offered to joint51蹤獲 and Databrickscustomers, which also include metadata-driven policy authoring, fine-grained and attribute-based access controls, and most recently, expandedaccess control for R...

What is Fine-Grained Access Control? (And Why Its So Important)
One of the most traditional methods of determining who can and cannot access certain data is aframework known as role-based access control (RBAC). This approach defines specific user roles within a company, then specifies permissions for each individual role. But what if a company needs to go beyond these simple...

5 Important Things to Look For in a Data Governance Tool
A data governance tool can help your organization automate data governance at scale, increase data utilization, and comply with data privacy regulations. In this blog post, well highlight five of the most important features to look for in a data governance tool.

How The Center for New Data Saved $1 Million with 51蹤獲
By the time COVID-19 was classified as a pandemic, it was already spreading like wildfire. As healthcare professionals, scientists, and federal agencies tried to understand the nature of the virus and implement appropriate mitigation measures and public health guidelines, it was quickly seeping into all corners of the globe. As...

What is Differential Privacy? A Guide for Data Teams
In todays day and age, were accustomed to technological advances and capabilities being uncovered all the time. However, mere availability does not necessarily correspond to immediate adoption. This is at least somewhat true fordifferential privacy. Thefirst seminal contributionon the topic was published in 2006 by Microsoft Distinguished Scientist Cynthia Dwork,...

The Key to Modernizing Data Governance Programs
Data initiatives never live up to their full potential without appropriate governance behind [them]. This quote, from a senior data strategist interviewed in the newBest Practices Report on Modern Data Governancefrom TDWI, encompasses precisely why organizations should be prioritizing a data governance framework. Yet, just 38% of report respondents have...

What is Data Governance? Everything You Need to Know
Organizations are increasingly recognizing their data as a valuable asset that can significantly shape and enhance business outcomes. As organizations continue to navigate digital transformation and the inevitable growth of big data, effectivedata governance frameworkshave become essential to maximizing datas value throughout its entire lifecycle. In this guide, were taking...

How to Unlock Successful, Scalable GDPR Compliance
The General Data Protection Regulation (GDPR)is omnipresent: It applies to every person or entity processing personal data in the European Union (EU), as well as all organizations that process the personal data of individuals located in the EU. The regulation seeks to increase individuals control over their personal data, including...

How To: Access Controls in Databricks Using 51蹤獲
The pros and cons of role-based access control (RBAC) andattribute-based access control(ABAC) have been well documented and debated. There are even different implementations of ABAC that use static attributes, defeating the intent of safely scaling user adoption. But understanding the delineations between different approaches and soundly implementing one or both...

8 Signs You Need Data Access Control for Databricks
Imagine this Youre at the starting line of a road race. The gun goes off and the clock starts ticking. Runners take off as you bend down to tie your shoes. You dont have to be a runner to know that this tactic ends in your competitors leaving...

Role-Based Access Control vs. Attribute-Based Access Control
The termsrole-based access controlandattribute-based access controlare well known, but not necessarily well understood or well defined, for that matter. If attribute-based access control includes user roles, then what is role-based access control? Where is the line drawn? Fundamentally, thesedata access controlterms role-based access control and attribute-based access control...

A 10-Step Guide for Data Security in Cloud Computing
With an industry-wide92% cloud adoption rate, well over half of organizations using multiple public clouds and enterprises planning to spend a third of their IT budgets on cloud tools in 2020, its clear that the future of enterprise analytics is in the cloud. Cloud computing and analytics promises to enhance...

51蹤獲 & Starburst Trino: Powering Faster, Safer Analytics & Data Science
Access to sensitive data is more critical to data analytics and data science than ever before. But in todays environment, speed to data access is contingent upon how secure that data is. To help data teams achieve faster, safer, more cost efficient analytics and data science initiatives,we have formed a...

How to Avoid the Most Common Cloud Migration Challenges
Cloud provider capabilities are evolving faster than ever, and enterprises are taking notice. With all the progressive features, cost savings and labor efficienciesmodern cloud data access control platformsoffer, why wouldnt organizations seize the opportunity to accelerate data analytics and derive insights that could give them a competitive edge? Unfortunately,cloud migrationdoesnt...

