All Resources
In this article:
minus iconplus icon
Share the Blog

Thoughts on Sentra and the Data Security Landscape After Our Series A

February 1, 2023
3
Min Read

By Asaf Kochan, Co-Founder and President, Sentra

Series A announcements are an exciting time for any startup, and we look forward to working with our new investors from Standard Investments, Munich re Ventures (MRV), Moore Strategic Ventures, and INT3 to grow the cloud data security and data security posture management (DSPM) categories. 

I wanted to take a moment to share some of my thoughts around what this round means for Sentra, cloud data security, and the growth of the DSPM category as a whole. 

Seeing is Believing: From Potential Customer to Investor

The most amazing part of this round is that we didn’t originally intend to raise money. We approached Standard Industries as a potential customer not an investor. It was incredible to see how bought-in the team was to Sentra’s approach to data security. They understood instantly the potential for securing not only Standard’s data, but the data of every cloud-first enterprise. The total addressable market for data security solutions is already large, and it’s growing every year, as more and more new companies are now cloud-native. The global need for solutions like Sentra was obvious to their team after seeing the product, and I’m excited to have a forward-thinking investor like Standard as part of our journey. 

It’s a Vote of Confidence in the Sentra Team and Product

Any Series A is first and foremost a vote of confidence. It’s an endorsement of the vision of the company, the approach the product is taking, and the potential of the core team to continue to grow the business. Anyone who has spoken with our talented team understands the level of expertise and perseverance they bring to every task, meeting, and challenge. I’m proud of the team we’ve built, and I’m excited to welcome many new Sentrans to the team in the coming months. 

As I mentioned, the round is also a mark of confidence of the development and direction of the product itself. Working with our existing customers, we’ve regularly added new features, integrations, and capabilities to our solution. As we continue to discover, classify, and secure larger amounts of data in all cloud environments, the benefits of a data centric approach become clear. We’ve successfully reduced the risks of catastrophic data breaches by reducing the data attack surface, improved relationships between engineering and security teams by breaking down silos, and even helped our customers reduce cloud costs by finding and eliminating duplicate data. 

Data Security is a Must, Not a Nice to Have

Raising money in the current economic climate is not to be taken for granted. The significant investment in Sentra’s vision speaks not only to the value provided by Sentra’s product and team, but also to how critical data security has become. Compliance, privacy, and security concerns are present regardless of how the NASDAQ is performing.

Certainly we’re seeing no slowdown in data security regulations. Global enterprises are now responsible for ensuring compliance with a growing number of data regulations from different government and commercial sources across the globe.  When it comes to security and IP protection, the threat of a catastrophic data breach is top of mind for all cloud security teams. As the reality sets in that breaches are not a matter of “if” but “when”, the logic of the data centric approach becomes clear: If you can’t prevent the initial breach, you can make sure your most sensitive data always has the proper security posture. In the future we’re building, not every breach will be newsworthy, because not every breach will involve sensitive data. This funding round demonstrates the growing acceptance that this is the direction cloud security is and should be heading. 

DSPM will Come to Dominate Cloud Security

There’s always some skepticism in the cyber world when a new category is created. 

  • Is the problem it claims to solve really that serious?
  • Can we just use existing paradigms and tools to address it?
  • Is implementing a new tool going to make a real difference for the business? 

These questions are valid, and any cyber company operating in a new space must address them forthrightly and clearly. We have been clear from the beginning - a data centric approach to security with DSPM is not a small step, but a giant leap forward. Data is the core asset of most companies, and that asset is now stored in the cloud. Old approaches will not be sufficient. This new round is led by investors who recognize this new reality and share our vision that we need to put data at the core of cloud security strategies.

I want to end by again emphasizing how thankful I am for having amazing investors, partners, and team members join us over the last 18 months. So much has been accomplished already, but the industry shift to data centric security has only just begun. I’m looking forward to continuing to protect the most important business asset in the world - our data.

For four years, he was the commander of Israel’s Unit 8200, leading the world's most innovative cyber team. During those years, he saw threat actors continuously exploit sensitive data that was improperly secured, and worked to mitigate the damage this was causing to both the public and private sectors. Reflecting on these experiences, it was clear to him that sensitive data had become the most important asset in the world. In the private sector, enterprises that were leveraging data to generate new insights, develop new products, and provide better experiences, were separating themselves from the competition. As data becomes more valuable it becomes more of a target. And as the amount of sensitive data grows, so does the importance of finding the most effective way to secure it. That’s why he co-founded Sentra, together with accomplished co-founders Yoav Regev, Ron Reiter, and Yair Cohen.

