Satori selected as a representative vendor in the Gartner Market Guide for Data Security Platforms →

Ben Herzberg
Chief Scientist

Ben is an experienced tech leader and book author with a background in endpoint security, analytics, and application & data security. Ben filled roles such as the CTO of Cynet, and Director of Threat Research at Imperva. Ben is the Chief Scientist for Satori, the DataSecOps platform.

More From Ben Herzberg

Using Temporary Credentials for Production Database Security
How do you give engineers access to production databases in a secure way? Learn how...
September 12, 2024
Data Catalog vs. Data Security Platform: Navigating the Complexities of Data Governance
What are the key differences between data catalogs and data security platforms, and how they...
August 29, 2024
The Moment We Understood We Help Companies Win With Data
Satori changed its tagline to Win With Data. Never Lose Control to better reflect the...
May 30, 2024
Strengthening Ties: Satori Joins Snowflake’s Premier Data Access Tier
Satori levels up in Snowflake’s Partner Network tier by enabling instant, self-service data access that...
December 14, 2023
Satori joins Microsoft Security Copilot Early Access Program
Satori today announced its participation in the Microsoft Security Copilot Partner Private Preview.
November 15, 2023
Satori’s Data Security Platform Sweeps 33 Badges in G2 Fall 2023 Reports
Satori sweeps 33 badges in the G2 Fall 2023 reports and is recognized as a...
September 14, 2023
Privilege Creep: The Silent Killer in Information Security
Explore the hidden privilege creep threat, where the accumulation of access rights puts your data...
July 27, 2023
Introducing Satori’s Posture Management Capability
Satori's Posture Management provides comprehensive visibility and control over data authorizations to proactively protect sensitive...
June 22, 2023
Announcing Satori’s Inclusion in the Microsoft Pegasus Program
Satori has been included in the exclusive Microsoft Pegasus Program and is now available on...
June 8, 2023
Streamlining HIPAA Technical Safeguard Compliance with Satori
Discusses HIPAA's technical safeguards and the benefits covered organizations can accrue from using Satori to...
March 22, 2023
Still Giving Constant Data Access? Consider Using Temporary Authentication
Satori provides temporary authentication and secures access to sensitive data on a need-to-know basis at...
February 27, 2023
Can You Have Your Cake and Eat It Too: Does Data Security Have to Reduce Productivity?
Sharing data is vital to increase organizational productivity, but this raises questions about security risk...
December 15, 2022
Why Security Management Can be Challenging in Postgres
Postgres provides many benefits and has a wide range of useful native security measures, however,...
November 1, 2022
6 Effective SQL Server User Management Strategies
We explore effective Microsoft SQL user management strategies to keep your users organized, authorized, and...
October 18, 2022
Why Native Database Audit Logs May Have Limits
Native database auditing capabilities, while necessary, in some cases could increase the complexity of an...
October 4, 2022
Native Dynamic Masking and When It’s Not Enough
Some data store platforms have their own native dynamic masking capabilities. While it may be...
September 29, 2022
What’s Stopping Your Organization’s Data Sharing Culture?
Many organizations are hesitant about data sharing. We explore the problems that prevent and the...
September 21, 2022
State of Data Security Operations Report 2022
In this report, we analyze and report the results from our survey of 300 industry...
September 6, 2022
Why Data Ownership is Hard!
Data ownership is a critical yet often avoided task within organizations. While, individuals shy away...
August 30, 2022
Why Don’t All Companies Apply Attribute-Based Access Control on Data Access?
ABAC is often implemented to overcome the limitations of RBAC, however, ABAC is not without...
August 24, 2022
Data Access Challenges for Healthcare Companies
The tremendous amount of Healthcare data can generate financial benefits as well as save lives...
August 18, 2022
Zero Trust For Data Access: Why Is It So Important?
The zero trust model requires continuously authenticated, authorized, and validated access to applications and data...
August 16, 2022
Agile Data Governance with Satori
Agile data governance is crucial for organizations using cloud data stores with constantly changing data,...
