Solution

Cloud Solutions
SecuPi for Microsoft Azure

  SecuPi is a comprehensive data security platform designed to complement Microsoft Purview for on-premises and cross-cloud data sources. With features such as sensitive data activity monitoring with classifications, tagging, and access control, SecuPi ensures the protection of sensitive data using client-side Format Preserving Encryption (FPE), tokenization, masking, and obfuscation techniques.   Explore the SecuPi […]

SecuPi for Databricks

SecuPi is an officially certified Databricks Validated Partner. With a certified client-side encryption solution tailored for Databricks Cloud Lakehouse and Unity catalog, SecuPi offers a robust platform that ensures data security at scale while adhering to stringent data sovereignty laws. Key Features of SecuPi’s Integration with Databricks: Certified Client-Side Encryption Solution SecuPi’s client-side encryption solution […]

SecuPi Cross-border Data Access Security

SecuPi Data Air-Locks offer a secured cross-border data collaboration and data-sharing while seamlessly addressing data privacy and sovereignty requirements on Cloud analytics platforms.

SecuPi for Google Cloud

SecuPi has developed a joint solution with Google Cloud, addressing requirements for cloud based data processing. With this solution, the  SecuPi platform provides zero-code end-to-end data protection running on Google Cloud Confidential Computing.

SecuPi for AWS Data Platforms

SecuPi for AWS delivers centralized data security, privacy and regulatory compliance, column-level encryption and decryption, and full audit, monitoring, and control of sensitive data across AWS Bedrock, analytical on operational workloads with dynamic, policy-driven data protection that is easy to deploy and maintain.

SecuPi for Snowflake

SecuPi enables organizations using Snowflake to safely upload and store encrypted data to Snowflake while meeting privacy and security requirement

Data in the Cloud

SecuPi supports services on the cloud such as data lakes and serverless data, enabling organizations to reclaim control over their data.

Applications on the Cloud

SecuPi enables organizations to reclaiming control and visibility over your cloud applications in order to protect your data and comply with privacy regulations.

Compliance Solutions
NIS2 Directive

The NIS2 Directive expands EU cybersecurity regulations, requiring organizations to implement strong security measures, report incidents within 24 hours, secure supply chains, enforce access controls, and undergo audits—facing penalties of up to €10 million or 2% of annual revenue for non-compliance. SecuPi helps meet these mandates with real-time monitoring, fine-grained access control (ABAC), data de-identification, vendor security, and rapid incident response—ensuring compliance without disrupting operations.

Quebec’s Law 25 Regulation (Bill 64)

SecuPi offers seamless end-to-end data security across your clouds’ data operations. Full SOD. Zero code. Enabling fast deployment of necessary controls over the organization’s infrastructure, enforcing LAW 25 security and regulatory technical requirements.

Indonesia’s Personal Data Protection Bill (RUU PDP)

The Personal Data Protection Bill (c) was approved by Indonesia’s House of Representatives on September 20, 2022, marking the initial stage in the process of turning it into law. The President’s approval, which took place on October 17, 2022, officially enacting and enforcing the law. In this blog post, we will explore how SecuPi can […]

SecuPi Cross-border Data Access Security

SecuPi Data Air-Locks offer a secured cross-border data collaboration and data-sharing while seamlessly addressing data privacy and sovereignty requirements on Cloud analytics platforms.

Zero Trust 2.0

Zero trust cybersecurity architecture introduces new security concepts such as data centricity and conditional access to achieve the core concept of never trusting a request for data, applications, or resources. The US Department of Defense (DoD), recently released an update to its Zero Trust (ZT) Reference Architecture. The updated approach to cybersecurity has been updated […]

Protection of Personal Information Act (South Africa)

What is South Africa’s POPIA? South Africa leads the continent on data privacy with POPIA which is similar in scope to GDPR and a plethora of other national privacy regulations described on this web page. South Africa passed the Protection of Personal Information Act in 2013. The Act included a timeline for establishing government oversight […]

