Immuta has launched its most recent product Immuta Detect. Immuta Detect alerts data and security teams about risky data access behavior through its continuous data security monitoring capabilities. This improves data security posture management across contemporary cloud data platforms and allows for more precise risk remediation.
Mo Plassnig, CPO, Immuta stated, “In the modern business landscape, organizations face a challenging dichotomy in which they need to use and share data to remain competitive but also maintain the highest standards of data security.
It comes down to managing your risk appetite and to do that effectively, it is vital for teams to have a comprehensive view of data access activities and risks. Immuta Detect is an important step towards meeting customer demands for a comprehensive approach to data security, from discovering sensitive data, protecting it, and monitoring its usage, to keeping data policies up to date.”
Immuta’s Data Security Platform now includes a new key pillar that provides sensitive data discovery, security and access control, and data activity monitoring. The platform integrates with existing SIEM and Managed Detection and Response (MDR) tools as well as cloud data platforms.
As the number of data sources and users in modern cloud environments grows, monitoring data usage and responding to threats becomes more difficult. This is critical for safeguarding against insider threats and adhering to rules and regulations.
Customers can utilize Immuta Detect’s new features to surface and prioritize risks associated with data usage, shorten the time required for risk mitigation, and maintain data security.
Advanced access behavior analytics – Immuta Detect unifies data access logs so that data and security teams can continuously monitor and analyze changes in user behavior and data access entitlements by source, query, or user activity, as well as gain understanding of security configuration and data classification changes.
Sensitive data views and indicators – Immuta Detect provides analysis of individual user and data activity, summarizing activity across time frame, data access events categorization, most active data sources, and sensitive data indicators.