Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

Sensitive Data Intelligence Driven Privacy and Protection

Published October 28, 2020
Author

Omer Imran Malik

Data Privacy Legal Manager, Securiti

FIP, CIPT, CIPM, CIPP/US

Listen to the content

This post is also available in: Brazilian Portuguese

At Securiti we are excited to announce the availability of our newest offering Sensitive Data Intelligence that expands our product portfolio of privacy management software to address the challenges of data governance, risk and security teams, in a single comprehensive platform.

Data has become the driving force behind the new economy, with enterprises focused on leveraging data to find new ways to deliver value to their customers and generate new revenue streams. At the same time, the amount of data is increasing at a staggering rate. An average enterprise has over 400+ different data systems, that are spread across on-premises file shares, databases, enterprise data warehouses, cloud storage solutions, SaaS applications, cloud data warehouses, cloud data lakes for machine learning based analytics, and more. This data sprawl creates multiple challenges for large organizations.

Major business initiatives and projects undertaken by organizations, while deriving significant value from the underlying data, need to consider the privacy, risk, and security implications of the huge volumes of data they collect and process. Through conversations with our partners and customers, we found some typical scenarios where they were struggling with these issues.

  • Data lake projects: Companies are increasingly leveraging data science to run new types of machine-learning-based analytics on raw data combined from a variety of sources into data lakes. But visibility into the types of data present in the lake is very limited. This is significant when building self-serve models for data consumption with strong data governance and access policies.
  • Cloud Data migration projects: Digital transformation initiatives by CIOs are typically cloud-driven and involve either migrating data from their on-premises to the cloud or standing up new apps and workloads in multi-cloud environments. They need to understand what personal or sensitive information is in their environment to enable go/no-go migration decisions. The flexible consumption model of the cloud makes it challenging to maintain an up-to-date inventory of the data assets, the data within the assets, and the controls on the assets.. Post-migration, organizations will need to rely on automated mechanisms to monitor and manage this data..
  • Secure and Privacy-aware SDLC initiatives: In the new economy, every company, regardless of its industry vertical, is also a software company, as they build and deliver solutions and services to their customers digitally. Privacy by Design and Secure SDLC initiatives have helped raise developer awareness for privacy and security requirements early in the development process. But agile development methodologies present challenges as new data collection/storage or data leaks to application logs get introduced periodically, requiring continuous monitoring of devtest, staging, and production environments.
  • Data mapping initiatives: Privacy compliance programs require businesses to maintain a record of their data processing activities. Privacy teams that have historically relied on manual questionnaires completed by data owners, are looking to evolve their processes with automated data discovery and controls given the dynamic nature of the data. This keeps their records more accurate and up-to-date.
  • Data subject request fulfillment projects: B2C companies in verticals such as retail, travel, health, and financial services that serve 10’s of millions of customers are now burdened with requirements from privacy laws that grant users access rights to their requests. With the increasing number of data breaches, the volume of such access requests from users is trending up. And privacy teams, along with their IT colleagues, need to invest in automated tools that can detect and link personal data to specific identities.

Sensitive Data Intelligence

Organizations today rely on a combination of manual methods, repurposed legacy data discovery tools, and point products to address the above challenges. These have proven to be inadequate or ineffective. With Sensitive Data Intelligence, we provide our customers a single platform with the following comprehensive capabilities:

sensitive data intelligence post
  • Automated discovery of data assets across the enterprise, including on-premises, hybrid and multi-cloud environments.
  • Out of the box detection of 100+ personal data attributes across over a dozen categories, including Government IDs, Device IDs, Online IDs, Finance, Legal, Medical, etc. This includes special categories of data defined by GDPR and other privacy laws.
data discovery
  • Data risk scoring to provide a risk-centric approach to manage the data being collected and processed. The proprietary model leverages risk factors such as data type, data location, data subject’s residency, and volume of data and can readily be extended. The solution allows customers to easily find hotspots and direct remediation efforts appropriately. Risk score trends also surface indicators of risk, such as copies of data, and cross-border transfers of data.
data risk
  • Structured data analysis with insights on data types and volumes across databases, schemas, and tables.
  • Unstructured data classification using machine learning based techniques into easily recognizable categories (Sales, Medical, HR, etc), types (Medical consent form, IRS tax form, etc), and formats. Additionally, organizations can define their own schemes using rules-based Content Profiles. A library of built-in profiles such as PCI, PII, PHI, GLBA, and FERPA help customers get out of the gate running.
unstructured data
  • Labeling of files using sensitivity labels from your Microsoft Information Protection subscription. Additionally tagging with privacy related metadata such as categories of personal data, categories of subjects, and purpose.
  • A policy engine to automate and orchestrate controls on the various data stores using a built-in library of policy templates mapped to regulatory citations and standard controls.