What is a Data Catalog? 5 Features of a Modern Data Catalog
Imagine going to a library in search of a specific book with a piece of information needed to finish an assignment. Did we mention youre on a deadline? Good luck. This example may seem extreme, but for organizations that dont have a data catalog, its not unfathomable. In either scenario,...

4 Reasons to Start Your Cloud Migration Process with Data Security
The vast majority of organizations now utilize the cloud in some form or another, yet there is no single process data teams follow when migrating data to their cloud platform. This may not seem like a red flag on the surface if all the data gets from point A...

A Call for a Risk-Based Assessment of Anonymization Approaches
Why its time to reexamine the binary dichotomy between personal and aggregate data, and what aggregation, synthesisation and anonymisation mean for the future of data privacy. Privacy-enhancing technologies are typically used to transform data to enable sharing of private data with third parties. However, not all techniques reduce re-identification risks;...

How k-Anonymization Makes Sensitive Data Use More Secure
A few years removed from the peak of the pandemic, were still understanding COVID-19s impact on daily life. But one thing is certain the pandemic made clear the importance of collecting and sharing health data. The virus unpredictable and widespread nature made tracing and testing critical to understanding transmission...

Data-as-a-Service with Databricks Enterprise Cloud Service
The newDatabricks Enterprise Cloud Servicearchitecture provides powerful network security capabilities, however, a lesser known benefit is that it enables Data-as-a-Service.

Automate HIPAA De-identification Methods on Amazon RDS
Data engineers and product managers are often responsible for implementing various controls and audit capabilities when managinghealthcaredata. To enable faster, data-driven innovation, these data professionals particularly those who come to healthcare from other industries like tech orfinancial services apply best practices such as deploying a proven data analytics stack...

Security and Privacy Layers in Snowflake for Highly Sensitive Data
Over the past few years, data privacy has evolved from nice to have to a business imperative and critical boardroom issue, warns a Cisco benchmarking report. Security and privacyare colliding in the cloud and creating challenges like weve never seen before. This is particularly true for organizations making the move...

51蹤獲s Data Team Shares 8 Great Resources for Data Engineers
Many people fall into data engineering by accident. Software engineers may find that they enjoy building platforms to drive their companys data initiatives; data scientists may find they need to get dirty to deliver insights at scale. What they have in common is that theres always something new to learn...

Differentiating Data Security in the GDPR from Privacy
The European Unions General Data Protection Regulation one of the most forward-leaning privacy regulations on the planet was praised by Tim Cook in a recent speech in the EU because our personal data is being weaponized against us with military efficiency. Those are strong words, and frankly, accurate:...

Identity & Access Control Management for Public Sector
51蹤獲 was founded in 2015 in response to the U.S. Intelligence Communitys (ICs) complex and sensitive data governance problems, empowering organizations to harness the value of their data while preserving data privacy and security. Ourdata security platformenables data engineers and data stewards to automate the enforcement of data access, governance,...

Differential Privacy: A Sound Way to Protect Private Data
Striking the privacy-utility balance is the central challenge to organizations handling sensitive data. Assessing the privacy side of the balance requires understanding how different privacy policies are undermined. This post will focus on one particular attack against privacy and show how two different privacy policies respond to this attack. In...

Data Governance Anti-Patterns: The Copy & Paste Data Sharing Method
Anti-patterns are behaviors that take bad problems and lead to even worse solutions. In the world of data governance, theyre everywhere. Todays anti-pattern probably isnt thought of as a pattern at all because it feels so obvious, and (on the surface) is too easy you share data by giving...

Q&A with Dataiku CEO Florian Douetteau about Data Governance and Machine Learning
Enterprises have a wealth of data at their fingertips and are eager to accelerate data innovation. But data governance can frequently stand in the way, posing issues that are both profound and vexing. 51蹤獲s CEO Matthew Carroll spoke with Dataikus Florian Douetteau, CEO, about the relationship between data governance and...