Webinars
Comprehensive Data Security for Amazon S3
Keep your data in a “fail safe” mode so your company won’t be in a embarrassing headline
Best approaches for securing data in GenAI
Separate fact from fiction when using confidential data with GenAI.
Global Applications and Data Sovereignty with PostgreSQL
Build global applications on PostgreSQL, without siloing data.
Real Queryable Encryption for PostgreSQL
Don’t blame your employees. Take control of your sensitive data. Faster and Easier than Homomorphic Encryption.
Enterprise-class GenAI with RAG
Add GenAI capabilities on your private data quickly and securely with AWS and Baffle
Enterprise-grade data security for PostgreSQL
AWS RDS with Baffle is the only PostgreSQL cloud service that is better than TDE
Are you ready for PCI DSS 4.0?
Full disk encryption is out. How you encrypt your credit card data matters
Easily build data-secure applications with Postgres in the Cloud
AWS RDS/Aurora is the leading managed Postgres in the cloud. Baffle’s transparent application level-encryption secures the data in Postgres
Privacy and Security for GenAI
A review of the options to protect data used in GenAI to meet compliance requirements
The Secret to GDPR-compliant Cloud Migration
In this webinar, join AWS and Baffle to learn how to make your secure cloud migration a compliance success with BYOK and KMS. This session will cover: controlling access to your data at the row or logical database level, centrally managing and defining policies for keys, and securely moving your data to the cloud in a compliant manner.
Data Security for GenAI
With nearly all data sets in companies' possession containing some form of sensitive data, teams are looking for ways to ensure that the use of these data sets with GenAI is compliant with privacy regulations. Learn best practices for protecting your private data when using it with GenAI.
Modernize your database with MySQL in the cloud
With Amazon Relational Database Service for MySQL, companies have great choices for a managed database service at the core of their application. With Baffle Data Protection for Databases, they are also able to protect their data even better than an on-prem deployment and meet their security and compliance requirements in the shared responsibility model.
Advanced Encryption for PostgreSQL
Analyze encrypted data without ever seeing the data in clear text. Encrypting data ensures data is protected, even downstream. But, data teams are unable to perform operations on protected data that use traditional encryption methods. The solution is cryptographic protection that follows regulated data while allowing any and all analytical and operational computations on the data.
Secure Analytics with AWS Redshift
AWS Redshift makes it easy to analyze structured and semi-structured data with the best price performance at any scale. But, with the rise of data privacy regulations worldwide, companies need to ensure their queries don’t violate compliance.
Modernize your database with PostgreSQL in the cloud
Get more flexibility, improved cost-efficiency, and better security with AWS + Baffle. With Amazon Relational Database Service - PostgreSQL, companies have great choices for a managed database service at the core of their application. With Baffle Data Protection for Databases, they are also able to protect their data even better than an on-prem deployment and meet their security and compliance requirements in the shared responsibility model.
Saxo Bank: A Success Story for Multi-Tenant Data Security
Learn how Saxo Bank, a provider of an online trading platform, addressed Multi-tenant Data Security (MTDS) to ensure their customers can meet their compliance obligations. MTDS, with Record-level Encryption (RLE), ensures that each customer’s data is secured cryptographically.
Strategies for Successful Privacy and Compliance Management
EMA analyst and managing director Chris Steffen joins Baffle CEO Ameesh Divatia to share insights and best practices employed by leading organizations to not only accomplish strong privacy and compliance, but also achieve competitive differentiation as a result.
How to De-Identify Apache Kafka Data Streams
Learn how modern data protection approaches and technologies can be used to easily de-identify and re-identify Kafka data streams to share sensitive information securely between internal and external audiences and data domains.
De-identifying Cloud Data Pipelines: Approaches, Best Practices, and Learnings
Get insights on best practices and lessons learned for securing sensitive data as it migrated to the cloud and used in data pipelines.
Implementing Data Privacy Controls for Amazon Redshift and Cloud Data Lakes
Attend this webinar to learn how data can be easily de-identified on-the-fly as part of your data pipeline process as it is staged for use in Amazon Redshift or cloud data lakes.
De-identifying Data in Snowflake and Amazon Redshift
Learn how data can be easily de-identified as part of your data pipeline as it is staged for use in Snowflake or Amazon Redshift.
Why You Can’t Stop Data Breaches?
A review of risk and responsibility models will be provided along with an examination of how data distribution and cloud deployments can further exacerbate the challenge of securing data.
Cloud Data Risk: How to Better Protect Your Data in the Cloud
This webinar provides an overview of a new threat model for data and helps identify key risks to data security that may be commonly misunderstood or overlooked.
Tokenize Your Data in AWS RDS with AWS KMS
Learn about different tokenization and data encryption techniques and see how you can stand up a demo of Baffle's Data Protection Services in conjunction with AWS RDS and AWS KMS in a matter of minutes.
De-identify and Secure Your Data Analytics Pipeline
Learn how you can establish an S3 cloud data lake fully de-identified and use AWS Athena to easily access and run analytics on data sets for authorized users.
Controlling Data Leakage from AWS S3 and Cloud Storage
Learn how data can be easily de-identified, tokenized or encrypted inside S3 objects to help prevent data leakage while still enabling analytics teams to leverage the scale of cloud infrastructure.
A Case Study on Threat Intel Sharing Across Multiple Parties
This webinar will provide an overview of threat intelligence sharing across multiple parties using privacy preserving analytics to secure the data, while still allowing organizations to query a shared data store.
Data Privacy Simplified – Using Data-Centric Protection to Secure Your Data
Learn how you can perform analytics and share data while still ensuring the appropriate level of data security and privacy.
Critical Steps to Manage CCPA Compliance and Risk in 2020
Examine the impact of the CCPA, answer your burning questions, uncover the CCPA’s nuances, and address its ambiguities and challenges.
CCPA Data Privacy Compliance Simplified
Learn about new techniques that allow for data minimization to simplify the compliance effort with minimal impact to the business.
Encryption Simplified – A Walk-Through of Baffle Data-Centric Protection
Learn more about how Baffle implements its "no code" encryption approach to protect data at the field or record level.
Implementing Record Level Encryption to Ensure Data Privacy for SaaS
Learn how you can implement record level encryption with data shredding techniques in a simplified manner without modifying applications.
Preventing Data Leakage in Cloud Development Environments
Learn how you can support development teams and secure production data in the cloud at the same time.
Securing Data “IN” the Cloud
Learn about how you can simplify protection and security of data IN cloud to accelerate your "lift and shift" and still ensure compliance.
Homomorphic Encryption for Your Business: Fact, Fiction, and Hype
The session will provide an assessment of cryptographic techniques and live demonstrations to show how advanced encryption can protect your sensitive data without breaking application functionality for your business.