Analyst house Gartner, Inc. has released its newest research highlighting four emerging solution providers that data and analytics leaders should consider as compliments to their existing architectures. Cool Vendors in Privacy Preservation in Analytics features information on startups that offer some disruptive capability or opportunity not common to the marketplace. Gartner analysts Jie Zhang, Bart Willemsen and Nader Henein compiled the materials for this report.
Solutions Review’s editors have read the complete report, which is available here, and want to take the opportunity to provide a brief, independent introduction to each of the cool vendors listed. Though Gartner’s process for selecting Cool Vendors is somewhat mysterious, we believe our unique view of the space can help you to better understand how these analytics solutions will fit into the marketplace as time goes on.
Baffle provides an advanced data protection solution that protects data in memory, in process and at-rest to reduce insider threats and data theft risk. The product delivers application-level encryption via a “no code” model and provides homomorphic-like functionality, enabling mathematical operations and sorting and searching on AES encrypted data. Baffle does not require changes to application tier code and operates as normal without embedding an SDK or library. Commercial off-the-shelf apps can be supported as well.
Duality Technologies offers a platform called SecurePlus that enables users to perform computations and analysis on data while it is encrypted. What makes it unique is that sensitive data or valuable models are never revealed during the analytic process. Data is protected by quantum-resistant homomorphic encryption, even when analyzed. Homomorphic encryption protects each party’s assets during linkage and computation, ensuring data privacy and regulatory compliance as well. Duality also protects valuable data while it is analyzed in untrusted cloud environments.
Inpher lets you compute without ever exposing or transferring the underlying sensitive data. The firm’s XOR Secret Computing Engine is built from a proprietary advance in secure multiparty computation. Inpher utilizes encryption in-use technologies and securely distributes computation across multiple parties where no individual can see the other parties’ data. XOR meets and exceeds requirements for cross-border data transfer because the data never actually moves.