{"id":32827,"date":"2023-07-15T03:00:00","date_gmt":"2023-07-15T10:00:00","guid":{"rendered":"https:\/\/insidebigdata.com\/?p=32827"},"modified":"2023-07-10T11:36:19","modified_gmt":"2023-07-10T18:36:19","slug":"7-key-security-criteria-for-data-tools-a-buyers-guide","status":"publish","type":"post","link":"https:\/\/insidebigdata.com\/2023\/07\/15\/7-key-security-criteria-for-data-tools-a-buyers-guide\/","title":{"rendered":"7 Key Security Criteria for Data Tools: A Buyer&#8217;s Guide"},"content":{"rendered":"\n<p>How many specialized SaaS tools does your company have for moving, analyzing, and profiling data across departments? If you\u2019re like most digital companies today, the answer is \u201c<a href=\"https:\/\/www.statista.com\/statistics\/1233538\/average-number-saas-apps-yearly\/\" target=\"_blank\" rel=\"noreferrer noopener\">more and more<\/a>.\u201d<\/p>\n\n\n\n<p>In the last decade, the decentralization of data competencies and increased adoption of cloud-based deployment models has resulted in a wider-than-ever range of data tools on the market, and a greater-than-ever need to use them. They include:<\/p>\n\n\n\n<ul>\n<li>Extract, transform, load (ETL) and extract, load, transform (ELT) platforms<\/li>\n\n\n\n<li>Information platforms as a service (iPaaS)<\/li>\n\n\n\n<li>Data warehousing solutions<\/li>\n\n\n\n<li>Data visualization solutions<\/li>\n\n\n\n<li>ML\/AI engines that ingest data models and build AI engineering models on top of them<\/li>\n<\/ul>\n\n\n\n<p>Using such tools to build a <a href=\"https:\/\/www.gartner.com\/document\/4060299\" target=\"_blank\" rel=\"noreferrer noopener\">composable data architecture<\/a> is key to staying agile in the fast-evolving world of digital business, but it raises two important questions about security: <strong>How can we ensure that vendors of SaaS data solutions are keeping our data and our customers\u2019 data safe? What security mechanisms do these tools offer to help <em>us as users<\/em> prevent the leakage of sensitive data?<\/strong><\/p>\n\n\n\n<p>With <a href=\"https:\/\/www.cnbc.com\/2022\/01\/18\/fines-for-breaches-of-eu-gdpr-privacy-law-spike-sevenfold.html\" target=\"_blank\" rel=\"noreferrer noopener\">GDPR fines<\/a> and <a href=\"https:\/\/www.wsj.com\/articles\/rise-in-cyberattacks-stretches-and-stresses-defenders-11664962202\" target=\"_blank\" rel=\"noreferrer noopener\">hacking incidents<\/a> on the rise, companies should be answering these questions before buying.<\/p>\n\n\n\n<p><strong>7 Security Criteria to Guide Buyers of Data Tools<\/strong><\/p>\n\n\n\n<p>Below are seven criteria to look out for when evaluating the suitability of any data tool for inclusion in your data stack.<\/p>\n\n\n\n<p><em>SOC 2 Type 2 Certification<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itgovernance.co.uk\/soc-reporting\" target=\"_blank\" rel=\"noreferrer noopener\">SOC 2<\/a> (System and Organization Controls 2) is a type of audit report that measures how securely service organizations\u2014in particular those providing cloud-based services\u2014handle customer data. More specifically, it is an independent assessment of controls for security, availability, processing integrity, confidentiality, and privacy.\u00a0<\/p>\n\n\n\n<p>Whereas type 1 reports are only snapshots of an organization\u2019s controls at a specific point in time, type 2 reports evaluate the effectiveness of a service organization\u2019s controls over a longer period of time (minimum 6 months).<\/p>\n\n\n\n<p>SOC 2 Type 2 certification is therefore the standard for how cloud service providers should manage customer data.<\/p>\n\n\n\n<p><em>ISO 27001 Certification or Compliance<\/em><\/p>\n\n\n\n<p>ISO 27001 is an international standard for information security management systems (ISMS) and their requirements. Certification or compliance with this standard is a reasonable substitute for\u2014or proper supplement to\u2014SOC 2 Type 2 certification. (However, SOC 2 Type II certification is more thorough because it requires an on-site check from an independent auditor.)<\/p>\n\n\n\n<p>The standard provides for <a href=\"https:\/\/egs.eccouncil.org\/what-do-you-know-about-iso-27001\/\" target=\"_blank\" rel=\"noreferrer noopener\">six areas of data security<\/a>: company security policy, asset management, physical and environmental security, access control, incident management, and regulatory compliance.