Webinars

Are you ready for PCI DSS 4.0?

Full disk encryption is out. How you encrypt your credit card data matters
View IconView Now

Easily build data-secure applications with Postgres in the Cloud

AWS RDS/Aurora is the leading managed Postgres in the cloud. Baffle’s transparent application level-encryption secures the data in Postgres
View IconView Now

Privacy and Security for GenAI

A review of the options to protect data used in GenAI to meet compliance requirements
View IconView Now

The Secret to GDPR-compliant Cloud Migration

In this webinar, join AWS and Baffle to learn how to make your secure cloud migration a compliance success with BYOK and KMS. This session will cover: controlling access to your data at the row or logical database level, centrally managing and defining policies for keys, and securely moving your data to the cloud in a compliant manner.
View IconView Now

Data Security for GenAI

With nearly all data sets in companies' possession containing some form of sensitive data, teams are looking for ways to ensure that the use of these data sets with GenAI is compliant with privacy regulations. Learn best practices for protecting your private data when using it with GenAI.
View IconView Now

Modernize your database with MySQL in the cloud

With Amazon Relational Database Service for MySQL, companies have great choices for a managed database service at the core of their application.  With Baffle Data Protection for Databases, they are also able to protect their data even better than an on-prem deployment and meet their security and compliance requirements in the shared responsibility model.
View IconView Now

Advanced Encryption for PostgreSQL

Analyze encrypted data without ever seeing the data in clear text. Encrypting data ensures data is protected, even downstream. But, data teams are unable to perform operations on protected data that use traditional encryption methods. The solution is cryptographic protection that follows regulated data while allowing any and all analytical and operational computations on the data.
View IconView Now

Secure Analytics with AWS Redshift

AWS Redshift makes it easy to analyze structured and semi-structured data with the best price performance at any scale. But, with the rise of data privacy regulations worldwide, companies need to ensure their queries don’t violate compliance.
View IconView Now

Modernize your database with PostgreSQL in the cloud

Get more flexibility, improved cost-efficiency, and better security with AWS + Baffle. With Amazon Relational Database Service - PostgreSQL, companies have great choices for a managed database service at the core of their application. With Baffle Data Protection for Databases, they are also able to protect their data even better than an on-prem deployment and meet their security and compliance requirements in the shared responsibility model.
View IconView Now

Saxo Bank: A Success Story for Multi-Tenant Data Security

Learn how Saxo Bank, a provider of an online trading platform, addressed Multi-tenant Data Security (MTDS) to ensure their customers can meet their compliance obligations. MTDS, with Record-level Encryption (RLE), ensures that each customer’s data is secured cryptographically.
View IconView Now

Strategies for Successful Privacy and Compliance Management

EMA analyst and managing director Chris Steffen joins Baffle CEO Ameesh Divatia to share insights and best practices employed by leading organizations to not only accomplish strong privacy and compliance, but also achieve competitive differentiation as a result.
View IconView Now
How to De-Identify Apache Kafka Data Streams

How to De-Identify Apache Kafka Data Streams

Learn how modern data protection approaches and technologies can be used to easily de-identify and re-identify Kafka data streams to share sensitive information securely between internal and external audiences and data domains.
View IconView Now

De-identifying Cloud Data Pipelines: Approaches, Best Practices, and Learnings

Get insights on best practices and lessons learned for securing sensitive data as it migrated to the cloud and used in data pipelines.
View IconView Now
Implementing Data Privacy Webinar

Implementing Data Privacy Controls for Amazon Redshift and Cloud Data Lakes

Attend this webinar to learn how data can be easily de-identified on-the-fly as part of your data pipeline process as it is staged for use in Amazon Redshift or cloud data lakes.
View IconView Now
De Identifying Data In Snowflake And Amazon Redshift

De-identifying Data in Snowflake and Amazon Redshift

Learn how data can be easily de-identified as part of your data pipeline as it is staged for use in Snowflake or Amazon Redshift.
View IconView Now
why you can't stop data breaches

Why You Can’t Stop Data Breaches?

A review of risk and responsibility models will be provided along with an examination of how data distribution and cloud deployments can further exacerbate the challenge of securing data.
View IconView Now
Cloud data risk

Cloud Data Risk: How to Better Protect Your Data in the Cloud

This webinar provides an overview of a new threat model for data and helps identify key risks to data security that may be commonly misunderstood or overlooked.
View IconView Now
tokenize your data in aws ads with aws kms

Tokenize Your Data in AWS RDS with AWS KMS

Learn about different tokenization and data encryption techniques and see how you can stand up a demo of Baffle's Data Protection Services in conjunction with AWS RDS and AWS KMS in a matter of minutes.
View IconView Now
de-identify and secure your data analytics pipeline

De-identify and Secure Your Data Analytics Pipeline

Learn how you can establish an S3 cloud data lake fully de-identified and use AWS Athena to easily access and run analytics on data sets for authorized users.
View IconView Now
Controlling data leakage from AWS S3 and cloud storage

Controlling Data Leakage from AWS S3 and Cloud Storage

Learn how data can be easily de-identified, tokenized or encrypted inside S3 objects to help prevent data leakage while still enabling analytics teams to leverage the scale of cloud infrastructure.
View IconView Now
a case study on threat Intels haring across multiple parties

A Case Study on Threat Intel Sharing Across Multiple Parties

This webinar will provide an overview of threat intelligence sharing across multiple parties using privacy preserving analytics to secure the data, while still allowing organizations to query a shared data store.
View IconView Now
data privacy simplified

Data Privacy Simplified – Using Data-Centric Protection to Secure Your Data

Learn how you can perform analytics and share data while still ensuring the appropriate level of data security and privacy.
View IconView Now
critical steps to manage cape compliance and risk in 2020

Critical Steps to Manage CCPA Compliance and Risk in 2020

Examine the impact of the CCPA, answer your burning questions, uncover the CCPA’s nuances, and address its ambiguities and challenges.
View IconView Now
CCPA data privacy compliance simplified

CCPA Data Privacy Compliance Simplified

Learn about new techniques that allow for data minimization to simplify the compliance effort with minimal impact to the business.
View IconView Now
Encryption simplified

Encryption Simplified – A Walk-Through of Baffle Data-Centric Protection

Learn more about how Baffle implements its "no code" encryption approach to protect data at the field or record level.
View IconView Now
implementing record level encryption to ensure data privacy for SaaS

Implementing Record Level Encryption to Ensure Data Privacy for SaaS

Learn how you can implement record level encryption with data shredding techniques in a simplified manner without modifying applications.
View IconView Now
preventing data leakage inc loud development environments

Preventing Data Leakage in Cloud Development Environments

Learn how you can support development teams and secure production data in the cloud at the same time.
View IconView Now
securing data in the cloud

Securing Data “IN” the Cloud

Learn about how you can simplify protection and security of data IN cloud to accelerate your "lift and shift" and still ensure compliance.
View IconView Now
Homomorphic Encryption for your business

Homomorphic Encryption for Your Business: Fact, Fiction, and Hype

The session will provide an assessment of cryptographic techniques and live demonstrations to show how advanced encryption can protect your sensitive data without breaking application functionality for your business.
View IconView Now