Subscribe

Latest Blog Posts

Nikki Ralston
Nikki Ralston
David Stuart
David Stuart
March 17, 2026
4
Min Read

Best Cloud Data Security Solutions for 2026

Best Cloud Data Security Solutions for 2026

As enterprises scale cloud workloads and AI initiatives in 2026, cloud data security has become a board‑level priority. Regulatory frameworks are tightening, AI assistants are touching more systems, and sensitive data now spans IaaS, PaaS, SaaS, data lakes, and on‑prem.

This guide compares four of the leading cloud data security solutions - Sentra, Wiz, Prisma Cloud, and Cyera - across:

  • Architecture and deployment
  • Data movement and “toxic combination” detection
  • AI risk coverage and Copilot/LLM governance
  • Compliance automation and real‑world user sentiment

Platform Core Strength Deployment Model AI & Data Risk Coverage
Sentra In-environment DSPM and AI-aware data governance, with strong focus on regulated data and unstructured stores Purely agentless, in-place scanning in your cloud and data centers; optional lightweight on-prem scanners for file shares and databases Shadow AI detection, M365 Copilot and AI agent inventory, data-flow mapping into AI pipelines, and guardrails for cloud and SaaS data
Wiz Cloud-native CNAPP and Security Graph tying together data, identity, and cloud posture Primarily agentless via cloud provider APIs and snapshots, with optional eBPF sensor for runtime context Data lineage into AI pipelines via its security graph; AI exposure surfaced alongside misconfigurations and identity risk
Prisma Cloud Code-to-cloud security, infrastructure risk, and compliance across multi-cloud Hybrid: agentless scanning plus optional agents/sidecars for deep runtime protection Tracks data movement into AI pipelines as part of attack-path analysis and compliance checks
Cyera AI-native data discovery with converged DLP + DSPM for cloud data Agentless, in-place scanning using local inspection or snapshots AISPM and AI runtime protection for prompts, responses, and agents across SaaS and cloud environments

What Users Are Saying

Review platforms and field conversations surface patterns that go beyond feature matrices.

Sentra

Pros

  • Strong shadow data discovery, including legacy exports, backups, and unstructured sources like chat logs and call transcripts that other tools often miss
  • Built‑in compliance facilitation that reduces audit prep time for healthcare, financial services, and other regulated industries
  • In‑environment architecture that consistently appeals to privacy, risk, and data protection teams concerned about data residency and vendor data handling

Cons

  • Dashboards and reporting are powerful but can feel dense for first‑time users who aren’t familiar with DSPM concepts
  • Third‑party integrations are broad, but some connectors can lag when synchronizing very large environments

Wiz

Pros

  • Excellent multi‑cloud visibility and security graph that correlate misconfigurations, identities, and data assets for fast remediation
  • Well‑regarded customer success and responsive support teams

Cons

  • High alert volume if policies aren’t carefully tuned, which can overwhelm small teams
  • Configuration complexity grows with environment size and number of integrations

Prisma Cloud

Pros

  • Strong real‑time threat detection tightly coupled with major cloud providers, well suited to security operations teams
  • Proven scalability across large, hybrid environments combining containers, VMs, and serverless workloads

Cons

  • Cost is frequently cited as a concern in large‑scale deployments
  • Steeper learning curve that often requires dedicated training and ownership

Cyera

Pros

  • Smooth, agentless deployment with quick time‑to‑value for data discovery in cloud stores
  • Highly responsive support and strong focus on classification quality

Cons

  • Integration and operationalization complexity in larger enterprises, especially when folding into wider security workflows
  • Some backend customization and tuning require direct vendor involvement

Cloud Data Security Platforms: Architecture and Deployment

How a platform scans your data is as important as what it finds. Sending production data to a third‑party cloud for analysis can introduce its own risk, and regulators increasingly expect clear answers on where data is processed.