<\/p>\n\n\n\n<p><em>Compliance with Important Local and Regional Data Protection Standards<\/em><\/p>\n\n\n\n<p>Such standards include <a href=\"https:\/\/insidebigdata.com\/2018\/06\/02\/now-gdpr-arrived-5-ways-company-can-catch-fast\/\" target=\"_blank\" rel=\"noreferrer noopener\">GDPR for Europe<\/a>, CCPA and HIPAA in the US, LGPD for Brazil, and POPIA for South Africa.<\/p>\n\n\n\n<p>Though it\u2019s not possible to be certified for all of these (there is no GDPR certification, for example) data tool vendors operating in these areas should be taking steps to ensure compliance. Fortunately, if a data tool vendor is SOC 2 Type 2 certified, they are also by default compliant with the standards mentioned above.<\/p>\n\n\n\n<p><em>Data Masking\/Exclusion Capability<\/em><\/p>\n\n\n\n<p>Data masking and exclusion capabilities are something you would look for in a data integration tool specifically, because they prevent the flow of personal identifiable information (PII) and other sensitive data from one system to another entirely.<\/p>\n\n\n\n<p>CRMs and ERPs, for instance, are systems that contain a lot of sensitive data on customers and employees, like address information, payroll information, and so on. These systems have strictly controlled access levels, so as long as the sensitive data stays inside them, there isn\u2019t much of a security risk. If your data integration tool offers data exclusion functionality, you can simply exclude\u2014or <em>not<\/em> extract\u2014sensitive data when moving datasets across systems.<\/p>\n\n\n\n<p>But, sometimes, sensitive information <em>needs<\/em> to be extracted; for example, when an email address is the only reasonable customer identifier for use in downstream systems. If your data integration tool offers masking functionality, you can mask or hash this data during extraction. This way, the uniqueness of the email address as an identifier is preserved, but the email address itself is hidden from view.&nbsp;&nbsp;<\/p>\n\n\n\n<p><em>Role-Based Access Control (RBAC)<\/em><\/p>\n\n\n\n<p>Vendors should allow you to set multiple permission levels for the use of their tools, e.g. for viewing, editing, authorizing, etc. This makes managing access controls much easier, because it allows administrators to assign permissions to roles rather than to individual users.<\/p>\n\n\n\n<p><em>Data Encryption Capability<\/em><\/p>\n\n\n\n<p>There are two basic types of data encryption: encryption in rest and encryption in transit. For tools that move data around, ask about encryption in transit (Does the vendor support SSH tunnelling and VPNs?). For tools that store data, ask about encryption at rest (What kind of ciphers are being used? AES256 is the standard.).&nbsp;<\/p>\n\n\n\n<p>For both types of tools, ask how encryption keys are stored. Best practice is to use a third-party, hardware security module (HSM) key management service like AWS Key Management Service. Vendors using services like this don\u2019t actually have access to the keys because they are encrypted via the service\u2019s API.<\/p>\n\n\n\n<p><em>Logging and Auditing Systems<\/em><\/p>\n\n\n\n<p>Make sure that each tool has a logging system in place. This way, you can keep a complete overview of all activity within the tool and, if a security incident ever <em>does<\/em> occur, you will have all the records you need to conduct a forensic analysis.<\/p>\n\n\n\n<p><strong>No Silver Bullet, Only Due Diligence<\/strong><\/p>\n\n\n\n<p>Even though we are relying more and more on the measures that tool vendors take to ensure the security of our data, we ourselves are just as responsible for it as we\u2019ve always been.<\/p>\n\n\n\n<p>Indeed, no matter how secure a data tool is on the vendor\u2019s side, it should still give us the capabilities we need to do our part.<\/p>\n\n\n\n<p>If any given data tool meets the above criteria, you\u2019ll know that its vendor pays due diligence to data security, so that you can, too.<\/p>\n\n\n\n<p><strong>About the Author<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"150\" height=\"135\" src=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2023\/07\/Petr-Nemeth-Dataddo-CEO.jpg\" alt=\"\" class=\"wp-image-32828\"\/><\/figure><\/div>\n\n\n<p><em>Petr Nemeth is the founder and CEO of <a href=\"https:\/\/dataddo.