Entitlement Management for Databases

Data Access Enforcer (DAE) enables you to secure your valuable data in databases and data warehouses.  The solution leverages user, host, environment, and resource/data attributes in making access decisions.

ODBC / JDBC

Relational database management systems (RDBMS) have been an integral component of technology stacks for a long time, acting as critical vehicles for managing structured data. However, they can also be a vector for data loss or leakage – whether inadvertently or maliciously.

As the world becomes ever more digitized, the amount of data being generated is growing exponentially. With this rapid growth, the need to meet security and compliance requirements becomes that much more important. As a result, organizations today need solutions that can secure the structured data managed by RDBMS.

NextLabs’ Data Access Enforcer for ODBC / JDBC enables you to secure your valuable data in relational databases. The solution leverages user, host, environment, and resource/data attributes in making access decisions. At the end of the day, DAE simplifies the design and development of security features into your ODBC or JDBC application.

DAE for SAP ERP

NextLabs Data Access Enforcer for SAP ERP (DAE for SAP) provides dynamic data-level security controls and fine-grained data access governance for SAP applications. Through NextLabs’   patented   Dynamic Authorization platform,  organizations can leverage attribute-based policy and centralized policy management to improve their security and compliance posture for SAP.  DAE for SAP enforces data-level security controls – such as field-level data masking and record-level data segregation and monitors data access activity directly from within the data access layer of the SAP S/4 HANA and SAP ECC.

DAE for SAP complements SAP Dynamic Authorization Management (SAP DAM), which operates at the application layers of the SAP S/4 HANA and SAP ECC. DAE is UI, API, microservice, batch job, report, Transaction, and Fiori app independent and will support any UI with a single set of policies within a single solution.

DAE for SAP prevents unauthorized access to sensitive SAP data through fine-grained data-level security controls, protecting data, and addressing compliance requirements at the same time. DAE for SAP enables employees and external partners to share critical information and collaborate in business processes to improve workforce productivity and business agility.

BigQuery

A cloud data warehouse (CDW) is a system, which uses the space and computes power allocated by a cloud provider to integrate and store data from disparate data sources. It is employed for data structured storage, analysis, and reporting.

As more and more enterprises move to the cloud, they are abandoning their legacy on-premise data warehousing technologies, including Hadoop, for these new cloud data platforms such as Google BigQuery. The need to meet security and compliance requirements becomes that much more important. As a result, organizations today need solutions that can secure the structured data manage by CDW.

NextLabs Data Access Enforcer for BigQuery (DAE for BigQuery) enables you to secure your valuable data in BigQuery. The solution leverages user and host attributes in making access decisions. At the end of the day, DAE for BigQuery simplifies the design and development of security features into your application.

FEATURES
Filtering controls
  • Control what users can do with filtered rows in database tables
  • Filter the database rows by operation (e.g., Select, Update, Delete) such that users cannot select, update, or delete rows that have been filtered
Block controls
  • Control whether users can block certain actions
  • Block by operation (e.g., Insert, Call) such that users cannot insert a base table or call a stored procedure
Masking Controls

Mask and block user to update confidential data

Support for multiple database APIs Access via OBDC, JDBC, or REST APIs
Support for multiple data sources Ability to enforce policies with user attributes that can come from Active Directory or the database itself
Centralized auditing and reporting  Auditing and reporting in Control Center using EMDB_AUDIT_LOG and the actions that were performed
BENEFITS
Simplified access control Externalize authorization management to simplify and reduce the time spent on administering access control policies
Enhanced business agility React more rapidly to changes in business requirements, market conditions, or regulatory environment since policy changes can be made without requiring code changes or application downtime
Higher ROI by leveraging existing IT investments Lower your total cost of ownership as you can leverage your existing investment in the NextLabs platform
Reduced compliance costs Reduce the cost of compliance through more efficient and cost-effective monitoring and audit of your data