Data Security, Platform Security

Laminar Named a Sample Vendor for Data Security Posture Management in 2022 Gartner® Hype Cycle™ for Data Security

Laminar
Laminar, a public cloud data security provider, today announced that it has been named by Gartner as a Sample Vendor for Data Security Posture Management (DSPM) in the Hype Cycle for Data Security, 2022. In addition to referencing Laminar, the Hype Cycle also gives DSPM a benefit rating of “transformational,” the highest benefit rating possible.

Laminar is a cloud data security platform that delivers autonomous, agentless, and continuous data security for everything that you build and run in the cloud. Laminar provides autonomous discovery and classification for all data across AWS, Azure, GCP, and Snowflake into a cloud data catalog, prioritization of data assets by our proprietary risk model, an agentless and asynchronous approach to DSPM to reduce the exposure surface without impacting performance, and continuous monitoring to detect data leaks in real time.

“We have consistently heard from our customers that the visibility provided by the Laminar platform is transformational and we are thrilled to see Gartner classify DSPM as such in this Hype Cycle report. “We are thrilled that Gartner and the market are recognizing the need for DSPM. We believe that this recognition validates our view that organizations must move to a data-centric security approach that enables data democratization, safely.”

Amit Shaked, co-founder and CEO, Laminar

According to Gartner, “Organizations face challenges mitigating data security and privacy risks as data rapidly proliferates across multi-cloud and hybrid IT architectures. Identifying meaningful data risk is impossible to solve without combining metrics from data sensitivity, data lineage, infrastructure configurations that create data risks and access risk into a common view. This is an urgent problem that is encouraging rapid growth in the availability and maturation of this technology.”

As Gartner explained, “DSPM provides visibility of inconsistent security posture by analyzing a data map of user access to various datasets for identifying business risks. DSPM accelerates assessments of how data security posture can be enforced through complementary data security controls to reduce business risks despite the speed, complexity, dynamics and scale of hybrid IT and multi-cloud deployments.”

The drivers of DSPM adoption according to Gartner include:

  • Need to create a data map of user access against specific datasets has been a complex process in the past because traditional data security and IAM products are siloed in the way they operate.
  • Need to map and track the evolution and data lineage across structured and unstructured formats, and across all potential data locations and shadow data, is critical to achieve consistent analysis. This is an emerging driver that is currently in evolution.
  • The growth of regulations that require a data risk assessment has created the need for tools that can assess DSG policies.
  • Need to protect data against exposure (e.g., cloud misconfigurations, excessive access privileges or data residency risks that arise due to geographic locations and access pathways to data).
  • Combination of data observability features, such as real-time visibility into data flows, risk and compliance with data security controls, with the objective to identify security gaps and undue exposure.

This recognition comes on the heels of growing business momentum at Laminar. The company recently doubled its total amount of funding raised in six months to a total of $67 million. Additionally, Laminar was recognized by Fortress Cyber Security Awards and the Global InfoSec awards, and was named a TAG Cyber Distinguished Vendor.

Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

GARTNER and Hype Cycle are registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.

About Laminar
Laminar’s Cloud Data Security Platform protects data for everything you build and run in the cloud across cloud providers (AWS, Azure, and GCP) and cloud data warehouses such as Snowflake. The platform autonomously and continuously discovers and classifies new datastores for complete visibility, prioritizes risk based on sensitivity and data risk posture, secures data by remediating weak controls and actively monitors for egress and access anomalies. Designed for the multi cloud, the architecture takes an API-only approach, without any agents, and without sensitive data ever leaving your environment. Founded in 2020 by a brilliant team of award winning Israeli red team experts, Laminar is proudly backed by Insight Partners, Tiger Global, Salesforce Ventures, TLV Partners, and SentinelOne.

Spotlight

Spotlight

Related News

Data Security

GuidePoint Security Announces Portfolio of Data Security Governance Services

GuidePoint Security | January 30, 2024

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, today announced the availability of its Data Security Governance services, which are designed to help customers address the challenges of unstructured data and data sprawl through a proven process and program to meet their unique needs. GuidePoint’s Data Security Governance services consist of policies, standards, and processes leveraging the newest technologies to meet organizations’ data governance goals in both on-prem and cloud environments. Once the right strategy is determined with the customer, GuidePoint Security consultants will review program requirements, assess current policies and controls, perform gap analysis, design and develop/enhance the program, recommend and implement supporting technologies, and create operational processes and metrics. “Whether an organization is just beginning to build their data security governance program or needs help assessing and improving an existing program, our team and service capabilities are built to meet them at their current maturity level,” said Scott Griswold, Practice Director - Security Governance Services, GuidePoint Security. “We work side by side with the customer to conduct the necessary data discovery in their environment and provide tailored recommendations for solutions and processes to ultimately build/improve upon the data security governance program.” GuidePoint’s Data Security Governance Services include: Sensitive Data Cataloging: For organizations just getting started in the process of protecting their sensitive data, GuidePoint offers Data Identification workshops to identify sensitive data types in the environment, including trade secrets, intellectual property, and sensitive business communications. Data Security Governance Program Assessment: For organizations with existing Data Security Governance or Data Protection programs, GuidePoint Security experts will assess the program to identify policy non-compliance, gaps in data protection requirements—whether legal, regulatory, contractual, or business—and program maturity levels. Data Security Governance Program Strategy Development: The GuidePoint team will work with an organization's key stakeholders to design a program strategy aligned with relevant requirements. The outputs of this effort include delivering ongoing sensitive data discovery, automated classification and labeling, the application of required sensitive data protections, restrictions on where sensitive data can be stored and sent, and data retention policy enforcement. Merger and Acquisition Data Identification: This offering provides the ability to identify sensitive data within an M&A target or recent acquisition (including locations, amounts, and access rights) and then perform penetration testing on the storage repositories where that sensitive data exists to determine the risk of data compromise. About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at www.guidepointsecurity.com.

Read More