August 11, 2022
When Does RBAC for Data Access Stop Making Sense?
RBAC is a useful model for access control, however, there are some instances where it...
August 9, 2022
Why Data Engineers Should Take a Step Back from Cloud Data Security
Data engineering teams can spend a significant portion of their valuable time on cloud data...
August 4, 2022
Why Cloud Data Governance is Complicated
Data governance by itself is a complicated procedure that is further compounded when performed in...
August 2, 2022
Access Control: The Dementor of Data Engineering
Data access control is often described as the Dementor of data engineers due to its...
July 26, 2022
Why Data Classification Projects Are So Hard
Data classification projects are a dark cloud for data teams, often appearing randomly and redirecting...
July 21, 2022
Data Security Projects Keep Data Teams Away From Their Core Responsibilities
Data security is critical, however, this task often defaults to already overwhelmed data engineering teams...
July 19, 2022
9 Common Struggles Data Teams Face With Data Masking Projects
Data masking is essential when working with sensitive data. However, there are a number of...
July 12, 2022
How To Piss Off Your Data Consumers With Data Access Bureaucracy
Stakeholders including data consumers are ultimately people. Having an annoying work environment reduces productivity and...
July 7, 2022
Enabling Employee Access To Production Data
Uncontrolled employee access to production environments is an operational challenge, because while access is necessary...
June 30, 2022
Implementing “Need To Know”
Classifying data as "need-to-know" is important for securing sensitive data. In this post we discuss...
June 23, 2022
Benefits of a Consolidated Data Access Platform
Managing security and access policies from a consolidated platform simplifies processes and increases visibility and...
June 9, 2022
Role Explosion in Data Access
One of the common pain points data teams experience in authorizing users to access data...
May 26, 2022
Satori Is Now Available On AWS Marketplace To Simplify Secure AWS Data Access
Making life more simple for our customers not only means striving to deliver the best...
May 18, 2022
Satori Announces #Slack Integration To Simplify Data Access Workflows
One of the most commonly used productivity tools is Slack, and the ability to control...
May 17, 2022
Satori Introduces Automated Data Portals
For years, we have been following our mission of enabling companies to deliver quicker data-driven...
May 16, 2022
Simplifying Data Localization Requirements With Satori
Meeting data localization requirements can be challenging; this post explains how to simplify them with...
April 28, 2022
Satori and Cockroach Labs Partner to Provide Secure, Simple, & Resilient Data Access
Satori and CockroachDB are announcing a partnership that will enable existing and new Satori and...
April 19, 2022
Satori Announces MySQL Support For Secure Data Access
We’re announcing MySQL support in Satori to help companies secure their data access for MySQL...
April 14, 2022
Database Reverse Proxy 101
A proxy server can be a forward proxy where the client directs traffic through a...
March 24, 2022
Asking the Right Question: RBAC vs. ABAC or RBAC AND ABAC?
Before they can access data, users must get authenticated and authorized. In this regard, access...
March 8, 2022
Data Access Orchestration and Its Limitations
In this article, I will give an overview of data access orchestration (not to be...
February 24, 2022
Satori Across Various Deployment Options
Some of the most common questions we, Satorians, encounter are about the many Satori deployment...
February 17, 2022
The Dangers Lurking in Data Swamps
The more data a company collects and stores, the more likely that data can turn...
February 10, 2022
From “Default To Know” to “Need To Know” to “Need To Share”
We all like having our cake and eating it too. In this article, we will...
February 2, 2022
5 Ways to Apply Decryption & De-Tokenization in Snowflake
This article will discuss the distinction between tokenization and encryption and their inverses: decryption and...
January 26, 2022
Metadata Repositories: Data Dictionary vs. Data Inventory vs. Data Catalog
Data dictionaries, inventories, and catalogs are terms often used interchangeably. While they are all critical...
January 19, 2022
Taking Satori for a Test Drive
A lot of thought goes into how to help potential customers try out your product....
