As the volume and proliferation of data—from cloud to mobile to social to machine—continues to grow, serious measures need to be taken to deliver safe harbor for sensitive data. Data security governs protection across data states throughout its lifecycle, whereas data privacy defines that access based on privacy policies and laws.
The focus of this article is to explain how Plumb5 users can easily govern their data by controlling data access to its unit parameter and be assured of protection across data states (in motion, at rest, creation and disposal)
Data Security: Businesses can address each of their security needs by data masking and data encryption techniques across the 4 data states. Be it data for customer service, analysis, learning or reporting or even to share it with outsourced vendors, sensitive data can be protected from any kind of attacks.
Robust network security will help protect data in transit. Firewalls and network access control will help secure the networks from attacks and intrusion.Dynamic data masking limits sensitive data exposure by masking it to non-privileged users.
Policies for systematically categorizing and classifying all company data, no matter where it resides, in order to ensure that the appropriate data protection measures are applied while data remains at rest and triggered when data classified as at-risk is accessed, used, or transferred.
By defining, analyzing, and protecting sensitive data at its source, Plumb5 helps in keeping your data secure before it proliferates throughout your organization.
Data Access and Permissions
The platform provides a flexible data sharing model that makes it easy to assign various data sets to different sets of users. This ensures you can balance security and convenience, minimizing the risk of stolen or misused data while making sure all users can easily access the data they need.
The platform includes simple-to-configure security controls that make it easy to specify which users can view, create, edit, or delete any record or field in the app. You can configure access at the level of the organization, objects, fields, or individual records.
By combining security controls at different levels, you can provide just the right level of data access to thousands of users without having to specify permissions for each user individually.
Users can create a user group and map data columns individually with further permissions to read/write data.
With the unified data architecture, the business can improve privacy through individualization where privacy rules can be designed based on traits and preferences, which can help in individual compliance with data privacy.