Information Governance Blog

2018 – a Great Year for MinerEye
20.12.2018 | by Yaniv Avidan

Happy Holidays and a Happy New Year from us at Minereye. We welcome you to take a quick look at what we’ve accomplished in 2018 with our customers, partners and the great team at MinerEye. New Customers MinerEye saw its customer base increase with the addition of new customers in multiple verticals that include finance, software, […]

Read More
Why Has Data Classification Become So Popular?
01.09.2018 | by Yaniv Avidan

A year ago, data classification was of minimal importance. No Twitter hashtags, no research coverage, hardly any mentions in the media. Fast forward to now and it seems as if everyone is talking and writing about the topic. And for good reason. Gartner recently released its prestigious Hype Cycle reports for 2018. In seven reports […]

Read More
Automated Data Classification Enables Utilizing a “Hybrid” Cloud Model

Hybrid cloud models are designed to allow institutions to simultaneously store and process certain data in the cloud, while a portion of the processing or storage is done locally on-premise. For example, the application may reside in the cloud, but the customer data is stored locally. This may make the decision easier, but only makes […]

Read More
End Point is Dead, Long Live Data – The New End Point

Data has traditionally been seen as the passive result of transactional systems, to be surrounded, protected, and secured in systems that take an active part in the overall security perimeter of an enterprise. As that perimeter decomposes and becomes more fluid (e.g., cloud, mobile, IoT), data must be elevated so that each data object can […]

Read More
Data Segregation and Access Control Powered by AI

The network perimeter  has crumbled, and challenges the traditional “hard exterior, soft interior” network security model. MinerEye leverages AI to handle data segregation across platforms without the capital expense or disruptions to operations. It enables enterprises to identify and segregate data for various user groups within their infrastructures to ensure that data is accessible only to […]

Read More