c01-data-security-v2

Secure@Source

Provides 360º visibility of sensitive data and analyzes and ranks sensitive data risk.

 

 

 

 

 

Informatica Positioned as a Leader

2016 Magic Quadrant for Structured Data Archiving and Application Retirement

Read the report
key-features-icon.png

Key Features

Apply prebuilt and customizable definitions to specific data domains to identify and locate private and sensitive data.

360-degree visibility of sensitive data

Automates the intelligent discovery of sensitive and private data by analyzing values across fields and metadata in targeted database sources.

Risk analysis

Determines the level of sensitive data risk by analyzing multiple factors including protection status, user access, activity, location, data cost, classification, and proliferation.

Intelligent sensitive data policies

Allows organizations to intelligently define, discover and analyze data with context.

Dashboards, visualizations, reports, and alerts

Delivers a rich array of dashboards drill-downs to provide enterprise visibility of sensitive data risks and relationships.

Sensitive data proliferation

Provides insight into not only where sensitive data resides, but also where it’s moving and being replicated to other data stores within the organization and to cloud applications.

Security infrastructure integration

Connects to a wide range of security solutions for enterprise data privacy and security risk analysis.

Orchestration of data security and access controls

Secure@Source can provide immediate and automated remediation of high-risk conditions and alert security teams of anonymous data access and activity.

Recognition

c09-2017-infosecaward

2017 Grand Winner of Global Excellence

Informatica Secure@Source, the industry's first data security intelligence software, named 2017 Grand Winner of Global Excellence by Info Security Products Guide. 

Customers

cc03-vale.png
Vale

Vale delivered archived data compression rates averaging 95 percent, and saved $1 million annually in storage costs

cc03-hot-telecom.png
Hot Telecommunications

Hot Telecommunication quickly gained compliance with regulations and accelerated development of telecom solutions

cc03-upmc.png
UPMC

UPMC used a collection of Informatica products to improve research outcomes in the quest to cure various diseases

Related Products and Solutions

Dynamic Data Masking

Masks data when accessed by users without changing the original source data.

Persistent Data Masking

Masks data in place or when copied to test, support, or outsource environments.

Data Masking

Provides data security and privacy controls to prevent unauthorized access to and disclosure of sensitive, private, and confidential information.

How can we help?

Free Trials

Experience Informatica Cloud solutions.

Informatica Network

Find answers to your tough questions.