Professional Documents
Culture Documents
En Informatica Secure at Source Data Sheet 2878
En Informatica Secure at Source Data Sheet 2878
Informatica Secure@Source
Key Benefits Discover and Remediate Sensitive Data Risk for Digital Transformation
• Protection and monitoring of
sensitive data to fuel data-driven
Informatica Secure@Source® helps you discover and remediate sensitive and critical data risk
digital transformation and support
across your organization. It leverages artificial intelligence (AI) and machine learning to deliver
privacy and compliance efforts
• Visibility across all data platforms actionable data discovery and classification, risk scoring, behavioral analytics, and automated
and types, providing the support protection in a single solution. It supports both structured and unstructured data in cloud,
needed for today’s complex, on-premises, and big data stores, as well as any relational and mainframe systems.
hybrid environments
• Continuous risk analysis
of sensitive data, allowing
Visibility and Control of Sensitive Data
organizations to prioritize Secure@Source provides rich, holistic visualizations of sensitive data assets for management and
resources and investments across practitioners, with an intuitive user interface and rapid, continuous risk analysis of critical data
functional, geographic, and line of and data privacy across the enterprise. Secure@Source provides the intelligence to prioritize data
business views
protection and privacy investments, policies, and programs:
• AI-driven detection to uncover
high-risk, anomalous data usage
• Confirm what you know about your structured and unstructured sensitive data: Both
• Automated orchestration and management and practitioners gain global visibility into sensitive data across cloud, big data,
protection with sensitive data and on-premises data stores, with data classification, discovery, proliferation analysis,
intelligence to remediate privacy user access, and activity correlation.
and security risks
• Monitor risk on a continuous basis: Track sensitive data risk and remediation with risk scoring
based on multiple factors, customizable to your organization’s needs, and identify top risk areas
based on organizational requirements.
• Uncover the unexpected: Utilizing user behavior analytics, detect suspicious or unauthorized
data access by continuously correlating, base-lining, analyzing, and alerting on high-risk
conditions and potential anomalous behaviors that threaten sensitive data.
• Remediate risk: Automate the orchestration of data security controls to protect data at rest
and in use, prevent unauthorized access, and de-identify/anonymize sensitive data. A risk
remediation simulator helps you understand the impact of data controls before implementation.
1
Coverage includes structured data across traditional relational databases, such as mainframes;
semistructured data (CSV, XML, JSON) on HDFS and Amazon S3; unstructured data on CIFS NFS;
and SharePoint traditional structured data stores.
Secure@Source provides actionable risk scoring based on customizable factors, including data
sensitivity, volume, protection, proliferation, location, and user activity. You can monitor and track
risk scores to determine the effectiveness of remediation and identify new threats.
Figure 1. Secure@Source provides 360-degree visibility of sensitive data through its dashboard (left), and risk
remediation simulation (right).
Key Features
Data Classification and Discovery
Secure@Source enables the discovery and classification of sensitive data based on data
and metadata patterns and rules. Define data domains and policies from prebuilt and
customizable definitions to identify and locate sensitive data including GDPR, PII, PCI, PHI,
and other confidential information.
2
Secure@Source automates the discovery of sensitive data across large numbers of databases,
files stores, big data repositories, and cloud data stores. It uses flexible, high-performance,
scalable scanning to uncover sensitive data and show results quickly and clearly.
You can measure the effectiveness of security investments by tracking how risk scores trend
over time. Secure@Source presents risk analytics in a highly interactive and graphical visual
format that enables quick identification of areas requiring attention.
Secure@Source detects anomalous behaviors and insider/outside threats using machine learning,
rules, and policies. The combination of anomaly detection and policy-driven violations reduces
alert fatigue, helping you prioritize and accelerate investigations as well as provide immediate
and automated remediation of high-risk conditions.
Secure@Source provides holistic enterprise visibility of sensitive data through its dashboard
and data store summary according to a variety of criteria, including sensitivity level and
classification policy.
3
Data Proliferation Analysis
It’s critical to understand not only where sensitive data resides but also where it’s moving and
being replicated to other data stores within the organization and to cloud applications. You may
also want to monitor sensitive data flowing in and out of highly regulated countries or between
partner and client organizations.
Secure@Source analyzes data proliferation from Informatica data flows and provides an
aggregated and visual map of sensitive data. Your information security teams can define
security policies to notify them when high-risk conditions are detected, such as when a high
volume of sensitive data is leaving a highly regulated country or when unusual data access or
behavior occurs.
Sorting information can reveal trouble areas by classification policy, location, region, department,
data store, or line of business. These reports let security practitioners and decision-makers share
a common platform on which to base tactical and strategic analysis and decision-making.
The user activity summary allows you to analyze user access to sensitive data and detect unusual
activities or behavior.
4
About Informatica Intelligent Data Protection
Digital transformation Identify critical data-protection priorities and apply protection directly to the data with automated
changes expectations: better remediation leveraging integrated Informatica dynamic data masking, persistent data masking,
service, faster delivery, with
and third-party protection such as Apache Ranger and Apache Sentry and encryption. Provide
less cost. Businesses must
transform to stay relevant extensible integration using syslog, ServiceNow, or custom action. Monitor and alert on user
and data holds the answers. behavior, data access, and movement.
As the world’s leader in
Enterprise Cloud Data
Management, we’re prepared
to help you intelligently lead—
in any sector, category or
niche. Informatica provides you
with the foresight to become
more agile, realize new growth
opportunities or create new
inventions. With 100% focus on
everything data, we offer the
versatility needed to succeed.
Worldwide Headquarters 2100 Seaport Blvd., Redwood City, CA 94063, USA Phone: 650.385.5000, Toll-free in the US: 1.800.653.3871
IN06_0418_02878
© Copyright Informatica LLC 2018. Informatica, Secure@Source, and the Informatica logo are trademarks or registered trademarks of Informatica LLC in the United States and many jurisdictions
throughout the world. A current list of Informatica trademarks is available on the web at https://www.informatica.com/trademarks.html. Other company and product names may be trade names
or trademarks of their respective owners. The information in this documentation is subject to change without notice and provided “AS IS” without warranty of any kind, express or implied.