Close icon

Staring into the data abyss: Achieving a higher level of cloud security so you can sleep better | Open Raven at Conf42 12/1

Watch Open Raven at Conf42: DevSecOps 2022 –  12/1

Open Raven logo
Schedule DemoSign in
Close / X
Schedule DemoSign in
Product
Arrow downArrow up
Data Security Platform
Discover
Classify
Take Action
Integrate
Analyze
Why Open Raven?
Use Cases
Arrow downArrow up
Use Cases
Discover and classify data
Apply data security guardrails
Find and act on exposed or unsecured data
Locate shadow or toxic data
Automate compliance
Resources
Arrow downArrow up
Resource Library
Support
FAQs
Webinars & Events
Research & Tools
Release Notes
Support
About
Arrow downArrow up
Our Story
Contact
News
AWS Partnership
Media Kit
Blog
Open Raven logo
Product
Arrow downArrow up
Dynamic / box inside of a larger, dashed-outline box
Data Security Platform
Open and flexible design. Easy setup with quick results. Built for security.
Learn more
Flag / discovery
Discover
Automatic, real-time discovery of data at rest.
Scanning
Classify
Comprehensive classification for security.
Lightning bolt
Take Action
Prevent exposures, leaks, and breaches.
Integrate
Receive alerts, open tickets, scan via API.
Analytics / graph
Analyze
See trends and generate reports.
Outline of Bele in a black circle
Why Open Raven?
The Enterprise data security platform
Ready to get started?
Get a demo
Watch video
Use Cases
Arrow downArrow up
Lightbulb
Use Cases
Pinpoint data security and compliance risk, apply guardrails, prevent incidents and streamline response.
Learn more
Magnifying glass
Discover and classify data
Inventory and classify data at petabyte-scale
Lock
Apply data security guardrails
Protect sensitive data with custom rules
Unprotected shield
Act on exposed or unsecured data
Automatically find data and take action
Compass
Locate shadow or toxic data
Gain control over data residing in the shadows
Cog / settings
Automate compliance
Easily report and alert on data compliance
Ready to get started?
Get a demo
Watch video
Resources
Arrow downArrow up
Notebook
Resource Library
Text on paper
Blog
Shield
Trust
Video / play button in center of computer screen
Webinars & Events
User / person
Support
User / person
Support
Outline of Bele in a black circle
Research & Tools
Question mark in a circle
FAQs
User / person
Support
About
Arrow downArrow up
Code Bele
Our story
Chat bubble
Contact
AWS logo - black
AWS Partnership
Internet/public symbol
News
Paper airplane / sent
Media Kit
Blog
Research
Arrow downArrow up
Outline of Bele in a black circle
Research Overview
Research and open-source at Open Raven.
Magpie
Magpie
Open-source CSPM tool.
Mockingbird logo
Mockingbird
Benchmarking and data classification engine.
Email
Security Newsletter
Slack
Slack Community
Github
GitHub
Magnifying glassClose / X
Schedule DemoSign in
Hamburger menu
Open Raven logo
Schedule DemoSign in
Hamburger menu

By using this website, you agree to our use of cookies. Please read our Privacy Policy about our use of cookies.

Close / X

Glossary

Filter by:
RESET
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Data Types

API Key

AWS

AWS

Technology

Adjacency

Threats

Adversary

Compliance

Audit

Security

Availability

Technology

Backhauling

Technology

Best Practices

GCP

BigQuery

GCP

BigTable

Compliance

CASB

Compliance

CCPA

Compliance

CPRA

Countermeasures

CSPM

Data Types

CSV

GCP

Cloud Storage

AWS

CloudFront

AWS

CloudTrail

AWS

CloudWatch

Compliance

Compliance

Security

Confidentiality

Security

Cybersecurity

Technology

DBMS

Countermeasures

DLP

Countermeasures

DSPM

Data Types

Dark Data

Threats

Data Breach

Technology

Data Catalog

Data Types

Data Class

Technology

Data Classification

Technology

Data Discovery

Technology

Data Guardrails

Technology

Data Repository

Technology

Data Sampling

Threats

Data Sprawl

Data Types

Data-at-rest

Data Types

Data-in-motion

Organization

DevOps

Data Types

Developer Secrets

Threats

Digital Transformation

AWS

DynamoDB

AWS

EC2

AWS

EFS

AWS

EKS

Countermeasures

Encryption

Threats

Exfiltration

Technology

File Compression

Data Types

Financial Data

GCP

GCP

Compliance

GDPR

Technology

GitHub

AWS

GuardDuty

Compliance

HIPAA

Compliance

HITRUST

Data Types

Health Care Data

AWS

IAM

Security

Integrity

Data Types

JSON

AWS

KMS

AWS

Lambda

Data Types

Log file

Countermeasures

MFA

Data Types

Metadata

Threats

Misconfiguration

Compliance

PCI DSS

Data Types

PDF

Data Types

PHI

Data Types

PII

Compliance

PIPEDA

Data Types

Personal Data

Security

Privacy

AWS

RDS

Threats

Ransomware

AWS

RedShift

AWS

Region

Security

Resilience

AWS

S3

AWS

S3 Bucket

Security

SIEM

Organization

SOC

Data Types

SSN

Organization

SecOps

Data Types

Semi-structured Data

Data Types

Sensitive Data

Technology

Serverless

Data Types

Shadow Data

Data Types

Structured Data

Data Types

Toxic Data

Data Types

Unstructured Data

AWS

VPC

AWS

VPC Peering

Technology

Validator Function

Countermeasures

Zero Trust

Open Raven logo

Product

Data Security PlatformUse CasesWhy Open Raven?

Learn

Resource LibraryBlogEventsResearchGlossary

Get Help

Frequently Asked Questions
Support

Company

About usContact usNewsMedia
©2023 Open Raven
Terms and ConditionsPrivacy PolicySecurity Policy
TwitterGithubInstagramLinkedInFacebook