BigID Touts Data Security Capabilities
February 26, 2020
introduced first-of-its-kind discovery and security features for
managing sensitive crown jewels across unstructured, structured, big
data and cloud.
Cluster Analysis: BigIDís patent-pending cluster analysis technology leverages advanced machine learning to give customers profile insight into what data is duplicate and similar. Using cluster analysis, BigID customers can quickly identify similar sensitive data and remediate accordingly.
Access Insight: BigIDís new access intelligence dashboard highlights data at risk at-a-glance, uncovering overexposed data and prioritizes remediation efforts to secure sensitive data wherever it lives. BigID customers can easily find over-permissioned and open access files everywhere - from shared folders to S3 buckets - to minimize the risk of data leaks and data breaches.
Advanced ML-Driven Classification: BigIDís discovery-in-depth platform introduces document classifiers to automatically analyze file content and automatically identify document types, from patents to RFIs to invoices to M&A documents. BigIDís advanced data intelligence technology introduces unsupervised classification to automatically identify and classify sensitive data by type.
Labelling Automation: BigID lets customers leverage their content, file classification and cluster analysis to simplify labelling retroactively across unstructured files and images.
Remediation: BigID introduces unmatched native and partner remediation options, helping customers reduce risk on all of their sensitive and personal data across all data stores - from automated labelling and policy enforcement to access governance, encryption and more.
ďBigIDís next-generation security capabilities help our customers identify and protect the crown jewels of their organization - sensitive and personal data,Ē explained Nimrod Vax, BigIDís Head of Product. ďBy applying advanced ML data intelligence and discovery-in-depth technology to data protection, BigID empowers organizations to reduce risk, protect their crown jewels and get unprecedented coverage and visibility across their enterprise data environment.Ē