Snowflake launches new cybersecurity workload to fight cyberattacks


Snowflake Inc., a cloud computing–based data warehousing company, has recently launched a new cybersecurity workload to assist companies in effectively protecting their technology landscape from cyberattacks and threats.

Snowflake offers a well-renowned cloud data platform, the Snowflake Data Cloud, that allows its users to store and work on large amounts of data. The platform supports a wide range of workloads such as marketing analytics, data science, etc.

With the recent announcement of cybersecurity workload, Snowflake is expanding its focus on those use cases.

Head of the cybersecurity strategy at Snowflake, Omer Singer said that the cloud data company is leading the security data movement by helping companies in bringing their data and analytics together in a secure, unified, and scalable data platform.

He further said with the launch of Cybersecurity workload, Snowflake is further empowering Data Cloud's security teams so that they can jointly work with several stakeholders and succeed in their mission to protect the organization.

Enterprises that will use Snowflake’s cybersecurity workload can use its platform to store and work on cybersecurity information from their internal systems. Snowflake’s platform provides managed service, which means that the platform has the capability to automate infrastructure maintenance on which it runs or performs several related maintenance tasks.

Some similar platforms working in the same sectors, only store and process cybersecurity information for few weeks or months before permanently deleting them in order to free up the storage space. Owing to this, vital information about a breach can get deleted before the professionals have a chance to utilize it.

Snowflake claim’s that it allows companies to store the relevant cybersecurity data for a very long period of time which simplifies cyber exploration. The company also provides query features that allow the experts to analyze cybersecurity information and data for clues about a breach.

Source Credit: