Security and compliance reportingReport on interrelated metadata for security or compliance purposes.
- Retrieve starting point: Retrieve a starting point of metadata (e.g. the full profile of a data asset).
- Expand relationships: Traverse the metadata graph to determine relationships across multiple degrees of separation (e.g. using lineage).
- Consolidate results: Consolidate and analyze the resulting set of metadata.
- Visualize: Integrate this output into the consumer’s desired output. For example, integrate the results into a BI dashboard.
For example, a compliance team may want a Privacy Impact Assessment that combines classification metadata, data assets, processing purposes, and locations. Other security, legal agreement, or operations teams may want other reports with slightly different outputs and interrelated metadata.
Report on interrelated metadata for security or compliance purposes.
Automated key rotations
Automate the rotation of keys used for data store credentials to improve security.
Define access control policies at scale
Make access controls faster and easier to set up.
Maintain once, distribute anywhere access policies
Protect data regardless which tools are used to access it.