Remove 2000 Remove Experimentation Remove Snapshot Remove Structured Data
article thumbnail

Interview with Dominic Sartorio, Senior Vice President for Products & Development, Protegrity

Corinium

Then when there is a breach, it comes as a shock, “wow, I didn’t even know that application had access to so much sensitive data”. Step One in any data security program should first be to discover and classify datasets that are sensitive, and know where that data is, and understand who really needs it to do their jobs.

Insurance 150