Redshift De-identification Demo

Protecting Your Data in Your Cloud with the Baffle Data Privacy Cloud

| | Cloud, Privacy
As organizations continue to build out their cloud-based data lakes and analytics environments, there’s a huge push to implement data privacy and de-identification methods for their data. At Baffle, we’ve always held the belief that customers should control their keys and their data, which is why it has been a ... Read More

A Message From CEO and Co-founder Ameesh Divatia on Baffle’s Series B Funding

| | General
Since Baffle’s inception in 2015, we’ve strived to look at data protection through a unique lens. That idea is simple: Assume that breaches will happen and ensure unprotected data is never available to an attacker. And as businesses have raced to the cloud over the last 18 months, we’ve seen ... Read More

Is Tokenization a Good Way to Protect Your Data?

This blog looks at vault-based data tokenization methods and some key challenges on using such approaches in modern compute environments. Data tokenization is a method that transforms a data value to a token value and is often used for data security and compliance.  There are basically three approaches to enabling ... Read More

A Technical Overview of HYOK and RLE with Baffle DPS

As adoption of Hold Your Own Key (HYOK) and Bring Your Own Key (BYOK) continues to increase, we’ve encountered more questions around how our Baffle Data Protection Services (DPS) implementation actually works.  This blog will cover some of the main components of how we enable an HYOK model for multi-tenant ... Read More
Snowflake demo

De-identifying Data into Snowflake

We recently announced our partnership with Snowflake (you can read more here), and are proud of our unique approach to data de-identification.  This article and video cover how we’ve approached this integration to help address privacy concerns and accelerate customers’ move to Snowflake’s Data Cloud. Baffle’s integration with Snowflake is ... Read More
Baffle Manager Migration Demo-Pub

Tokenize and de-identify data in AWS RDS in less than 10 minutes

| | Cloud, Privacy
Follow this link to read the Amazon Partner Network (APN) Blog. When it comes to security implementations, the amount of friction or overhead generated by an initiative or solution can determine the success or failure of a project. Particularly in the DevOps world we operate in, the speed with which ... Read More
Adaptive Data Security Demo

Adaptive data security controls to reduce the risk of data breaches

2020 is the year that just keeps on giving.  We’ve written a fair amount about how to assess the threat model for your data and reduce the risk of data breaches using various data protection strategies. In the wake of one the largest cyberattacks in the U.S. and against the ... Read More