Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Sensitive Data Intelligence Driven Privacy and Protection

Published October 28, 2020
Author

Omer Imran Malik

Data Privacy Legal Manager, Securiti

FIP, CIPT, CIPM, CIPP/US

Listen to the content

This post is also available in: Brazilian Portuguese

At Securiti we are excited to announce the availability of our newest offering Sensitive Data Intelligence that expands our product portfolio of privacy management software to address the challenges of data governance, risk and security teams, in a single comprehensive platform.

Data has become the driving force behind the new economy, with enterprises focused on leveraging data to find new ways to deliver value to their customers and generate new revenue streams. At the same time, the amount of data is increasing at a staggering rate. An average enterprise has over 400+ different data systems, that are spread across on-premises file shares, databases, enterprise data warehouses, cloud storage solutions, SaaS applications, cloud data warehouses, cloud data lakes for machine learning based analytics, and more. This data sprawl creates multiple challenges for large organizations.

Major business initiatives and projects undertaken by organizations, while deriving significant value from the underlying data, need to consider the privacy, risk, and security implications of the huge volumes of data they collect and process. Through conversations with our partners and customers, we found some typical scenarios where they were struggling with these issues.

  • Data lake projects: Companies are increasingly leveraging data science to run new types of machine-learning-based analytics on raw data combined from a variety of sources into data lakes. But visibility into the types of data present in the lake is very limited. This is significant when building self-serve models for data consumption with strong data governance and access policies.
  • Cloud Data migration projects: Digital transformation initiatives by CIOs are typically cloud-driven and involve either migrating data from their on-premises to the cloud or standing up new apps and workloads in multi-cloud environments. They need to understand what personal or sensitive information is in their environment to enable go/no-go migration decisions. The flexible consumption model of the cloud makes it challenging to maintain an up-to-date inventory of the data assets, the data within the assets, and the controls on the assets.. Post-migration, organizations will need to rely on automated mechanisms to monitor and manage this data..
  • Secure and Privacy-aware SDLC initiatives: In the new economy, every company, regardless of its industry vertical, is also a software company, as they build and deliver solutions and services to their customers digitally. Privacy by Design and Secure SDLC initiatives have helped raise developer awareness for privacy and security requirements early in the development process. But agile development methodologies present challenges as new data collection/storage or data leaks to application logs get introduced periodically, requiring continuous monitoring of devtest, staging, and production environments.
  • Data mapping initiatives: Privacy compliance programs require businesses to maintain a record of their data processing activities. Privacy teams that have historically relied on manual questionnaires completed by data owners, are looking to evolve their processes with automated data discovery and controls given the dynamic nature of the data. This keeps their records more accurate and up-to-date.
  • Data subject request fulfillment projects: B2C companies in verticals such as retail, travel, health, and financial services that serve 10’s of millions of customers are now burdened with requirements from privacy laws that grant users access rights to their requests. With the increasing number of data breaches, the volume of such access requests from users is trending up. And privacy teams, along with their IT colleagues, need to invest in automated tools that can detect and link personal data to specific identities.

Sensitive Data Intelligence

Organizations today rely on a combination of manual methods, repurposed legacy data discovery tools, and point products to address the above challenges. These have proven to be inadequate or ineffective. With Sensitive Data Intelligence, we provide our customers a single platform with the following comprehensive capabilities:

sensitive data intelligence post
  • Automated discovery of data assets across the enterprise, including on-premises, hybrid and multi-cloud environments.
  • Out of the box detection of 100+ personal data attributes across over a dozen categories, including Government IDs, Device IDs, Online IDs, Finance, Legal, Medical, etc. This includes special categories of data defined by GDPR and other privacy laws.
data discovery
  • Data risk scoring to provide a risk-centric approach to manage the data being collected and processed. The proprietary model leverages risk factors such as data type, data location, data subject’s residency, and volume of data and can readily be extended. The solution allows customers to easily find hotspots and direct remediation efforts appropriately. Risk score trends also surface indicators of risk, such as copies of data, and cross-border transfers of data.
data risk
  • Structured data analysis with insights on data types and volumes across databases, schemas, and tables.
  • Unstructured data classification using machine learning based techniques into easily recognizable categories (Sales, Medical, HR, etc), types (Medical consent form, IRS tax form, etc), and formats. Additionally, organizations can define their own schemes using rules-based Content Profiles. A library of built-in profiles such as PCI, PII, PHI, GLBA, and FERPA help customers get out of the gate running.
unstructured data
  • Labeling of files using sensitivity labels from your Microsoft Information Protection subscription. Additionally tagging with privacy related metadata such as categories of personal data, categories of subjects, and purpose.
  • A policy engine to automate and orchestrate controls on the various data stores using a built-in library of policy templates mapped to regulatory citations and standard controls.

This is the beginning of our journey and we will soon be expanding the solution with additional automation that brings increased levels of efficiency to privacy, data governance, risk and security teams. Check out our brochure for more details.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 13:38

Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines

Sanofi Thumbnail
Watch Now View
Spotlight 10:35

There’s Been a Material Shift in the Data Center of Gravity

Watch Now View
Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View

Latest

AI System Observability: Go Beyond Model Governance View More

AI System Observability: Go Beyond Model Governance

Across industries, AI systems are no longer just tools acting on human prompts. The AI landscape is evolving rapidly, and AI systems are gaining...

View More

Securiti Accelerates Secure Agentic AI Deployments with NVIDIA Enterprise AI Factory

Still adapting to  the initial Gen AI boom, the IT industry is now undergoing another profound evolution- the rise of Agentic AI. AI has...

Virginia’s Privacy Protections for Reproductive and Sexual Health Data View More

Virginia’s Privacy Protections for Reproductive and Sexual Health Data

Gain insights into Virginia’s Privacy Protections for Reproductive and Sexual Health Data. Learn about key provisions, implications for business, and how Securiti can help.

Understanding Data Regulations in Australia’s Telecom Sector View More

Understanding Data Regulations in Australia’s Telecom Sector

1. Introduction Australia’s telecommunications sector plays a crucial role in connecting millions of people. However, with this connectivity comes the responsibility of safeguarding vast...

Big Data, Big Risks View More

Big Data, Big Risks: The Data Privacy Challenges For Credit Reporting Agencies

Learn about regulatory frameworks, enforcement actions, privacy challenges, practical recommendations, how Securiti helps and more.

ROPA View More

Records of Processing Activities (RoPA): A Cross-Jurisdictional Analysis

Download the whitepaper to gain a cross-jurisdictional analysis of records of processing activities (RoPA). Learn what RoPA is, why organizations should maintain it, and...

Comparison of RoPA Field Requirements Across Jurisdictions View More

Comparison of RoPA Field Requirements Across Jurisdictions

Download the infographic to compare Records of Processing Activities (RoPA) field requirements across jurisdictions. Learn its importance, penalties, and how to navigate RoPA.

Navigating Kenya’s Data Protection Act View More

Navigating Kenya’s Data Protection Act: What Organizations Need To Know

Download the infographic to discover key details about navigating Kenya’s Data Protection Act and simplify your compliance journey.

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New