Data Security
and Privacy

Data-centric security
for a data-centric world.

The Fog of More: Where are my data risks?

Join Informatica and Aberdeen data security experts to learn more about the new paradigm called data security intelligence.

Join now

Sensitive data protection, intelligence, and management

Data security and privacy challenge organizations to meet different but very critical and complementary issues: Data security governs access to data throughout its lifecycle, whereas data privacy defines that access based on privacy policies and laws—for instance, who views personal, financial, health, or confidential data. Both are challenged today with the growth and proliferation of data from cloud, analytic, and big data initiatives, and the continued barrage of data breaches.

Understanding sensitive data risk is key; the process for analyzing data risk includes discovering, identifying, and classifying it, as well as analyzing its risk based on value, location, protection, and proliferation.  Once the type and level of risk have been identified, data stewards can take tactical and strategic steps to ensure data is safe. 

c09-products-data-security-17-structured According to the Ponemon Institute's "The State of Data Centric Security" (2014), fewer than 1 in 5 IT practitioners knows where structured data is located.

Traditional security needs data-centric security

The implications and costs of security breaches are front-page news and encompass everything from loss of jobs, to loss of revenue, to PR nightmares. As the volume and proliferation of data—from cloud to mobile to social to machine—continues to grow, traditional security approaches no longer deliver safe harbor for sensitive data.

As attacks become more persistent and sophisticated, traditional security measures will be breached—and it is not "if," but "when." When that happens, additional safeguards are needed for protecting sensitive information. And you can’t protect data if you don’t know where it is. According to a recent Ponemon Institute report, only 17 percent of IT practitioners know where their company’s sensitive structured data is located. Only 7 percent know where their unstructured data resides.1

While the exponential increase in the volume and proliferation of data creates significant risk, companies that focus on securing the data itself will triumph in the fight for data security.

What to look for

When choosing a data security solution, look for the following attributes:

  • Accessible: Make sure your solution can access data wherever it is, whether it’s in new data channels, your mainframe, or your line-of-business application. With the ever-growing data volume and variety, sensitive data must be protected and understood, regardless of its origin.
  • Unintrusive:  Solutions should work within existing architectures and not require changes to proven and reliable databases and applications.
  • Deployment-agnostic: Your solution should have the ability to access a wide variety of deployment models, from big data to cloud to on-premises to hybrid ecosystems.
  • Technology-agnostic: Whether you’re using a legacy system or state-of-the-art innovation, your solution shouldn't require a change in applications and databases to align with the newest technology.
  • Adaptable: You want a platform that can handle a wide variety of use cases—from blocking access to fine-grain control—with a single approach.
c09-products-data-security-2-unstructured According to the Ponemon Institute's 2014 "The State of Data Centric Security" report, fewer than 1 in 10 IT practitioners can locate the company's unstructured data.
c09-products-data-security-cost-of-breach According to the same 2014 Ponemon Institute report, the cost of corporate data breaches averages $7.2 million.

Why Informatica?

A recognized leader in data security and archive technology, Informatica keeps data safe and secure throughout the data lifecycle—from development to production through retirement. These solutions leverage a technology/platform-agnostic view, compatible with the complex, heterogeneous data environments of a modern enterprise. We organize our offerings into three categories:

  1. Those that enable data-centric security
  2. Those that support test data management
  3. Those that archive data.

Underlying our software is our belief in data-centric security. By securing the data at its source, you can minimize risk throughout your business and protect data as it moves across your organization, in and out of applications, wherever the data is consumed by the business or shared with business partners.

By defining, analyzing, and protecting sensitive data at its source, Informatica helps ensure that your data is secure before it proliferates throughout your organization.

1 "The State of Data Centric Security," Ponemon Institute, sponsored by Informatica, June 2014.


2014 Gartner Magic Quadrant for Data Masking Technology

Download the report

2015 Gartner Magic Quadrant for Data Archiving and Application Retirement

Access the report

Data Security and Privacy Products

Data Masking

Provides data security and privacy controls to prevent unauthorized access to and disclosure of sensitive, private, and confidential information.


Delivers data security intelligence so organizations can understand sensitive data risks and vulnerabilities.

Test Data Management

Securely provisions test and development data by automating data masking, data subsetting, and test data-generation capabilities.

Data Archive

Retire legacy applications, manage data growth, improve application performance, and maintain compliance with structured archiving.

Customer Success Stories


Vale delivered archived data compression rates averaging 95 percent, and saved $1 million annually in storage costs

Hot Telecommunications

Hot Telecommunication quickly gained compliance with regulations and accelerated development of telecom solutions


EMC retires 65 legacy systems and migrates the business to 20 SAP modules to run more than 300 global sites