Sentra: In‑Environment DSPM for Regulated and AI‑Ready Data

Sentra takes a data‑first, in‑environment approach:

  • Agentless connectors to cloud provider APIs and SaaS platforms mean sensitive content is scanned inside your accounts; it is never copied to Sentra’s cloud.
  • Lightweight on‑prem scanners extend coverage to file shares and databases, creating a unified view across IaaS, PaaS, SaaS, and on‑prem systems.

This design makes Sentra particularly attractive to organizations with strict data residency requirements and privacy‑driven governance models, especially in finance, healthcare, and other regulated sectors.

Wiz: Agentless CNAPP with Optional Runtime Sensors

Wiz is fundamentally agentless, connecting to cloud environments via APIs and leveraging temporary snapshots for inspection.

  • An optional eBPF‑based sensor adds runtime visibility for workloads without introducing inline latency.
  • The same security graph model underpins both infrastructure risk and emerging data/AI lineage features.

Prisma Cloud: Hybrid Agentless + Agent Model

Prisma Cloud combines:

  • Agentless scanning for vulnerabilities, misconfigurations, and compliance posture.
  • Optional agents or sidecars when deep runtime protection or granular workload telemetry is required.

This hybrid approach offers powerful coverage, but introduces more operational overhead than purely agentless DSPM platforms like Sentra and Cyera.

Cyera: In‑Place Cloud Data Inspection

Cyera focuses on in‑place data inspection, using local snapshots or direct connections to datastore APIs.

  • Sensitive data is analyzed within your environment rather than being shipped to a vendor cloud.
  • This aligns well with privacy‑first architectures that treat any external data processing as a risk to be minimized.

Identifying Toxic Combinations and Tracking Data Movement

Static discovery like, “here are your S3 buckets” is a basic capability. Real security value comes from correlating data sensitivity, effective access, and how data moves over time across clouds, regions, and environments.

Sentra: Data‑Aware Risk and End‑to‑End Data Flow Visibility

Sentra continuously maps your entire data estate, correlating classification results with IAM, ACLs, and sharing links to surface “toxic combinations” - high‑sensitivity data behind overly broad permissions.

  • Tracks data movement across ETLs, database migrations, backups, and AI pipelines so you can see when production data drifts into dev, test, or unapproved regions.
  • Extends beyond primary databases to cover data lakes, analytics platforms, and modern big‑data formats in object storage, which are increasingly used as AI training inputs.

This gives security and data teams a living map of where sensitive data actually lives and how it moves, not just a static list of storage locations.

Wiz: Security Graph and CIEM

Wiz’s Security Graph maps identities, resources, configurations, and data stores in one model.

  • Its CIEM capabilities aggregate effective permissions (including inherited policies and group memberships) to highlight over‑exposed data resources.
  • Wiz tracks data lineage into AI pipelines as part of its broader cloud risk view, helping teams understand where sensitive data intersects with ML workloads.

Prisma Cloud: Graph‑Based Attack Paths

Prisma Cloud uses a graph‑based risk engine to continuously simulate attack paths:

  • Seemingly low‑risk misconfigurations and broad permissions are combined to identify chains that could expose regulated data.
  • The platform generates near real‑time alerts when data crosses geofencing boundaries or flows into unapproved analytics or AI environments.

Cyera: AI‑Native Classification and LLM Validation

Cyera pairs AI‑native classification with access analysis:

  • It continuously scans structured and unstructured data for sensitive content, mapping who and what can reach each dataset.
  • An LLM‑based validation layer distinguishes real sensitive data from mock or synthetic data in dev/test, which can reduce false positives and cleanup noise.

AI Risk Detection: Shadow AI and Copilot Governance

Enterprise AI tools introduce a new class of risk: employees connecting business data to unauthorized models, or AI agents and copilots inheriting excessive access to legacy data.

Sentra: AI‑Ready Data Security and Copilot Guardrails

Sentra treats AI risk as a data problem:

  • Tracks data flows between sources and destinations and compares them against an inventory of approved AI tools, flagging when sensitive data is routed to unauthorized LLMs or agents.
  • For Microsoft 365 Copilot, Sentra builds a catalog of data across SharePoint, OneDrive, and Teams, mapping which users and groups can access each set of documents and providing guardrails before Copilot is widely rolled out.

