Data Security and Governance

As the volume and proliferation of data—from cloud to mobile to social to machine—continues to grow, serious measures need to be taken to deliver safe harbor for sensitive data. Data security governs protection across data states throughout its lifecycle, whereas data privacy defines that access based on privacy policies and laws.

The focus of this article is to explain how Plumb5 users can easily govern their data by controlling data access to its unit parameter and be assured of protection across data states (in motion, at rest, creation and disposal)

Data Security: Businesses can address each of their security needs by data masking and data encryption techniques across the 4 data states. Be it data for customer service, analysis, learning or reporting or even to share it with outsourced vendors, sensitive data can be protected from any kind of attacks.

dataprotRobust network security will help protect data in transit. Firewalls and network access control will help secure the networks from attacks and intrusion.Dynamic data masking limits sensitive data exposure by masking it to non-privileged users.

Policies for systematically categorizing and classifying all company data, no matter where it resides, in order to ensure that the appropriate data protection measures are applied while data remains at rest and triggered when data classified as at-risk is accessed, used, or transferred.

By defining, analyzing, and protecting sensitive data at its source, Plumb5 helps in keeping your data secure before it proliferates throughout your organization.

Data Access and Permissions

The platform provides a flexible data sharing model that makes it easy to assign various data sets to different sets of users. This ensures you can balance security and convenience, minimizing the risk of stolen or misused data while making sure all users can easily access the data they need.

The platform includes simple-to-configure security controls that make it easy to specify which users can view, create, edit, or delete any record or field in the app. You can configure access at the level of the organization, objects, fields, or individual records.

create_user_perm

By combining security controls at different levels, you can provide just the right level of data access to thousands of users without having to specify permissions for each user individually.

Users can create a user group and map data columns individually with further permissions to read/write data.

With the unified data architecture, the business can improve privacy through individualization where privacy rules can be designed based on traits and preferences, which can help in individual compliance with data privacy.

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s