Home | Dynamic Security for Cloud | DAE as a Service
DAE
as a Service
Protect data and ensure need-to-know access anywhere & everywhere
Home | Dynamic Security for Cloud | DAE as a Service
Protect data and ensure need-to-know access anywhere & everywhere
Applying Zero Trust principles to implement robust data access security across applications, Data Access Enforcer (DAE) ensures privacy and protection of data with real-time segregation and masking control. Powered by CloudAz, it controls access to data through fine-grained attribute-based policies that are dynamically enforced at runtime, regardless of how the data is being accessed. DAE also provides dynamic data-level security controls and fine-grained data access governance independent of services, applications, UI, and API, while supporting any Commercial-off-the-shelf (COTS) application with a single set of policies.
Unified policy management platform with Dynamic Authorization Policy Engine.
Persistent protection of critical files and documents stored and shared anywhere.
Secure applications, externalize entitlement, protect data, and simplify access management.
Dynamically enforce data masking and filtering controls
Comply with industry regulations including GDPR, ITAR/EAR, & SOX
Secure any data with a single policy
Reduce compliance mgmt. costs, with the elimination of custom code
Data Access Enforcer (DAE) controls access to your sensitive information at the data access point, so no unauthorized access can occur, regardless of the approach.
DAE provides unmatched flexibility and security in managing and enforcing data access controls.
Access to data based on policies that examine attributes of the data being accessed, the context of the request, and user identity. DAE dynamically applies the relevant policies, factoring in changes in the attributes of data or the user to always enforce fine-grained security controls to mask, protect, and segregate data. Rules are validated in real-time when a user attempts to access data, before granting permission to access.
The need for data masking is more crucial than ever due to the various requirements mandating the protection of sensitive data, such as personally identifiable information (PII), customer data, financial data—the list goes on. Through a policy-driven approach, DAE ensure that users can only view the fields on records they have been granted access to and masks the information that they have not been authorized to view. Centrally managed policies define masking patterns and rules to determine who, what, when, where, and why to mask field(s) in real-time.
Business object and metadata can be combined with user attributes from existing attribute sources, including application user, directory services, federated identities, HR, and other third-party system of records. These attributes can be combined in the policy to grant permission to execute business transactions and modify transaction data in real-time.
DAE's comprehensive dynamic data filtering capability guarantees that users can only view records that they have been authorized to access. Authorization can be determined based on user attributes such as industry, location, department, position, project assignment, etc. and attributes of data accessed like the sensitivity level or the type of transaction. Policy can be written to make authorization decision by comparing user attributes against the attributes of data. For example, you can filter data in charts and reports to only allow authorized users to see the inventory and pricing data in US for the Consumer Electronics business unit.
Using contextual information (e.g., location, device, department), DAE can determine if a user is authorized to access data at runtime and virtually compartmentalizes the data with field-level security controls for added granularity. This approach of enforcing policy based on attributes also simplify role administration as attributes and conditions change.
Authorization policies can be centrally managed and reviewed across all an organization’s applications, substantially reducing administration costs.
In addition to native support for 100s of applications OOTB, DAE supports batch programs, API calls, custom tables, and custom programs without code changes.
DAE uses policy to grant users permission to view certain records while being authorized to edit, create, and delete, only a subset of these records. Policy is enforced regardless of the business transaction used to access the data. For instance, a finance manager may be given permission to view detailed cost information on all oil pipeline projects in North America but only allowed to create and edit information for similar projects in Texas.
DAE tracks and stores user activities and data access across all applications in a central audit server, simplifying compliance management. Analytics for user behavior and access patterns are provided via dashboards, reports, and automated monitoring facilities.
Zero Trust Data Centric Security
NextLabs® patented dynamic authorization technology and industry leading attribute-based zero trust policy platform helps enterprises identify and protect sensitive data, monitor and control access to the data, and prevent regulatory violations – whether in the cloud or on premises