Download our in-depth report: The Ultimate Guide to IT Security Vendors
Data management specialist Informatica today announced an updated version of Secure@Source that provides deeper, more meaningful insights into user behaviors and their effect on an organization's stores of big data and sensitive information.
Secure@Source is a data security intelligence and analytics solution that provides visibility into how businesses handle their sensitive data by identifying how it is created, accessed and consumed. Employing machine-learning technologies, the solution analyzes user behavior and data movement patterns to unearth potentially risky activities that can compromise security or cause compliance headaches.
The so-called "Detect and Protect" release of Secure@Source is bolstered with enhanced security intelligence capabilities, including the automated discovery of sensitive data. And knowing where critical data resides a crucial first step in averting potential breaches.
In 2014, an Informatica survey conducted by the Ponemon Institute revealed that few IT security professionals (16 percent) knew where their sensitive data was located. Fewer still (seven percent) knew where to find their sensitive unstructured data, which is often tucked away in documents and emails. More than half of the 1,500 IT professionals polled for the study admitted to losing sleep over this worrying blind spot.https://o1.qnsr.com/log/p.gif?;n=203;c=204650394;s=9477;x=7936;f=201801171506010;u=j;z=TIMESTAMP;a=20392931;e=i
"The majority of respondents agree that not knowing the location of data poses a serious security threat," said Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, in a statement regarding his group's findings. "Clearly, the time is ripe for a wider adoption of the technologies and expertise to make data-centric security an enterprise priority."
Fast forward a couple of years, and Informatica is offering security-conscious businesses with the ability to pinpoint their stores of sensitive data along with multi-factor data risk analytics, anomalous user activity detection and automated orchestration of remediation tasks. Further, the product casts a wider net across Hadoop deployments, cloud environments and traditional data center setups.
Somewhat echoing Dr. Ponemon's remarks of a few years ago, Amit Walia, executive vice president and chief product officer of Informatica, said today its time for enterprises to refocus their data security strategies.
"Despite all the time, effort and billions, maybe trillions, of dollars spent, security is not working. Security breaches are still on the rise because most organizations are taking the wrong approach; they are focused on securing the end-points," said Walia in a statement.
"'Detect and Protect' represents the next generation of data security intelligence because it is securing data at its source," Walia continued. "Secure@Source is a uniquely unified, data-centric security solution that empowers organizations to quickly and accurately assess where they need to focus investments and resources to reduce the escalating risk of data breaches and misuse."