Secure@Source Automates Identifies and Alerts Sensitive Data Risks Across the Enterprise, Cloud, and Big Data Platforms

by November 25, 2016 0 comments

With recent developments in technology and increasing volumes of data now being stored and used, organizations are under intense pressure to secure sensitive data from all types of external and internal threats. The biggest challenge lies in being aware of the location and growth of basic information, and the usage of their critical data assets.

Therefore, Informatica, a provider of data management solution faced these hurdles and came up with Secure@Source, which is a data security intelligence solution that provides enterprise-wide analysis on sensitive data risk across complex heterogeneous data platforms including cloud, big data and traditional databases.

Secure@Source automates the discovery, identification, analysis, monitoring and alerting of sensitive data risks across the enterprise, cloud, and big data platforms. The solution empowers organizations to be proactive and helps them standardize the measurement of sensitive data risk across groups and departments. It also enables them to track data risk over time, to audit and prioritize their security controls and investments.

“The continuing proliferation of critical data across data stores, country boundaries and cloud, along with the risks inherent to big data, necessitates a transformation in how these data assets are safeguarded,” said Amit Walia, executive vice president and chief product officer, Informatica.

“As a data-centric security intelligence solution, Secure@Source delivers insights into enterprise data risk that cannot be derived from other solutions. The solution has boosted efficiency and credibility of projects in North America and EMEA, and we are excited to introduce Secure@Source to India. We have a significant R&D base in India, and are well equipped to support local customer requirements. Secure@Source will empower enterprises in India to prioritize data protection efforts, optimally align security resources, and increase the value of security investments,” he added.

No Comments so far

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.

<