New Zealand’s Privacy Act

The Privacy Act (1993, updated 2020) In June 2020, New Zealand’s parliament passed the country’s Privacy Bill, which will update the country’s data protection practices for the first time in more than a generation. The bill, which replaces the 1993 Privacy Act, includes GDPR-like measures such as data breach reporting requirements and increased fines for […]

Cybersecurity Maturity Model Certification (US) 2.0

What is CMMC 2.0? Cybersecurity threats targeting sensitive data like Intellectual Property (IP) and Personally Identifiable Information (PII) are increasingly prevalent, costing the global economy hundreds of billions annually. The U.S. Department of Defense (DoD) and the Military Defense Industrial Base (DIB) are prime targets for these attacks, which could undermine national security and economic […]

Act on the Protection of Personal Information (Japan)

What is Japan’s APPI? The Act on the Protection of Personal Information (APPI), which is one of the first data regulations in Asia, was updated in May 2017 after a series of data breaches took place in Japan. The change in legislation happened a year ahead of EU GDPR, and both Japan and the European […]

Personal Information Protection and Electronic Documents Act (Canada)

What is Canada’s PIPEDA? Canada has always been one of the pioneers of data protection. It enacted the PIPEDA in 2000 and strengthened it with a new privacy act in 2015, which the requirements inspired the GDPR and came into force in 2018. The law applies to Canadian organizations from the private sector uniquely, who […]

Nevada Privacy Law

What is the Nevada Privacy Law? Nevada has marked itself as a pioneer by following California’s footsteps and becoming the second state to approve new privacy laws aimed at protecting the consumers information. The new legislation requires owners and operators of internet websites as well as online commercial providers to allow consumers the right to […]

Thailand’s Personal Data Protection Act

On February 28th, 2019, the National Legislative Assembly approved the Thailand Personal data protection Act (PDPA) after almost twenty years in the making. The act will pass into a law after it receives royal endorsement. The PDPA aims to govern data protection and will use GDPR as a blueprint, adopting some of the largest European articles to the Thai context.

Mexico’s Federal Data Protection Law

In the last two decades, data breaches became a real threat to the people and the Mexican authority understood it well. The Federal Law on the Protection of Personal Data held by Private Parties, also called “the law”, was approved by the Mexican congress and came into action on July 6, 2010. The new regulation applies to private individuals and legal entities who process data on the Mexican territory, and use mean located in Mexico to process personal information.

India’s Digital Personal Data Proctetion Act (DPDP)

An Act to provide for the processing of digital personal data in a manner that recognizes both the right of individuals to protect their personal data and the need to process such personal data for lawful purposes and for matters connected therewith or incidental thereto.

Australia Privacy Principle

The “Australia Privacy principle” was voted in 1988 and intends to protect the personal information of local residents. New regulations were added to it in 2017 in response to the numerous data breaches that took place in the region.

The legislation applies to private sector entities with an annual turnover of at least AU$3 million, and all Commonwealth Government and Australian Capital Territory Government agencies. Organizations from various sectors such as insurance, telecom, healthcare are all subject to the law and can face serious penalties if they do not respect it.

Philippines Data Privacy Act

The Data Privacy Act was approved in 2012 and provides a framework for regulating the processing and storage of particularly personal and sensitive data in the Philippines.

Brazil’s LGPD

Brazil had approved the new regulation about personal data protection which will come into action at the beginning of 2020. The Brazilian General Data Protection Law (LGPD) adds a new legal framework for the use of personal information both online and offline, in the private and public sectors.

Health Insurance Portability and Accountability Act

The HIPAA act is regulation designed to protect the privacy and security of individuals’ health information while encouraging companies to adopt new technologies to improve the quality and efficiency of patient care. SecuPi developed a solution that helps companies discover and improve the way they handle their customers’ sensitive health-related data by defining rules and providing access on a need-to-know basis.

PCI-DSS

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards that apply to any organization that accepts, process, stores and transmits credit card information.

