Veeam Completes Acquisition of Securiti AI to Create the Industry’s First Trusted Data Platform for Accelerating Safe AI at Scale

View

Inferred Lineage: Modernizing Enterprise Data Management

Author

Ankur Gupta

Director for Data Governance and AI Products at Securiti

Listen to the content

This post is also available in: Arabic

A leading financial services company faced compliance issues because of unreliable metadata. Their home-grown data catalog lacked context and lineage tracking, leading to challenges in assuring trusted data for their new banking application. This kind of situation is not new in the modern data-driven business landscape.

Due to the intricate nature of enterprise data systems, data often originates from various sources, undergoes numerous transformations, and is eventually routed to multiple destinations. The ability to trace this journey of data from its origin to its final destination is more crucial than ever to deliver trusted and compliant data.

This is what data lineage is all about. The growing importance of data lineage in modern enterprises comes from its ability to provide a clear, comprehensive view of data flow, transformations, and usage across an organization. Traditional data lineage techniques often fall short in complex or opaque environments, as the financial services company discovered. Hence, the emergence of an innovative approach—inferred lineage.

As the name indicates, this type of lineage is built indirectly. This blog introduces the concept of inferred lineage and explores its key use cases.

Understanding Inferred Lineage

Inferred lineage is an advanced method of tracking data movement and transformation using AI and ML algorithms. It uses pattern analysis and matching, along with clustering techniques, to infer how data is transformed and moved across enterprise systems.

Unlike traditional lineage methods that rely on parsing existing code (typically limited to SQL), analyzing logs or manual metadata documentation, inferred lineage automatically detects and maps data relationships across various systems and processes. This approach eliminates the barrier presented by opaque systems to document lineage. It can also help you gain a deeper understanding of lineage for complex transformations and non-linear data flows. Moreover, the lack of documented lineage records is no longer an obstacle, and inferred data lineage can deliver you the required transparency, compliance, and trust.

The Need for Inferred Lineage

When you manage modern enterprise data systems, you deal with large volumes of data, complex data architecture, numerous data sources and destinations, and complex transformations. This situation makes it hard to create and maintain accurate lineage information. Inferred lineage addresses these challenges by offering an automated, efficient, and scalable way to capture and visualize data movements.

How Inferred Lineage Works

Inferred lineage leverages advanced algorithms to analyze data patterns, metadata, and system logs. It uses ML to identify relationships between data elements across different systems, even when explicit documentation is missing. This dynamic approach enables continuous updates to lineage information as data and systems evolve.

The process of inferred lineage focuses on the following:

  • Data transformations, such as filtering and aggregating.
  • Data validations, such as incomplete data.
  • Data enrichment, such as integrating additional data sources to create a more detailed profile of each customer.
  • Data movement, such as loading data into a database and streaming data to and from services.

Automated inferred lineage saves you time and resources while improving the accuracy and coverage of your data systems.

Key Benefits of Inferred Lineage

Inferred lineage brings several benefits to your data management practices, enhancing efficiency, accuracy, and reliability. Here are some of the key benefits:

  1. Improved Data Governance and Compliance: Inferred lineage gives you a comprehensive view of data flows, helping you meet regulatory requirements more efficiently.
  2. Enhanced Data Quality and Reliability: Inferred lineage helps you identify and fix data quality issues at their source by tracking data relationships (between two or more columns).
  3. Faster Impact Analysis: When data changes occur, inferred lineage can quickly assess downstream impact, reducing the risk of unintended consequences.
  4. Better Decision-Making: A clear understanding of data provenance empowers you to make trusted decisions based on reliable data.

Use Cases for Inferred Lineage

Inferred lineage offers significant benefits across industries by providing an understanding of data flow and relationships, and deeper insights into legacy data systems or those where traditional lineage falls short. This information can be utilized in a wide range of use cases.

  • Data Migration and Modernization: Inferred lineage helps you map legacy systems to new architectures, minimizing risks to ensure streamlined transitions.
  • Regulatory Compliance: For data privacy regulations like GDPR or CCPA, inferred lineage helps you track personal data across systems and generate audit trails.
  • Data Quality Management: You can track data transformations back to its sources to quickly identify and address quality issues.
  • Business Process Optimization: Understanding data flows helps you streamline business processes, identify bottlenecks and inefficiencies, and take timely action for optimization.