This gives security teams a practical definition of AI data readiness: knowing exactly which data AI can see, and shrinking that blast radius before something goes wrong.

Cyera: AISPM and AI Runtime Protection

Cyera takes a dual‑layer approach to AI risk:

  • AI Security Posture Management (AISPM) inventories sanctioned and unsanctioned AI tools and maps which sensitive datasets each can access.
  • AI Runtime Protection monitors prompts, responses, and agent actions in real time, blocking suspicious activity such as data leakage or prompt‑injection attempts.

For M365 Copilot Studio, Cyera integrates with Microsoft Entra’s agent registry to track AI agents and their data scopes.

Wiz and Prisma Cloud: AI as Part of Data Lineage

Wiz and Prisma Cloud both treat AI as an extension of their data lineage and attack‑path capabilities:

  • They track when sensitive data enters AI pipelines or training environments and how that intersects with misconfigurations and identity risk.
  • However, they do not yet offer the same depth of AI‑specific governance controls and runtime protections as dedicated AI‑aware platforms like Sentra and Cyera.

Compliance Automation and Framework Mapping

For teams preparing for GDPR, HIPAA, PCI, SOC 2, or EU AI Act reviews, manually mapping findings to control sets and assembling evidence is slow and error‑prone.

Platform Approaches to Compliance

Platform Compliance Approach
Wiz Maps cloud and workload findings to 100+ built-in frameworks (including GDPR, HIPAA, and the EU AI Act).
Prisma Cloud Automates mapping to major frameworks’ control requirements with audit-ready documentation, often completing large assessments in minutes to under an hour.
Sentra Focuses on regulated data visibility and privacy-driven governance; its in-environment DSPM, classification accuracy, and reporting are frequently cited by users as key to simplifying data-centric audit prep and proving control over sensitive data. Provides petabyte-scale assessments within hours and consolidated evidence for auditors.
Cyera Provides real-time visibility and automated policy enforcement; supports compliance reporting, though public documentation is less explicit on automatic mapping to specific, named control sets.

Sentra is especially compelling when audits hinge on where regulated data actually lives and how it is governed, rather than just infrastructure posture.

Choosing Among the Best Cloud Data Security Solutions

All four platforms address real, pressing needs—but they are not interchangeable.

  • Choose Sentra if you need strict in‑environment data governance, high‑precision discovery across cloud, SaaS, and on‑prem, and AI‑aware guardrails that make Copilot and other AI deployments provably safer—without moving sensitive data out of your own infrastructure.
  • Choose Wiz if your top priority is broad cloud security coverage and a unified graph for vulnerabilities, misconfigurations, identities, and data across multi‑cloud at scale.
  • Choose Prisma Cloud if you want a code‑to‑cloud platform that ties data exposure to DevSecOps pipelines and workload runtime protection, and you have the resources to operationalize its breadth.
  • Choose Cyera if you’re focused on AI‑native classification and a converged DLP + DSPM motion for large volumes of cloud data, and you’re prepared for a more involved integration phase.

For most mature security programs, the question isn’t whether to adopt these tools but how to layer them:

  • A CNAPP for cloud infrastructure risk
  • A DSPM platform like Sentra for data‑first visibility and AI readiness
  • DLP/SSE for enforcement at egress and user edges
  • Compliance automation to translate all of that into evidence your auditors, regulators, and board can trust

Taken together, this stack lets you move faster in the cloud and with AI, without losing control of the data that actually matters.

Read More
Nikki Ralston
Nikki Ralston
David Stuart
David Stuart
March 16, 2026
4
Min Read

How to Protect Sensitive Data in AWS

How to Protect Sensitive Data in AWS

Storing and processing sensitive data in the cloud introduces real risks, misconfigured buckets, over-permissive IAM roles, unencrypted databases, and logs that inadvertently capture PII. As cloud environments grow more complex in 2026, knowing how to protect sensitive data in AWS is a foundational requirement for any organization operating at scale. This guide breaks down the key AWS services, encryption strategies, and operational controls you need to build a layered defense around your most critical data assets.

How to Protect Sensitive Data in AWS (With Practical Examples)

Effective protection requires a layered, lifecycle-aware strategy. Here are the core controls to implement:

Field-Level and End-to-End Encryption

Rather than encrypting all data uniformly, use field-level encryption to target only sensitive fields, Social Security numbers, credit card details, while leaving non-sensitive data in plaintext. A practical approach: deploy Amazon CloudFront with a Lambda@Edge function that intercepts origin requests and encrypts designated JSON fields using RSA. AWS KMS manages the underlying keys, ensuring private keys stay secure and decryption is restricted to authorized services.

Encryption at Rest and in Transit

Enable default encryption on all storage assets, S3 buckets, EBS volumes, RDS databases. Use customer-managed keys (CMKs) in AWS KMS for granular control over key rotation and access policies. Enforce TLS across all service endpoints. Place databases in private subnets and restrict access through security groups, network ACLs, and VPC endpoints.

Strict IAM and Access Controls

Apply least privilege across all IAM roles. Use AWS IAM Access Analyzer to audit permissions and identify overly broad access. Where appropriate, integrate the AWS Encryption SDK with KMS for client-side encryption before data reaches any storage service.

Automated Compliance Enforcement

Use CloudFormation or Systems Manager to enforce encryption and access policies consistently. Centralize logging through CloudTrail and route findings to AWS Security Hub. This reduces the risk of shadow data and configuration drift that often leads to exposure.

What Is AWS Macie and How Does It Help Protect Sensitive Data?

AWS Macie is a managed security service that uses machine learning and pattern matching to discover, classify, and monitor sensitive data in Amazon S3. It continuously evaluates objects across your S3 inventory, detecting PII, financial data, PHI, and other regulated content without manual configuration per bucket.

Key capabilities:

  • Generates findings with sensitivity scores and contextual labels for risk-based prioritization
  • Integrates with AWS Security Hub and Amazon EventBridge for automated response workflows
  • Can trigger Lambda functions to restrict public access the moment sensitive data is detected
  • Provides continuous, auditable evidence of data discovery for GDPR, HIPAA, and PCI-DSS compliance

Understanding what sensitive data exposure looks like is the first step toward preventing it. Classifying data by sensitivity level lets you apply proportionate controls and limit blast radius if a breach occurs.

AWS Macie Pricing Breakdown

Macie offers a 30-day free trial covering up to 150 GB of automated discovery and bucket inventory. After that:

Component Cost
S3 bucket monitoring $0.10 per bucket/month (prorated daily), up to 10,000 buckets
Automated discovery $0.01 per 100,000 S3 objects/month + $1 per GB inspected beyond the first 1 GB
Targeted discovery jobs $1 per GB inspected; standard S3 GET/LIST request costs apply separately

For large environments, scope automated discovery to your highest-risk buckets first and use targeted jobs for periodic deep scans of lower-priority storage. This balances coverage with cost efficiency.

What Is AWS GuardDuty and How Does It Enhance Data Protection?

AWS GuardDuty is a managed threat detection service that continuously monitors CloudTrail events, VPC flow logs, and DNS logs. It uses machine learning, anomaly detection, and integrated threat intelligence to surface indicators of compromise.

What GuardDuty detects:

  • Unusual API calls and atypical S3 access patterns
  • Abnormal data exfiltration attempts
  • Compromised credentials
  • Multi-stage attack sequences correlated from isolated events

Findings and underlying log data are encrypted at rest using KMS and in transit via HTTPS. GuardDuty findings route to Security Hub or EventBridge for automated remediation, making it a key component of real-time data protection.

Using CloudWatch Data Protection Policies to Safeguard Sensitive Information

Applications frequently log more than intended, request payloads, error messages, and debug output can all contain sensitive data. CloudWatch Logs data protection policies automatically detect and mask sensitive information as log events are ingested, before storage.

How to Configure a Policy

  • Create a JSON-formatted data protection policy for a specific log group or at the account level
  • Specify data types to protect using over 100 managed data identifiers (SSNs, credit cards, emails, PHI)
  • The policy applies pattern matching and ML in real time to audit or mask detected data

Important Operational Considerations

  • Only users with the logs:Unmask IAM permission can view unmasked data
  • Encrypt log groups containing sensitive data using AWS KMS for an additional layer
  • Masking only applies to data ingested after a policy is active, existing log data remains unmasked
  • Set up alarms on the LogEventsWithFindings metric and route findings to S3 or Kinesis Data Firehose for audit trails

Implement data protection policies at the point of log group creation rather than retroactively, this is the single most common mistake teams make with CloudWatch masking.