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dataddo<\/a>\u2014a fully managed, no-code data integration platform that connects cloud-based services, dashboarding applications, data warehouses, and data lakes. The platform offers ETL, ELT, reverse ETL, and data replication functionality, as well as an extensive portfolio of 200+ connectors, enabling business professionals with any level of technical expertise to send data from virtually any source to any destination. Before founding Dataddo, Petr worked as a developer, analyst, and system architect for telco, IT, and media companies on large-scale projects involving the internet of things, big data, and business intelligence.<\/em><\/p>\n\n\n\n<p><em>Sign up for the free insideBIGDATA&nbsp;<a href=\"http:\/\/inside-bigdata.com\/newsletter\/\" target=\"_blank\" rel=\"noreferrer noopener\">newsletter<\/a>.<\/em><\/p>\n\n\n\n<p><em>Join us on Twitter:&nbsp;<a href=\"https:\/\/twitter.com\/InsideBigData1\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/twitter.com\/InsideBigData1<\/a><\/em><\/p>\n\n\n\n<p><em>Join us on LinkedIn:&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/insidebigdata\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.linkedin.com\/company\/insidebigdata\/<\/a><\/em><\/p>\n\n\n\n<p><em>Join us on Facebook:&nbsp;<a href=\"https:\/\/www.facebook.com\/insideBIGDATANOW\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.facebook.com\/insideBIGDATANOW<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this contributed article, Petr Nemeth. founder and CEO of Dataddo, discusses how data security is becoming a major concern for buyers of data tools. Here are seven criteria to help evaluate the suitability of any data tool for your data stack.<\/p>\n","protected":false},"author":10513,"featured_media":22592,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[115,180,268,56,97,1],"tags":[110,96],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>7 Key Security Criteria for Data Tools: A Buyer&#039;s Guide - insideBIGDATA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insidebigdata.com\/2023\/07\/15\/7-key-security-criteria-for-data-tools-a-buyers-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Key Security Criteria for Data Tools: A Buyer&#039;s Guide - insideBIGDATA\" \/>\n<meta property=\"og:description\" content=\"In this contributed article, Petr Nemeth. founder and CEO of Dataddo, discusses how data security is becoming a major concern for buyers of data tools. Here are seven criteria to help evaluate the suitability of any data tool for your data stack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insidebigdata.com\/2023\/07\/15\/7-key-security-criteria-for-data-tools-a-buyers-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"insideBIGDATA\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/insidebigdata\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-15T10:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-10T18:36:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2019\/05\/Security_SHUTTERSTOCK.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"186\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editorial Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:site\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editorial Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insidebigdata.com\/2023\/07\/15\/7-key-security-criteria-for-data-tools-a-buyers-guide\/\",\"url\":\"https:\/\/insidebigdata.com\/2023\/07\/15\/7-key-security-criteria-for-data-tools-a-buyers-guide\/\",\"name\":\"7 Key Security Criteria for Data Tools: A Buyer's Guide - insideBIGDATA\",\"isPartOf\":{\"@id\":\"https:\/\/insidebigdata.com\/#website\"},\"datePublished\":\"2023-07-15T10:00:00+00:00\",\"dateModified\":\"2023-07-10T18:36:19+00:00\",\"author\":{\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9\"},\"breadcrumb\":{\"@id\":\"https:\/\/insidebigdata.com\/2023\/07\/15\/7-key-security-criteria-for-data-tools-a-buyers-guide\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insidebigdata.com\/2023\/07\/15\/7-key-security-criteria-for-data-tools-a-buyers-guide\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insidebigdata.com\/2023\/07\/15\/7-key-security-criteria-for-data-tools-a-buyers-guide\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insidebigdata.