Secure@Source v5.0 has been released to shipping and is available immediately. Secure@Source Protection – a new product offering to secure data at rest and in use – has also been released to shipping. The following new capabilities deliver broad visibility and remediation for data privacy and protection initiatives:

 

Subject Registry: Privacy Discovery for Subject Rights

  • Identify and map identities to associated data in stores across an enterprise environment
  • Support for unstructured sources to identify subject data in files
  • Export Subject Registry summary, detail, and attribute location information to CSV files
  • Group subject data by Data Domain or Data Store Owner to simplify remediation and delegation tasks

Benefits: Searchable view of data subjects and the location of their sensitive data across the enterprise to support privacy tasks and compliance with regulatory policies such as GDPR and CCPA.

*Enhanced AXON integration: Processes and Stakeholders

  • Integration of Axon Processes
    • Overlay display of Processes in Secure@Source data proliferation view
    • Evaluation of Process condition rules in security policies
  • Integration of Axon Stakeholder information for policy violation notification

  Benefits: Expanded end-to-end governance capabilities for privacy use cases across business and technical users.

  *Available via a pending patch

 

Core Improvements

  • Flexible upgrade path from 4.0, 4.1, and 4.5 to 5.0
  • Usability enhancements and customer feedback improvements
    • New Custom Notes capture and reporting for sensitive fields
    • Expanded scan options
    • Improved scan processing status and reporting
    • Enhanced job management capabilities
    • Persisted user preferences for display columns
  • Improved unstructured scanning performance
  • Updated JVM to OpenJDK 1.8.0_192 (Azul)

  Benefits: Greater ease of use and performance.

 

Secure@Source Protection: This is a new product offering providing data security for analytical repositories

  • Data at Rest encryption of sensitive data
    • In-place encryption
    • Multiple encryption options, including Format Preserving Encryption (FPE) which does not require application coding or schema changes
  • Data in Use decryption based on security policies
    • Support for evaluation conditions including data store attributes, metadata information, data domains, user attributes and query context
    • Optional notification and logging actions to support audit and security requirements
  • Inbuilt KMIP compliant key management system for management of encryption keys

   Benefits: Granular data protection both at rest and in use with policy based access to data

 

Informatica Secure@Source 5.0 Release Notes

 

Informatica Secure@Source 5.0 Release Guide

 

PAM for Informatica Secure@Source 5.0