BigID Finds Immuta Enforces

Diving deeper into

Zachary Friedman, associate director of product management at Immuta, on security in the modern data stack

Interview
We have customers who use BigID alongside Immuta
Analyzed 4 sources

The key point is that Immuta and BigID often sit in the same stack because they solve adjacent steps in the same workflow. BigID is built to scan many systems, find sensitive data, and map where it lives for privacy and governance teams. Immuta is built to turn those findings into live access rules inside cloud data platforms, so analysts can still query data while fields, rows, or users are restricted automatically.

  • BigID starts with discovery. A company connects Snowflake, Salesforce, S3, GitHub, CSV files, and other stores, then BigID classifies PII and builds an index teams can use for compliance tasks like deletion requests and inventory management. That makes it a natural upstream system for tagging and cataloging sensitive data.
  • Immuta starts closer to enforcement. Its product is described as managing access controls across cloud data platforms like Snowflake, and the interview explains that Discover feeds tags into Secure and Detect. In practice, that means classification is valuable because it immediately drives masking, filtering, and policy decisions in day to day data access.
  • This kind of overlap without full replacement is common in data security. BigID is also used alongside tools like OneTrust for inventory and privacy operations, and adjacent vendors like Rubrik have moved into sensitive data management as data security budgets converge around fewer broader platforms.

Going forward, the line between discovery and enforcement will keep narrowing. The vendors that win more budget will be the ones that can both find sensitive data across the sprawl of enterprise systems and immediately apply controls where data teams actually work, inside warehouses, lakes, and analytics tools.