How Sentra Extends AWS Data Protection with Full Visibility

Native AWS tools like Macie, GuardDuty, and CloudWatch provide strong point-in-time controls, but they don't give you a unified view of how sensitive data moves across accounts, services, and regions. This is where minimizing your data attack surface requires a purpose-built platform.

What Sentra adds:

  • Discovers and governs sensitive data at petabyte scale inside your own environment, data never leaves your control
  • Maps how sensitive data moves across AWS services and identifies shadow and redundant/obsolete/trivial (ROT) data
  • Enforces data-driven guardrails to prevent unauthorized AI access
  • Typically reduces cloud storage costs by ~20% by eliminating data sprawl

Knowing how to protect sensitive data in AWS means combining the right services, KMS for key management, Macie for S3 discovery, GuardDuty for threat detection, CloudWatch policies for log masking, with consistent access controls, encryption at every layer, and continuous monitoring. No single tool is sufficient. The organizations that get this right treat data protection as an ongoing operational discipline: audit IAM policies regularly, enforce encryption by default, classify data before it proliferates, and ensure your logging pipeline never exposes what it was meant to record.

<blogcta-big>

Read More
Daniel Suissa
Daniel Suissa
March 15, 2026
4
Min Read

The Blind Spot in Your Data Lake: Why Big Data Format Scanning Is the Next Frontier of Data Security

The Blind Spot in Your Data Lake: Why Big Data Format Scanning Is the Next Frontier of Data Security

Data lakes were supposed to be the great democratizer of enterprise analytics. Centralized, scalable, and cost-effective, they promised to put data in the hands of every team that needed it. And they delivered -- perhaps too well. Today, petabytes of sensitive data sit in Apache Parquet files, Avro containers, and ORC stores across S3 buckets, Azure Data Lake Storage, and Google Cloud Storage, often with little to no visibility into what those files actually contain.

Traditional Data Loss Prevention (DLP) tools were built for a world of emails, PDFs, and spreadsheets. They have no understanding of columnar storage formats, embedded schemas, or the sheer scale of modern data lake architectures. That gap is where sensitive data hides in plain sight -- and where Sentra's data lake format scanning changes the equation entirely.

The Shadow Data Problem in Data Lakes

Every modern enterprise runs some version of the same playbook: production databases feed into ETL pipelines, which land data in object storage as Parquet, Avro, or ORC files. Data engineers, analysts, and machine learning teams then consume that data downstream.

The security problem is straightforward but pervasive. When data engineering teams copy production data into data lakes for analytics, the PII that was supposed to be masked or anonymized often arrives intact. A full copy of customer records -- Social Security numbers, credit card numbers, health information -- ends up in a Parquet file in a shared S3 bucket, accessible to anyone with the right IAM role.

This is not a hypothetical scenario. It is the default state of most enterprise data lakes. And with data democratization initiatives actively expanding access to these stores, the blast radius of unprotected data lake files grows with every new user who gets read permissions.

Why Traditional DLP Falls Short

Conventional DLP solutions treat files as opaque blobs of text. They can scan a CSV or a Word document, but hand them an Apache Parquet file and they see nothing. This is a fundamental architectural limitation, not a feature gap that can be patched.

Big data formats are structurally different from traditional file types. Parquet and ORC use columnar storage, meaning data is organized by column rather than by row. Avro embeds its schema directly in the file. Arrow IPC (Feather) uses an in-memory format optimized for zero-copy reads. Scanning these formats requires purpose-built readers that understand their internal structure -- readers that traditional DLP simply does not have.

The result is a compliance blind spot that grows larger every quarter as more data moves into lakehouse architectures powered by Databricks, Snowflake external tables, and similar platforms.

How Sentra Scans Big Data Formats

Sentra provides native, schema-aware scanning for the full spectrum of data lake file formats. This is not a bolt-on capability -- it is core to how our platform understands modern data infrastructure.

