2016-02-24

Informatica announced the immediate availability of Informatica Secure@Source Version 2 (v2), the first data security intelligence solution to provide enterprise-wide analytics on sensitive data risk across complex heterogeneous data platforms including Cloud, big data and traditional databases.

Under intense pressure to secure data from all types of external and internal threats, most organizations are challenged to know basic information including the classification, location, proliferation and usage of their critical data assets, much less understand their full exposure to risk. Informatica Secure@Source automates the discovery, identification, analysis, scoring, monitoring and alerting of sensitive data risks across the enterprise, SaaS applications and big data platforms. The Informatica solution empowers organizations to be proactive and standardize their measurement of sensitive data risk across groups and departments, as well as track it over time, to audit and prioritize their security controls and investments.

Informatica Secure@Source v2 delivers:

Global visibility of sensitive data and risk with history and trending of risk score and key risk indicators.

Visibility to how many users have access to sensitive data and who are the top users.

Intelligent data policies, which define sensitive data by how it is consumed and viewed by the organization, enabling unparalleled classification and discovery of sensitive data.

Sensitive data proliferation analysis.

Reports on sensitive data to support audits and investigations.

Collection and correlation of user access and activity on sensitive data.

Expanded multi-factor risk scoring, including user access and activity, to incorporate user and data usage factors.

Expanded big data and cloud support, including integration with Salesforce and Informatica Big Data Management

Ponemon Institute - Data Breaches and Sensitive Data Risk Research 2016

According to a 2016 survey by Ponemon Institute[1], the two most significant security problems are not knowing the location of sensitive data and not knowing the data risk.

Only 12 percent of respondents know the risk of structured data contained in databases. According to respondents, companies represented in this research have an average of 4,275 structured databases.

Similarly very few know the risk to unstructured data contained in emails or files (8 percent of respondents), data located in the cloud (7 percent of respondents) and big data used for analytics (5 percent of respondents).

62 percent of respondents worry most about the inability to determine the location of their organizations' sensitive or confidential data.

A data breach is the top IT security risk and one that is increasing. When asked to select the one IT security risk that causes the most problems, it is the data breach of sensitive information.

Download the full Ponemon Institute report here.

See an infographic on the Ponemon Institute reporthere.

Cutting Cloud and Big Data Risk Down to Size

Secure@Source supports big data and Cloud implementations, both of which are areas of particular concern to security professionals. In fact, according to the 2016 Ponemon Institute survey, respondents reported that only five percent knew the risk to their big data and only seven percent knew the risk to their cloud environment.

Secure@Source provides extended support, including expanded discovery and classification capabilities for Hadoop/Hive and Salesforce data, as well as expanded proliferation tracking for Hadoop data via Secure@Source integration with Cloudera Hive and Informatica Big Data Management. Additionally, Secure@Source leverages Grid scalability to enhance its performance across large and expanding information environments.

Watch what Informatica senior vice president of Product Development, Bala Kumaresan, has to say about Secure@Source v2 here.

Read more here about how Secure@Source is able to identify, analyze, detect and monitor sensitive data risks.

EMA Analyst Report: Building Data-Centric Security with Informatica Secure@Source to Gain Actionable Insights into Sensitive Data Risk – Download full report here.

Read Robert Shield's blog, “Secure@Source Version 2: Data Visibility, Risk and Financial Impact” here.

Read Gary Patterson's blog, “Why you need Data Security Intelligence” here.

Show more