Systems | Development | Analytics | API | Testing

Security

How Material Security Protects The Privacy The Productivity Suite

Abhishek Agrawal, Co-founder and CEO of Material Security, chats with "Powered by Snowflake" host Phoebe He about his company's mission to protect the productivity suite, namely Microsoft 365 and Google Workspace. Its customer base crosses all industries as well as customers of all sizes. The conversation includes a demo of the platform that shows how to set up the solution and the kind of reports it generates for an organization's security team. It also covers how the solution accounts for organization's who have employees working from home and who use their mobile phones to conduct business communications.

How to Navigate the Costs of Legacy SIEMs with Snowflake

Legacy security information and event management (SIEM) solutions, like Splunk, are powerful tools for managing and analyzing machine-generated data. They have become indispensable for organizations worldwide, particularly for security teams. But as much as security operation center (SOC) analysts have come to rely on solutions like Splunk, there is one complaint that comes up for some: Costs can quickly add up.

How Snowflake Powers The Next Generation Of Cybersecurity Applications

Cybersecurity is extremely data-intensive and complex. Top cybersecurity companies such as Lacework, Sophos, Panther, Hunters, Auditboard, Orca Security, and Dassana leverage Snowflake to provide out-of-the-box solutions. These companies are building the next generation of cybersecurity applications by harnessing the power of the Snowflake Data Cloud to provide differentiated product capabilities to security teams.

Calling All White Hat Hackers!

Imagine a world where every piece of digital content can be verified and traced back to its source. Lindsay Walker, Product Lead at Starling Lab for Data Integrity, walks us through the emerging tools that could make this possible. While AI tools hold incredible potential for good, Lindsay also warns against threats and countermeasures needed to keep our virtual representations safe. She emphasizes the need to build provenance into tools, discusses blockchain use cases, and shares systems that implement hashes for security.

Data Security and Compliance: 5 Essential Considerations

With data continuously growing in complexity and quantity, ensuring data security is more important than ever when choosing to buy a business intelligence (BI) solution. From data protection to data governance, having a BI platform that enables you to control, audit, encrypt and manage user access and usage of sensitive data is essential.

Keeping Your APIs Safe: Best Practices for Top-Notch Security

Application programming interfaces (APIs) are everywhere, and they play a role in running nearly everything in our digital-centric lives. Each time we launch a web page or an app on our phone, dozens of API calls are happening in the background to render an experience heavily customized to you. Increasingly, even the everyday items in your home are talking to APIs — from smart speakers like Amazon Echo to appliances, electricity meters, and lightbulbs.