Informatica Data Security

Informatica’s data masking solutions let organizations de-identify and desensitize data for reporting, analytics, and mission-critical applications to counter privacy and regulatory concerns. In addition to encryption, data masking secures data in use by the organization for customer and operational applications. It enables to accelerate regulatory compliance by offering a precise understanding of risk based on data residency, proliferation, protection, and usage across systems, departments, roles, and geographies. Data-centric security provides a risk-based analysis of regulated data and protects the data itself—rather than just the endpoints, networks, and applications it moves between—allowing users to discover, classify, analyze, and protect your data at any given moment.

USP : Informatica’s award-winning intelligent data security solution- [email protected]® automates the process of discovering, analyzing, and visualizing sensitive data so security, compliance, and privacy teams can quickly understand sensitive data risk and apply appropriate controls and policies to the data. With its precise processes that define, discover, and analyze sensitive data for risk helps to replace costly, time-consuming manual data audits

BUYERS
VENDORS
EXPERTS
3.2
ANALYSTS
 

INFORMATICA Big Data Quality detailed analysis

Product Maturity
Company Maturity
Use Case Maturity
Most IMPORTANT
3.1
3.8
3.7
Breadth and Depth of Product Offerings
3.30
4.30
3.95
Product Features and Functionality
3.15
4.00
3.60
Focus on Product Innovation
3.35
2.55
3.40
Product Differentiation and Impact on Customer Value
4.00
5.00
5.00
Product Differentiation and Impact on Customer Value
1.45
3.50
3.00
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

INFORMATICA Big Data Quality has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    20 Participants

  • Niche Quadrant

    All-Asia-Pacific

    23 Participants

  • Niche Quadrant

    All-Europe

    24 Participants

STRENGTHS
  • Product Maturity
    Focus on Product Innovation
  • Product Maturity
    Product Features and Functionality
  • Product Maturity / Services Offered
    Consulting Services
  • Product Maturity / Services Offered
    Managed Security Services
  • Product Maturity / Services Offered
    Support and Maintenance
  • Product Maturity / Technology
    Product Variants
  • Product Maturity / Technology
    Security Information And Event Management (Siem)
  • Product Maturity / Software Offered
    Access Control
  • Product Maturity / Software Offered
    Big Data Governance
  • Product Maturity
    Breadth and Depth of Product Offerings
  • Product Maturity
    Product Differentiation and Impact on Customer Value
  • Product Maturity / Technology
    Intrusion Detection System/Intrusion Prevention System (IDS/IPS)
  • Product Maturity / Technology
    Unified Threat Management (Utm)
  • Product Maturity / Breadth and Depth of Product Offerings
    Product Variants
  • Product Maturity / Breadth and Depth of Product Offerings
    Solutions Offered
  • Product Maturity / Focus on Product Innovation
    R&D Spend
  • Product Maturity / Data Type
    Data in Motion
  • Product Maturity / Data Type
    Data in Rest
  • Product Maturity / Product Enhancement Development
    New Product Launches
  • Product Maturity / Product Enhancement Development
    Product Upgradation
WEAKNESSES
  • Product Maturity / Technology
    Other Technology Offered
  • Product Maturity / Software Offered
    Others (Big Data Customization and Discovery, and Audit and Reporting)
  • Product Maturity / Software Offered
    Technology
  • Product Maturity / Software Offered
    Backup and Recovery
  • Product Maturity / Software Offered
    Security Intelligence
  • Product Maturity / Focus on Product Innovation
    No. of Innovations
  • Product Maturity / Product Differentiation and Impact on Cus...
    Ability to Expand the Capability
  • Product Maturity / Product Differentiation and Impact on Cus...
    Customer Feedback
  • Product Maturity / Product Features and Functionality
    Type of Channels
  • Product Maturity / Services Offered
    Education and Training
See More

Have you EVER used INFORMATICA Big Data Quality Products?

Share your experience with potential buyers.

TOP FEATURES
  • Technology
    Security Information And Event Management (S..
  • Services Offered
    Support and Maintenance
  • Software Offered
    Big Data Governance
  • Software Offered
    Access Control
  • Services Offered
    Consulting Services
  • Services Offered
    Managed Security Services
  • Technology
    Product Variants
  • Technology
    Unified Threat Management (Utm)
  • Technology / Intrusion Detection System/Intrusion Prevention..
    IPS)
  • Product Features and Functionality
    Data Type

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS


...

Marie Stelle

Engagement Partner - 360Quadrants.com