January 11, 2022
Writing The Snowflake Security Book
For the last few years, we at Satori have been a bit obsessed with Snowflake....
January 6, 2022
ABAC: An Introduction to Attribute-Based Access Control
Access management has evolved to incorporate need-to-share authorizations in addition to need-to-know information. The authorization...
December 21, 2021
How To Accelerate Data Democratization
The future of data democratization lies in the hands of your end-users. They are already...
December 14, 2021
Simplifying Multiple Snowflake Accounts Management, Security & Governance
One account is not enough. In many cases, organizations using Snowflake use multiple accounts rather...
December 9, 2021
You Have Data, But Is It Accessible?
As the saying goes, “data is the new oil,” as it is quickly becoming an...
November 30, 2021
Satori Joins Snowflake’s Accelerated Data Governance Program
Today, as part of Snowflake’s global Snowday event, we are excited to announce our participation...
November 16, 2021
The Datamasters: Data Owners vs. Data Stewards vs. Data Custodians
There is no such thing as a one-size-fits-all data governance framework that works for all...
November 11, 2021
Using Satori & Collibra to Boost Data Governance and Security
Satori augments your Collibra data governance capabilities and creates a synergy for better DataSecOps across...
November 2, 2021
The Redshift-Tableau-Satori stack for DataSecOps in Data Analytics
Many organizations are using Tableau to empower their BI activities for reporting and analytics. These...
October 27, 2021
Custom Classification: Common Use-Cases
In a previous post, we introduced you to our data classification capabilities. As a recap,...
October 13, 2021
Applying DataSecOps Principles on MLOps
Machine learning has been commoditized in the last decade or so, and I love it....
September 30, 2021
Introducing Custom Data Classification in Satori
When data engineers and other professionals experience Satori for the first time, one aspect they...
September 22, 2021
The Tableau-Snowflake-Satori Stack for Secure Data Democratization
Tableau is one of the most widely used BI tools which provides a wealth of...
September 3, 2021
Amazon Data Lake Security with Athena and Satori
A few years ago, when I first began using Athena, it was a magical and...
August 26, 2021
5 Indicators You’re Doing DataSecOps Wrong
I love hiking as well as outdoor navigation. What I find especially useful for these...
August 18, 2021
Redshift, Looker and Satori: Advanced Data Access
I’m guessing there is no need to introduce you to Amazon Redshift or Google Looker,...
August 11, 2021
Data Classification With Satori
In this article, I will discuss how people perform data classification using Satori and explain...
July 22, 2021
Data Classification Best Practices – Part 2
In the first part of this article, we discussed the many reasons why you should...
July 15, 2021
Snowflake & Looker DataSecOps with Satori
In this post, we will discuss the DataSecOps advantages that Looker users over Snowflake enjoy...
July 8, 2021
Data Classification Best Practices – Part 1
Note: this is part 1 of the guide, in part 2 we discuss the questions...
July 1, 2021
Limiting Snowflake Access to Specific Clients
Before we drill down to the “why” and “how” of limiting client tool access in...
June 24, 2021
Democratize Data in AWS Redshift With Self-Service Data Access Workflows
Amazon Redshift allows companies to analyze large amounts of data, whether the data is stored...
June 17, 2021
Zero to Self-Service Snowflake Data Access Management
Let’s start with good news – if you are using Snowflake and want a simple...
June 9, 2021
Snowflake Security: Best Practices for Stages
This article is also published as a chapter in our Snowflake Security guide, covering many...
May 27, 2021
What is DataSecOps?
History repeats itself. The transition of applications to the cloud and the development of software...
May 12, 2021
Amazon Redshift Auditing & Monitoring
2022-12-01 If you’d like to view the entire guide of AWS Redshift Security topics, visit...
May 4, 2021
The Future of DataSecOps, As Reflected in RSA Innovation Sandbox
Every year, the cybersecurity industry has its biggest conference, the RSA conference in San Francisco...
April 26, 2021
Snowflake Role Hierarchy
Snowflake’s data access modeling is different from many other databases and data warehouses. It’s funny...
