Blog

Category: Databases

Database Observability with Baffle

Database monitoring for performance, troubleshooting, and data access monitoring Baffle’ s Data Protection architecture was designed to provide a comprehensive database security platform that is…

Real Queryable Encryption

Does Real Queryable Encryption mean there is a Fake Queryable Encryption?

TLDR There is no “fake” queryable encryption, but a certain NoSQL database provider has coined the term “Queryable Encryption”, and Baffle has something to say…

RBAC tickets

Why RBAC for Data Reigns Supreme in the Age of Cloud Threats

Not too long ago, we viewed file-level or disk-level encryption for databases as “secure”. However, traditional security measures like at-rest data encryption have shown significant…

PostgreSQL relational database management system logo displayed on laptop computer screen

Data Masking for PostgreSQL

Introduction In the ever-evolving landscape of data management, safeguarding sensitive information has become paramount. One of the popular techniques is data masking, a process that…

Data sprawl: why application access controls as a security strategy doesn’t work

As enterprises maintain more and more data, there is a greater need to ensure that sensitive data is protected. Privacy regulations are increasing which is…

Data Security in MySQL is an evolving compliance and threat landscape

MySQL remains one of the most popular relational databases today. It offers a variety of data security features that can help with compliance, but only…

Evening skyline

Baffle’s Proxy Architecture

Baffle implements database encryption and role-based access control using a reverse proxy configuration that operates at the SQL session layer. This blog will explore what that means and compare it to competing API and agent-based architectures.

Data Tokenization and Masking with Baffle in Amazon Redshift

Security and compliance for sensitive data in your cloud data pipeline and warehouse while running data analysis.

Scrabble TDE

Transparent Data Encryption is Not Enough

Security for an earlier time One of the biggest challenges with security is understanding the threats and how to properly defend against them. Just because…