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 Key Security Criteria for Data Tools: A Buyer&#8217;s Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insidebigdata.com\/#website\",\"url\":\"https:\/\/insidebigdata.com\/\",\"name\":\"insideBIGDATA\",\"description\":\"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insidebigdata.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9\",\"name\":\"Editorial Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g\",\"caption\":\"Editorial Team\"},\"sameAs\":[\"http:\/\/www.insidebigdata.com\"],\"url\":\"https:\/\/insidebigdata.com\/author\/editorial\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 Key Security Criteria for Data Tools: A Buyer's Guide - insideBIGDATA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insidebigdata.com\/2023\/07\/15\/7-key-security-criteria-for-data-tools-a-buyers-guide\/","og_locale":"en_US","og_type":"article","og_title":"7 Key Security Criteria for Data Tools: A Buyer's Guide - insideBIGDATA","og_description":"In this contributed article, Petr Nemeth. founder and CEO of Dataddo, discusses how data security is becoming a major concern for buyers of data tools. Here are seven criteria to help evaluate the suitability of any data tool for your data stack.","og_url":"https:\/\/insidebigdata.com\/2023\/07\/15\/7-key-security-criteria-for-data-tools-a-buyers-guide\/","og_site_name":"insideBIGDATA","article_publisher":"http:\/\/www.facebook.com\/insidebigdata","article_published_time":"2023-07-15T10:00:00+00:00","article_modified_time":"2023-07-10T18:36:19+00:00","og_image":[{"width":300,"height":186,"url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2019\/05\/Security_SHUTTERSTOCK.jpg","type":"image\/jpeg"}],"author":"Editorial Team","twitter_card":"summary_large_image","twitter_creator":"@insideBigData","twitter_site":"@insideBigData","twitter_misc":{"Written by":"Editorial Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insidebigdata.com\/2023\/07\/15\/7-key-security-criteria-for-data-tools-a-buyers-guide\/","url":"https:\/\/insidebigdata.com\/2023\/07\/15\/7-key-security-criteria-for-data-tools-a-buyers-guide\/","name":"7 Key Security Criteria for Data Tools: A Buyer's Guide - insideBIGDATA","isPartOf":{"@id":"https:\/\/insidebigdata.com\/#website"},"datePublished":"2023-07-15T10:00:00+00:00","dateModified":"2023-07-10T18:36:19+00:00","author":{"@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9"},"breadcrumb":{"@id":"https:\/\/insidebigdata.com\/2023\/07\/15\/7-key-security-criteria-for-data-tools-a-buyers-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insidebigdata.com\/2023\/07\/15\/7-key-security-criteria-for-data-tools-a-buyers-guide\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insidebigdata.com\/2023\/07\/15\/7-key-security-criteria-for-data-tools-a-buyers-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insidebigdata.com\/"},{"@type":"ListItem","position":2,"name":"7 Key Security Criteria for Data Tools: A Buyer&#8217;s Guide"}]},{"@type":"WebSite","@id":"https:\/\/insidebigdata.com\/#website","url":"https:\/\/insidebigdata.com\/","name":"insideBIGDATA","description":"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insidebigdata.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9","name":"Editorial Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g","caption":"Editorial Team"},"sameAs":["http:\/\/www.insidebigdata.com"],"url":"https:\/\/insidebigdata.com\/author\/editorial\/"}]}},"jetpack_featured_media_url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2019\/05\/Security_SHUTTERSTOCK.jpg","jetpack_shortlink":"https:\/\/wp.me\/p9eA3j-8xt","jetpack-related-posts":[{"id":32768,"url":"https:\/\/insidebigdata.com\/2023\/07\/04\/why-do-we-prefer-elt-rather-than-etl-in-the-data-lake-what-is-the-difference-between-etl-elt\/","url_meta":{"origin":32827,"position":0},"title":"Why Do We Prefer ELT Rather than ETL in the Data Lake? What is the Difference between ETL &#038; ELT","date":"July 4, 2023","format":false,"excerpt":"In this article, Ashutosh Kumar discusses the emergence of modern data solutions that have led to the development of ELT and ETL with unique features and advantages. ELT is more popular due to its ability to handle large and unstructured datasets like in data lakes. Traditional ETL has evolved into\u2026","rel":"","context":"In &quot;Big Data Software&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2019\/10\/data-lakes_SHUTTERSTOCK.