April 14, 2021
How to Automate a Data Inventory for AWS Redshift
Creating and maintaining a data inventory is an important part of a comprehensive data management...
March 29, 2021
Redshift Data Masking – Getting It Right
Data masking is the act of transforming parts of data to maintain its anonymity. There...
March 17, 2021
How to Monitor Access to Sensitive Data In Snowflake with Satori
Being optimally focused is the key that helps you spend your resources better. When your...
March 11, 2021
Implementing Row-Level Security with Satori
There are moments when architecting data where you need to make decisions that will have...
March 4, 2021
Data Inventory for Snowflake: Manual vs Automated
The Snowflake Data Cloud helps organizations quickly transition from having a lot of data to...
February 14, 2021
Snowflake Data Masking: Static vs Dynamic
In today’s ever-evolving digital age, data masking is one of the most essential features of...
February 1, 2021
Snowflake Data Access Journey
Let’s understand the chain of events that leads to data access. For example, imagine you...
January 21, 2021
Simplifying Snowflake Roles Management using Satori
A few days ago, I wrote about some of the complexities of managing Snowflake roles...
January 20, 2021
How to Scale Snowflake Roles Management
RBAC, or Role-Based Access Controls, are foundational tenets of good data governance and key to...
January 14, 2021
Benchmarking Snowflake Performance Using TPC-H
Benchmarking Snowflake DB with TPC-H, including full queries and source code.
December 31, 2020
How to Complete a Safe and Simple Migration to Snowflake
Data migration is not fun. I’ve been there, done that, and I did not like...
December 14, 2020
Satori Universal Data Access Control for AWS Athena
How to get better access control & security for your data lake using Satori along...
November 29, 2020
Setting up Column-Level Security in Snowflake
Column-level security in Satori for Snowflake, simplifies data and security teams life so they can...
November 26, 2020
Snowflake Row-Level Security
How to implement Snowflake row-level access control, a step-by-step guide, with secure views or by...
November 9, 2020
Analyzing Data Access Logs? Here is What You’re Missing
Native DB access logs are useful, but using Satori to analyze data access logs helps...
October 19, 2020
Data Engineers: Stuck in the Middle?
Data engineers are often conflicted between engineering teams, security and privacy.
October 4, 2020
Turn over-privilege risk into a healthy Snowflake DB permission fit
I recently published a lengthy diatribe about the problem of over-permissive access to data, the...
September 17, 2020
Effective GDPR DPIA on cloud data warehouses
Meeting GDPR requirements is important, not only for EU companies but also for any companies...
September 9, 2020
7 Quick Ways to Improve your Snowflake Security
Update – January 12th 2021: Following Snowflake’s preview addition of self-service account creation using the...
September 2, 2020
Hardening GCP BigQuery security: access controls explained
In the spirit of our Snowflake DB security and AWS Redshift security guides, we’ve created...
August 19, 2020
Sensitive Data Isn’t The Crown Jewels
I need to get something off my chest. It’s time for our beloved infosec community...
August 4, 2020
AWS Redshift security: access controls explained
This is part of our complete Amazon Redshift Guide.
June 23, 2020
Snowflake security: access controls explained
If you’d like to read this guide, along with additional guides to specific topics in...
May 26, 2020
Enterprise data protection implementation: why so tough?
Implementing security products, services and solutions in enterprises is intrinsically difficult, especially when coordinating several...
April 27, 2020
How Satori uses Apache Drill to conquer data exploration & preparation
“Laying out data infrastructure for a new product and big-data research is no small task....
March 17, 2020
Washington Privacy Act Passes State Senate: Another Step for Privacy
This week, the Washington senate approved the Washington Privacy Act (WPA) to advance data privacy...
February 19, 2020
Why today’s data access controls don’t work for data-driven organizations
As the world undergoes a data revolution, the ways we generate, store, access, use and...
February 12, 2020
Register Here
The latest posts delivered to your inbox