Personally Identifiable Information

Personal identifiable information is any types of information that when combined with other relevant data could help identify individuals in context. Due to the wealth of information provided by big data, there has been a significant rise in malicious activities, which has raised concerns over how companies handle the personal data of their customers. SecuPi created a platform that enables to maximize the protection of PII on high-risk application. Companies deploy SecuPi to protect their customers’ sensitive data by ensuring that data is accessed on a need-to-know basis while protecting from careless and malicious abuse.

SOX

The SOX act of 2002 is a U.S. federal law that established requirements for all U.S. management, public accounting firms and company boards. SOX was created with the intent of protecting the general public and the shareholders from accounting mistakes and malicious activities in enterprises and improve the accuracy of corporate announcements. SecuPi developed a technology enabling U.S. companies to easily meet the SOX requirements act and be compliant within a few days and with no development efforts.

CPRA

The California Consumer Privacy Act (CCPA) is a legislation imposed on Californian companies in order to protect its consumer’s privacy. It regulates the way organizations collect and store consumer personal information. The CCPA goes into force on January 1, 2020 and will hold companies accountable for protecting their consumers’ data, focusing mainly on profiting from the sale of personal consumer information without their knowledge or consent.

GDPR

SecuPi augments business applications with the capabilities for meeting GDPR requirements, including ‘Right to be forgotten’, ‘Data Minimization’, ‘Consent’ and ‘Records of Processing Activities’ without code changes and within days per application.

Sorry, but post is empty :(

Regulatory Compliance solutions
California Consumer Privacy Act
California Consumer Privacy Act
GDPR Compliance
Technical Solutions
Privileged Account Brokering (PAB)

    The Strategic Framework for Privileged Data Access Security Brokers (PDASB) Data is the primary asset and the highest-risk surface. As organizations migrate to Cloud databases and Analytics, DaaS and Open Table Format, traditional Privileged Access Management (PAM) creates a security gap. While traditional PAM secures the “front door” (server access), the Privileged Data […]

Dynamic Authorization

Fine-grained Access Control – Without Changing Code or Data Sources Organizations need access control that adapts to context – not just roles. SecuPi’s Dynamic Authorization solution uses Attribute-Based Access Control (ABAC) to enforce fine-grained access policies in real time, across any data source or application, without requiring changes to the application code or data architecture. […]

Privileged Data Access Security Broker (PDASB)

The Strategic Framework for Privileged Data Access Security Brokers (PDASB) Data is the primary asset and the highest-risk surface. As organizations migrate to Cloud databases and Analytics, DaaS and Open Table Format, traditional Privileged Access Management (PAM) creates a security gap. While traditional PAM secures the “front door” (server access), the Privileged Data Access Security […]

Data De-identification

SecuPi offers a modern approach to data de-identification that doesn’t require changing application code or disrupting operations. Whether you’re securing data in the cloud, on-prem databases, or hybrid environments—SecuPi ensures sensitive data stays protected, usable, and compliant. Protect Sensitive Data Without Compromising Utility SecuPi applies format-preserving encryption (FPE), tokenization, dynamic and static masking, and other […]

SecuPi for CyberArk

SecuPi extends CyberArk’s capabilities to monitor and control privileged users who access datastores. It offers the activity monitoring, fine-grained access control and de-identification and encryption.

SecuPi DAM (Database Activity Monitoring)

SecuPi’s DAM Solution addresses the challenges of securing
sensitive data. The solution comprises three main elements: real-time visibility and
classification, fine-grain access control, and data identification, encryption, masking,
and deletion.

Attribute-based Access Control (ABAC)

SecuPi Attribute-based Access Control (ABAC) provides robust support for both Cloud and On-premises environments, and seamlessly caters to a diverse array of applications, including operational functions such as HR and accounting, as well as analytical tools like Tableau and Qlik.

SecuPi Cross-border Data Access Security

SecuPi Data Air-Locks offer a secured cross-border data collaboration and data-sharing while seamlessly addressing data privacy and sovereignty requirements on Cloud analytics platforms.

