SHARE
Facebook X Pinterest WhatsApp

Informatica Extends Reach into Security Intelligence

Seven Data and Information Security Mistakes Even Smart Companies Make Lost in all the recent hubbub surrounding a decision to take Informatica private has been a push by the company to significantly expand its role in the realm of information security. At the RSA 2015 conference this week, Informatica will showcase its new Secure@Source offering, […]

Written By
MV
Mike Vizard
Apr 20, 2015
Slide Show

Seven Data and Information Security Mistakes Even Smart Companies Make

Lost in all the recent hubbub surrounding a decision to take Informatica private has been a push by the company to significantly expand its role in the realm of information security.

At the RSA 2015 conference this week, Informatica will showcase its new Secure@Source offering, which enables organizations to leverage the company’s middleware to identify the relationships among different sets of data.

Amit Walia, senior vice president and general manager at Informatica, says Secure@Source is the first piece of security intelligence software that actually operates at the data level. As such, it can identify not only where a particular piece of data is located, but also the relative importance of that data to the business. Armed with that information, Walia says that IT will be better able to apply granular sets of policies to particular sets of data.

As digital criminals become more sophisticated, they are moving well past simply trying to hack into systems to see what they can find. Instead, they are going after specific types of intellectual property. The problem that most IT organizations face is that they’re never really sure where the critical data associated with the organization’s most important intellectual properties might actually reside at any given moment.

While IT security vendors have been trying to solve that problem in a variety of ways, Walia says that at its core, data security is really a data management problem. The degree to which IT organizations will take responsibility for securing data remains to be seen. But if IT is given the responsibility for being the steward of enterprise data in the first place, then by extension, it will be held accountable for how that data is both accessed and ultimately secured.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Observability: Why It’s a Red Hot Tech Term
Tom Taulli
Jul 19, 2022
Top GRC Platforms & Tools in 2022
Jira vs. ServiceNow: Features, Pricing, and Comparison
Surajdeep Singh
Jun 17, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.