Apache Parquet

Parquet is the lingua franca of the modern data lake. Sentra's tabular reader processes Parquet files with full awareness of their columnar structure, performing intelligent column-level classification. Rather than brute-forcing through every byte, Sentra leverages the columnar layout to efficiently scan individual columns for sensitive data patterns. Batch processing support means even large Parquet datasets are handled without requiring the entire file to be loaded into memory at once. Sentra also recognizes Spark checkpoint files (the `c000` convention) and processes them via Parquet or JSON fallback, ensuring that intermediate pipeline outputs do not escape scrutiny. Sentra also goes beyond the parquet schema and detects nested schemas like a json column that hides behind a “string” data type, adding meaningful context to the classification engine.

Apache Avro

Avro files carry their schema with them, and Sentra takes full advantage of that. Our tabular reader parses the embedded schema to understand field names, types, and structure before scanning the data itself. This schema-aware approach enables more accurate classification -- a field named `ssn` containing nine-digit numbers is treated differently than a field named `zip_code` with the same pattern.

Apache ORC

The Optimized Row Columnar format is a staple of Hive-based data warehouses and remains widely used across Hadoop-era data infrastructure. Sentra's tabular reader handles ORC files natively, applying the same column-level classification intelligence used for Parquet and Avro.

Apache Feather / Arrow IPC

Arrow's IPC format (commonly known as Feather) is increasingly used for fast data interchange between Python, R, and other analytics tools. Sentra scans these files through its textual reader, ensuring that even ephemeral interchange formats do not become a vector for untracked sensitive data.

Column-Level Intelligence

Across all of these formats, Sentra performs column-level scanning and classification. This is critical at data lake scale. A single column in a petabyte Parquet dataset could contain millions of Social Security numbers, while every other column holds benign operational metrics. Column-level granularity means Sentra can pinpoint exactly where sensitive data lives, rather than simply flagging an entire file as "contains PII."

The Compliance Imperative

Regulatory frameworks do not carve out exceptions for big data formats. GDPR's right of access and right to erasure apply regardless of whether personal data is stored in a PostgreSQL table or a Parquet file in S3. CCPA's disclosure requirements extend to every copy of consumer data, including the one sitting in your analytics data lake.

Data Subject Access Requests (DSARs) are particularly challenging when sensitive data is spread across thousands of Parquet files in a data lake. Without automated scanning that understands these formats, responding to a DSAR becomes a manual archaeology project -- expensive, slow, and error-prone.

The AI governance dimension adds another layer of urgency. Machine learning training datasets are frequently stored in Parquet format. If those datasets contain PII that was used to train models, organizations face regulatory exposure under emerging AI governance frameworks. Knowing what personal data exists in your ML training pipelines is no longer optional -- it is a compliance requirement that is rapidly taking shape across jurisdictions.

From Blind Spot to Full Visibility

The shift to data lakehouse architectures is accelerating. Databricks, Snowflake, and the broader modern data stack have made it easier than ever to store and process massive volumes of data in open file formats. That is a net positive for analytics and engineering teams. But without security tooling that speaks the same language as the data infrastructure, sensitive data will continue to accumulate in places where no one is looking.

Sentra closes that gap. By providing native, schema-aware scanning for Parquet, Avro, ORC, Feather, and related formats -- combined with intelligent column-level classification and efficient batch processing -- Sentra gives security and compliance teams the visibility they need into the fastest-growing data stores in the enterprise.

Data lakes are not going away. The question is whether your security posture can keep up with the data engineering teams that feed them. With Sentra, the answer is yes.

*Sentra is a Data Security Posture Management (DSPM) platform that automatically discovers, classifies, and monitors sensitive data across your entire cloud environment. To learn more about how Sentra handles data lake scanning and 150+ other file formats, book a demo with our data security experts.

<blogcta-big>

Read More
Expert Data Security Insights Straight to Your Inbox
What Should I Do Now:
1

Get the latest GigaOm DSPM Radar report - see why Sentra was named a Leader and Fast Mover in data security. Download now and stay ahead on securing sensitive data.

2

Sign up for a demo and learn how Sentra’s data security platform can uncover hidden risks, simplify compliance, and safeguard your sensitive data.

3

Follow us on LinkedIn, X (Twitter), and YouTube for actionable expert insights on how to strengthen your data security, build a successful DSPM program, and more!

Before you go...

Get the Gartner Customers' Choice for DSPM Report

Read why 98% of users recommend Sentra.

White Gartner Peer Insights Customers' Choice 2025 badge with laurel leaves inside a speech bubble.