This is the beginning of our journey and we will soon be expanding the solution with additional automation that brings increased levels of efficiency to privacy, data governance, risk and security teams. Check out our brochure for more details.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share


More Stories that May Interest You

Videos

View More

Mitigating OWASP Top 10 for LLM Applications 2025

Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...

View More

DSPM vs. CSPM – What’s the Difference?

While the cloud has offered the world immense growth opportunities, it has also introduced unprecedented challenges and risks. Solutions like Cloud Security Posture Management...

View More

Top 6 DSPM Use Cases

With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...

View More

Colorado Privacy Act (CPA)

What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...

View More

Securiti for Copilot in SaaS

Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...

View More

Top 10 Considerations for Safely Using Unstructured Data with GenAI

A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....

View More

Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes

As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...

View More

Navigating CPRA: Key Insights for Businesses

What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...

View More

Navigating the Shift: Transitioning to PCI DSS v4.0

What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...

View More

Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)

AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 13:38

Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines

Sanofi Thumbnail
Watch Now View
Spotlight 10:35

There’s Been a Material Shift in the Data Center of Gravity

Watch Now View
Spotlight 14:21

AI Governance Is Much More than Technology Risk Mitigation

AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3

You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge

Watch Now View
Spotlight 47:42

Cybersecurity – Where Leaders are Buying, Building, and Partnering

Rehan Jalil
Watch Now View
Spotlight 27:29

Building Safe AI with Databricks and Gencore

Rehan Jalil
Watch Now View
Spotlight 46:02

Building Safe Enterprise AI: A Practical Roadmap

Watch Now View
Spotlight 13:32

Ensuring Solid Governance Is Like Squeezing Jello

Watch Now View
Spotlight 40:46

Securing Embedded AI: Accelerate SaaS AI Copilot Adoption Safely

Watch Now View
Spotlight 10:05

Unstructured Data: Analytics Goldmine or a Governance Minefield?

Viral Kamdar
Watch Now View

Latest

View More

Securiti Powers Sovereign AI in the EU with NVIDIA

Discover how Securiti and NVIDIA empower AI Sovereignty in the EU with full-stack, secure, and compliant AI solutions. Ensure data privacy, governance, and safe...

5 Ways to Accelerate Unstructured Data Cleansing for AI with Securiti and DataBricks View More

5 Ways to Accelerate Unstructured Data Cleansing for AI with Securiti and DataBricks

The Unstructured Data Challenge LLMs has created an opportunity for organizations to extract tremendous value from their unstructured data. However, CDAOs are all too...

Data Classification: A Core Component of DSPM View More

Data Classification: A Core Component of DSPM

Data classification is a core component of DSPM, enabling teams to categorize data based on sensitivity and allocate resources accordingly to prioritize security, governance,...

9 Key Components of a Strong Data Security Strategy View More

9 Key Components of a Strong Data Security Strategy

Securiti’s latest blog breaks down the 9 key components of a robust data security strategy and explains how it helps protect your business, ensure...

Beyond DLP: Guide to Modern Data Protection with DSPM View More

Beyond DLP: Guide to Modern Data Protection with DSPM

Learn why traditional data security tools fall short in the cloud and AI era. Learn how DSPM helps secure sensitive data and ensure compliance.

Mastering Cookie Consent: Global Compliance & Customer Trust View More

Mastering Cookie Consent: Global Compliance & Customer Trust

Discover how to master cookie consent with strategies for global compliance and building customer trust while aligning with key data privacy regulations.

From AI Risk to AI Readiness: Why Enterprises Need DSPM Now View More

From AI Risk to AI Readiness: Why Enterprises Need DSPM Now

Discover why shifting focus from AI risk to AI readiness is critical for enterprises. Learn how Data Security Posture Management (DSPM) empowers organizations to...

The European Health Data Space Regulation View More

The European Health Data Space Regulation: A Legislative Timeline and Implementation Roadmap

Download the infographic on the European Health Data Space Regulation, which features a clear timeline and roadmap highlighting key legislative milestones, implementation phases, and...

Gencore AI and Amazon Bedrock View More

Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock

Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...

DSPM Vendor Due Diligence View More

DSPM Vendor Due Diligence

DSPM’s Buyer Guide ebook is designed to help CISOs and their teams ask the right questions and consider the right capabilities when looking for...

What's
New