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":12105,"url":"https:\/\/insidebigdata.com\/2014\/10\/16\/cloudera-red-hat-forge-big-data-alliance\/","url_meta":{"origin":32827,"position":1},"title":"Cloudera and Red Hat Forge Big Data Alliance","date":"October 16, 2014","format":false,"excerpt":"Cloudera, a leader in enterprise analytic data management powered by Apache\u2122 Hadoop\u00ae, and Red Hat, Inc. (NYSE:RHT), a leading provider of open source solutions, has announced an alliance to deliver joint enterprise software solutions including data integration and application development tools, and data platforms.","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":15159,"url":"https:\/\/insidebigdata.com\/2016\/06\/09\/iguaz-io-unveils-virtualized-data-services-architecture\/","url_meta":{"origin":32827,"position":2},"title":"iguaz.io Unveils Virtualized Data Services Architecture","date":"June 9, 2016","format":false,"excerpt":"iguaz.io, the disruptive company challenging the status quo for big data, the Internet of Things (IoT) and cloud-native applications, unveiled its vision and architecture for revolutionizing data services for both private and public clouds.","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10287,"url":"https:\/\/insidebigdata.com\/2014\/06\/30\/cambridge-semantics-launches-anzo-smart-data-integration-simplify-enhance-process-data-migration\/","url_meta":{"origin":32827,"position":3},"title":"Cambridge Semantics Launches Anzo Smart Data Integration Software","date":"June 30, 2014","format":false,"excerpt":"Cambridge Semantics, a leading provider of Smart Data solutions driven by Semantic Web technology, has announced the launch of its Anzo Smart Data Integration (ASDI) software to help enterprises rapidly understand and integrate information assets. ASDI is designed to reduce integration time-frames and costs by 10x and enhance time-to-revenue when\u2026","rel":"","context":"In &quot;Analytics&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12982,"url":"https:\/\/insidebigdata.com\/2015\/04\/10\/platfora-arms-information-security-teams-with-new-big-data-analytics-tools\/","url_meta":{"origin":32827,"position":4},"title":"Platfora Arms Information Security Teams with New Big Data Analytics Tools","date":"April 10, 2015","format":false,"excerpt":"Platfora, a leading native big data analytics platform for Hadoop, announced Platfora Big Data Analytics for Security, a solution that delivers petabyte-scale analysis of enterprise data for use in security investigations of targeted attacks.","rel":"","context":"In &quot;Analytics&quot;","img":{"alt_text":"Platfora_security","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2015\/04\/Platfora_security.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":30702,"url":"https:\/\/insidebigdata.com\/2022\/10\/22\/it-leaders-shouldnt-have-exclusive-data-access-how-citizen-data-analysts-can-help\/","url_meta":{"origin":32827,"position":5},"title":"IT Leaders Shouldn&#8217;t have Exclusive Data Access. How Citizen Data Analysts Can Help","date":"October 22, 2022","format":false,"excerpt":"In this contributed article, Jerod Johnson, senior technology evangelist at CData Software, discusses how organizations can empower citizen data analysts to help reduce the workload of IT. IT departments have a lot on their shoulders already with a backlog of planned IT projects going back anywhere from three months to\u2026","rel":"","context":"In &quot;Analytics&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/32827"}],"collection":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/users\/10513"}],"replies":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/comments?post=32827"}],"version-history":[{"count":0,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/32827\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media\/22592"}],"wp:attachment":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media?parent=32827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/categories?post=32827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/tags?post=32827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}