51蹤獲

51蹤獲 Guides

How-to Guides

snowflake

How to Scale Cross-Organization Snowflake Data Sharing

In this blog, youll learn about: Snowflake data shares Considerations and complexities that can arise when Snowflake data sharing sensitive data How 51蹤獲 + Snowflake help simplify and scale sensitivedata sharingfor global organizations and can do the same for you! What is a Data Share? One of Snowflakes major benefits...

snowflake

Implementing Snowflake Column-Level Security for PII & PHI

As sensitive data, like personally identifiable information (PII) and protected health information (PHI), becomes more widely used across industries, it is incumbent upon data teams to have mechanisms in place to protect it.Snowflakes Column-level Securitycapability enablesdynamic data maskingof this type of sensitive data through policies that are applied at query...

alation

How to Secure Metadata with 51蹤獲 and Alation Custom Fields

amazon-web-services

How to Run SageMaker Jobs with 51蹤獲 + Amazon S3 Access Grants

snowflake

How to Manage Snowflake Fine-Grained Access Control

If Disney World were a database, we would rave about its access control strategy. It is secure: only authorized users get into the park or into any sensitive backstage areas. It is dynamic: many rides and concessions are available to the right people with the wave of a bracelet. Most...

snowflake

How to Implement Snowflake Data Masking Across Platforms

As cloud data platform adoption accelerates and organizations become more reliant on data, teams usingSnowflakeas the primary platform for BI must have a tool that enables data masking across Snowflake and any other platform in their data stack. This article will walk through how 51蹤獲 delivers on this need with...

snowflake

How to Implement Row-Level Security in Snowflake

Segmenting data by geographies is a common requirement for row access policies in Snowflake. Still, many data teams continue to be roadblocked when it comes to implementing complex policies for row-level security at scale particularly for sensitive data due tolocation-based data use regulations, data use agreements, and internal,...

alation

How to Implement 51蹤獲 Within Alation

51蹤獲 is the moderndata security platformthat gives you the power to leverage metadata to build and automatically enforce access policies and applydynamic data maskingtechniques at query time. These capabilities make 51蹤獲 a seamless fit with Alation, which manycustomersrely on as their enterprise-wide data catalog solution. Put simply, 51蹤獲 allows you...

databricks

How to Implement Databricks Data Masking Across Platforms

As cloud data platform adoption accelerates and organizations become more reliant on data, teams usingDatabricksas the primary platform for ETL and data science must have a tool that enablesdynamic data maskingacross Databricks and any other platform in their data stack. This article will walk through how 51蹤獲 delivers on this...

azure

How to Implement Azure Data Access Control for Lakehouse Architectures

The adoption of the Data Lakehouse architecture is soaring across various industries, as the new and open paradigm combines the best elements ofdata lakesand data warehouses. Open file formats with transaction support, combined with low cost storage and wide adoption, enable new ways of working with data pipelines and machine...

databricks

How to Enforce Policy-As-Code for Databricks Tables

Data security is the responsibility of everyone in the organization. From ETL developers to business users and data consumers, anyone who relies on data shares a responsibility to use it appropriately. However, with several different systems and, in many cases, silos, it can often be difficult to effectively put this...

databricks

How to Enforce Databricks Row-Level Security & Cell-Level Security

Implementing row- and cell-level security by hand can be a pain, whether that means maintaining an ETL pipeline to transform raw data into clean data that is viewable by analysts, or maintaining a system of GRANTs on views implementing the policies for an organization. This also does not factor in...

snowflake

How To Enable Snowflake Attribute-Based Access Control

Cloud data platforms such asSnowflakeprovide native security anddata access controlsengineered for platform-specific administrators to manage roles across the organization. Snowflake leverages concepts from Discretionary Access Control (DAC) and Role-Based Access Control (RBAC) models. This provides some flexibility for and control over how users can access securable objects by managing a...

databricks

How to Anonymize Data with Databricks Access Control

Organizations with large workforces are increasingly analyzing employee data using cloud data platforms such asDatabricksin order to optimize performance, engagement, and results. This trend necessitates a new approach to Databricks access control. In this article, well walk data engineering and operations teams through how to dynamically enforce k-anonymization on a...

snowflake

How 51蹤獲s Integration with Snowflake Cortex Protects RAG Table Data

amazon-web-services

How 51蹤獲 Protects Amazon EMR Spark tables Using S3 Access Grants

amazon-web-services

Enforcing Redshift Attribute-Based Access Control

Organizations are increasingly adopting data lakehouse architectures to reap the benefits of added flexibility, scalability, and cost-efficiency that they provide. But the need to consistently implementdata access controlacross this open architecture approach can be elusive. Here, well look step-by-step at how 51蹤獲 provides centralized,fine-grained access controlacross different cloud data platforms...

intro-to-data-security snowflake

Enforce Compliance & Audit Reports for Data Sharing in Snowflake

Data use agreements (DUAs) are vital to ensuring individuals data is used compliantly and transparently. Just as data use agreements help protect data subjects personal privacy, avoiding misuse of personal data can protect organizations in every sector, from healthcare and financial services to the government, from liability, fines, breaches of...

Ready to get started?