Inferred Lineage from Securiti

The Inferred Lineage provided by Securiti is unique. It searches for replicated and transformed data across table columns and leverages ML algorithms to discover possible lineage relationships. It can handle the following relationships among tables/columns:

  • Data transformations, such as normalization, clean-up, or standardization.
  • Multiple source tables merging column-wise into one target table.
  • Multiple source tables merging row-wise into one target table.
  • One source table being used to generate multiple target tables.
  • Handling of common data such as boolean columns that can lead to false positives.

Securiti's Inferred Lineage helps expand lineage to opaque ETL processes and handle scenarios where lineage is not easily extractable from processes coded in COBOL, Java, and Python. It effectively removes the limitation of lineage extraction using third-party plugins or SQL parsing.

How the Financial Services Company Leveraged Inferred Lineage

To address the issues of manual and unreliable data lineage, the financial services company implemented Securiti's comprehensive solution, which included Inferred Lineage, Data Discovery, Data Catalog, and Workflow Orchestration.

The automated inferred lineage significantly enhanced their data governance and closed compliance gaps. After implementing the Securiti solution, the company not only achieved improved compliance but also attained a high confidence rating in matching data producers to data consumers, resulting in a substantial cost reduction of $10.5 million.

The improved data governance enabled the company to pursue growth strategies more effectively. Additionally, it provided the necessary support for an aggressive rollout of their new application. This holistic improvement in data management and governance positioned the company for better operational efficiency and strategic expansion.

Key Takeaways

Data lineage is crucial for tracing data's journey from its origin to its final destination, ensuring trusted and compliant data. However, unreliable metadata and lineage tracking can lead to compliance issues. Traditional data lineage methods often fail in complex environments, where inferred lineage provides an advanced method of tracking data movement and transformation.

Inferred lineage uses AI and ML to automatically detect and map data relationships across systems, reducing errors and providing a deeper understanding of data flows, transformations, and validations. It can help improve data governance and compliance, data quality and reliability. It can also deliver faster impact analysis and support better decision-making.

Securiti’s Inferred Lineage handles complex transformations and relationships, even in challenging scenarios, supporting safe and compliant data use.

Request a demo to learn more.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share

More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Latest
View More
DataAI Security: Why Healthcare Organizations Choose Securiti
Discover why healthcare organizations trust Securiti for Data & AI Security. Learn key blockers, five proven advantages, and what safe data innovation makes possible.
View More
The Anthropic Exploit: Welcome to the Era of AI Agent Attacks
Explore the first AI agent attack, why it changes everything, and how DataAI Security pillars like Intelligence, CommandGraph, and Firewalls protect sensitive data.
Network Security: Definition, Challenges, & Best Practices View More
Network Security: Definition, Challenges, & Best Practices
Discover what network security is, how it works, types, benefits, and best practices. Learn why network security is core to having a strong data...
View More
What is Cybersecurity Management?
Discover what cybersecurity management is, its importance, the CISO’s role, types, and best practices for effective cybersecurity management. Learn more.
Montana Privacy Amendment on Notices: What to Change by Oct 1 View More
Montana Privacy Amendment on Notices: What to Change by Oct 1
Download the whitepaper to learn about the Montana Privacy Amendment on Notices and what to change by Oct 1. Learn how Securiti helps.
2026 Privacy Law Updates: Key Developments You Need to Know View More
2026 Privacy Law Updates: Key Developments You Need to Know
Access the whitepaper to learn about key privacy law updates in 2026. Discover key developments you need to know. Learn how Securiti can help.
India’s DPDPA Rules View More
India’s DPDPA Rules
Access the infographic to learn about India’s DPDPA 2025 basics. Discover phased timelines, what the rules require, when they apply, key obligations, and much...
View More
DataAI Security For Healthcare
Secure PHI and sensitive clinical data, govern access, prevent breaches, and enable trusted AI with HIPAA-aligned DataAI Security for healthcare organizations.
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
What's
New