Saxo Bank: A Success Story for Multi-Tenant Database Security
Learn how Saxo Bank, a provider of an online trading platform, addressed Multi-tenant Database Security (MTDS) to ensure their customers can meet their compliance obligations. MTDS, with Record-level Encryption (RLE), ensures that each customer’s data is secured cryptographically.
Strategies for Successful Privacy and Compliance Management
EMA analyst and managing director Chris Steffen joins Baffle CEO Ameesh Divatia to share insights and best practices employed by leading organizations to not only accomplish strong privacy and compliance, but also achieve competitive differentiation as a result.
How to De-Identify Apache Kafka Data Streams
Learn how modern data protection approaches and technologies can be used to easily de-identify and re-identify Kafka data streams to share sensitive information securely between internal and external audiences and data domains.
De-identifying Cloud Data Pipelines: Approaches, Best Practices, and Learnings
Get insights on best practices and lessons learned for securing sensitive data as it migrated to the cloud and used in data pipelines.
Implementing Data Privacy Controls for Amazon Redshift and Cloud Data Lakes
Attend this webinar to learn how data can be easily de-identified on-the-fly as part of your data pipeline process as it is staged for use in Amazon Redshift or cloud data lakes.
De-identifying Data in Snowflake and Amazon Redshift
Learn how data can be easily de-identified as part of your data pipeline as it is staged for use in Snowflake or Amazon Redshift.
Why You Can’t Stop Data Breaches?
A review of risk and responsibility models will be provided along with an examination of how data distribution and cloud deployments can further exacerbate the challenge of securing data.
Cloud Data Risk: How to Better Protect Your Data in the Cloud
This webinar provides an overview of a new threat model for data and helps identify key risks to data security that may be commonly misunderstood or overlooked.
Tokenize Your Data in AWS RDS with AWS KMS
Learn about different tokenization and data encryption techniques and see how you can stand up a demo of Baffle's Data Protection Services in conjunction with AWS RDS and AWS KMS in a matter of minutes.
De-identify and Secure Your Data Analytics Pipeline
Learn how you can establish an S3 cloud data lake fully de-identified and use AWS Athena to easily access and run analytics on data sets for authorized users.
Controlling Data Leakage from AWS S3 and Cloud Storage
Learn how data can be easily de-identified, tokenized or encrypted inside S3 objects to help prevent data leakage while still enabling analytics teams to leverage the scale of cloud infrastructure.
A Case Study on Threat Intel Sharing Across Multiple Parties
This webinar will provide an overview of threat intelligence sharing across multiple parties using privacy preserving analytics to secure the data, while still allowing organizations to query a shared data store.
Data Privacy Simplified – Using Data-Centric Protection to Secure Your Data
Learn how you can perform analytics and share data while still ensuring the appropriate level of data security and privacy.
Critical Steps to Manage CCPA Compliance and Risk in 2020
Examine the impact of the CCPA, answer your burning questions, uncover the CCPA’s nuances, and address its ambiguities and challenges.
CCPA Data Privacy Compliance Simplified
Learn about new techniques that allow for data minimization to simplify the compliance effort with minimal impact to the business.
Encryption Simplified – A Walk-Through of Baffle Data-Centric Protection
Learn more about how Baffle implements its "no code" encryption approach to protect data at the field or record level.
Implementing Record Level Encryption to Ensure Data Privacy for SaaS
Learn how you can implement record level encryption with data shredding techniques in a simplified manner without modifying applications.
Preventing Data Leakage in Cloud Development Environments
Learn how you can support development teams and secure production data in the cloud at the same time.
Securing Data “IN” the Cloud
Learn about how you can simplify protection and security of data IN cloud to accelerate your "lift and shift" and still ensure compliance.
Homomorphic Encryption for Your Business: Fact, Fiction, and Hype
The session will provide an assessment of cryptographic techniques and live demonstrations to show how advanced encryption can protect your sensitive data without breaking application functionality for your business.