Blog

Category: Cloud

Multi-Tenant Data Security for Databases with Record-Level Encryption

Multi-tenant databases are commonly used by SaaS vendors for the sake of cost-efficiency.  Having a separate database instance for each of their customers, while ensuring…

Apple Lets Consumers BYOK; Is Your Cloud Provider Following Suit?

Consumers are used to having their messages encrypted end-to-end so that only those with whom they are communicating can see their messages. But, what about…

Baffle x IBM Cloud

How to De-Identify Your Data in IBM Cloud with Baffle Data Protection Services

IBM Cloud offers an extensive portfolio of cloud-native databases that IBM provides as secure, production ready, and fully managed database technologies, to enable developers to…

Ameesh Divatia talks with CyberNews about the most efficient ways enterprises can protect sensitive data in the cloud

Large-scale businesses, healthcare sectors, and government institutions are often primary targets of cyberattacks due to the extensive amounts of sensitive data they possess.  Hackers turn…

Protecting Your Data in Your Cloud with the Baffle Data Privacy Cloud

As organizations continue to build out their cloud-based data lakes and analytics environments, there’s a huge push to implement data privacy and de-identification methods for…

Encrypted keys

A Technical Overview of HYOK and RLE with Baffle DPS

As adoption of Hold Your Own Key (HYOK) and Bring Your Own Key (BYOK) continues to increase, we’ve encountered more questions around how our Baffle…

Baffle x IBM Cloud

Delivering HYOK for Financial Services with IBM Cloud

Today, IBM announced IBM Cloud for Financial Services, the first financial services ready cloud platform.  The announcement also highlights an ecosystem of over 90 technology…

Data Pipeline Graphic

De-identifying Data into Snowflake

We recently announced our partnership with Snowflake (you can read more here), and are proud of our unique approach to data de-identification and privacy protection.  This article and video…

Baffle x AWS

Tokenize and de-identify data in AWS RDS in less than 10 minutes

Follow this link to read the Amazon Partner Network (APN) Blog. When it comes to security implementations, the amount of friction or overhead generated by…

an unprotected analysis pipeline undermines the value of data

An Unprotected Data Analytics Pipeline Undermines The Value Of Data

Some estimate that 90% of the world’s data has been produced in the past two years alone. This proverbial tidal wave of information positions businesses…