SecuPi for Data Mesh

The SecuPi platform seamlessly integrates with Data Mesh tools (such asStarburst/Trino) providing automated enforcement of data access policies and data protection operations to quickly comply with real-life scenarios.

SecuPi and BigID

SecuPi & BigID Governance Enablement Platform BigID and SecuPi Data Security and Compliance Platform deliver zero-code policy enforcement to protect data. Critical Data is scattered across multiple data sources cross Cloud and hybrid, accessed using applications, analytics and direct DB tools to allow operations and better decision making. At the same time, data security and […]

SecuPi for Collibra Protect

SecuPi for Collibra Protect  SecuPi for Collibra Protect enables your data stewards can safeguard your organizations data by easily creating policies that control access to data, de-identify sensitive data using FPE Encryption, tokenization and masking. In Snowflake, Databricks, Redshift and other cloud data sources there is data that needs to be secured while addressing data-sharing […]

SecuPi and Collibra

SecuPi and Collibra Integration SecuPi provides Collibra customers with de-identification at-rest and in-use, real-time activity monitoring and fine-grained access control (ABAC) for all Cloud and on-prem environments. With SecuPi’s fine-grain data access controls, the data consumption is governed so that users get access only to data they are entitled to view, and no more. With […]

WFH Data Protection – Work from Home

How real-time and centralized monitoring, auditing, and user behavior analysis mitigates the risks of a remote workforce Response to the coronavirus pandemic is mandating millions of people around the world to self-quarantine and work from home (WFH). This dramatic shift in work practice increases the risk to business continuity by forcing companies to switch to […]

Soft Deletion

What is Soft Deletion? SecuPi application overlay enables to define policies to hide personal data of customers that have indicated their wish to be deleted, without actually deleting their records in the database. This is referred as “Soft Deletion” and is achieved using SecuPi overlay intercepting personal data flows and processes across business applications, DBA […]

SIEM Integration

SecuPi enables SIEM solutions to monitor the real end goal of the attacker — the applications and data. SecuPi can feed data to any SIEM system and send alerts, thus enriching the SIEM with actual sensitive data exposed and/or high value transactions performed by the user/IP/device. SecuPi provides business impact information to SIEM on which data was exposed. The alerts sent to the SIEM rely on highly accurate User Behavior Analytics (UBA) and Machine Learning based decisions.

Data Access Governance

SecuPi provides the capability to centrally control sensitive data access on a “need to know” basis. Set rules and apply policies to determine who can access which sensitive data across your high-risk applications. SecuPi can prevent access to sensitive data by either dynamic masking, redaction, tokenization, or blocking; all without affecting the data, network, applications or databases.

Non-production Masking

To support the need for agility and ever-faster development cycles, organizations are able to provision a development, test or training production-like environments on-demand within minutes.

Real Time Monitoring and Auditing

SecuPi provides extensive and easy to interpret auditing reports that can be assessed by auditors and regulators. Obtain full contextual evidence and forensics of breach attempts and malicious user activity. Every user action can be recorded, stored and later be retrieved for forensics. This data can be encrypted or masked for privacy regulations.

User Behavior Analytics (UBA)

SecuPi runs real-time analysis to detect malicious activity and fraud based on single user activity, multiple users and velocity based comparisons.
SecuPi’s technology solves the challenge of spotting the real threat among countless requests. By combining peer comparison and user’s comparison to self, SecuPi analyzes and determines the relative risk score of the user. An abnormally high risk score would send trigger an alert that would be recognized as suspicious user activity.

Dynamic Data Masking

Dynamic Data Masking offers a flexible and powerful capability to mask sensitive data in real-time without affecting the data itself. SecuPi provides full control over which sensitive data will be masked for any specified user.

Data Discovery and Classification

SecuPi enables easy discovery of sensitive data subjects and data flows across business applications. SecuPi’s Discovery methodology enables automatic (data-source), semi-supervised (data-flow) and supervised (screen-based) discovery and classification with unprecedented accuracy.

Apply for this Job

    Or send your resume at text@secupi.com
    Thank for you applying
    We will be in touch shortly.