+
Axiomatics Featured in KuppingerCole Market Compass for Policy-Based Access Management (PBAM) Learn more  
#

Authorization for databases

Protect and share senstive data with dynamic data filtering and masking for relational databases, on-premise and in the cloud.

Learn more

Secure senstive data at cell level

Data Access Filtering for Multiple Databases is a industry-leading solution for controlling run-time access to business critical data. Unrivalled dynamic filtering and masking capabilities ensure fine-grained data access controls are enforced at cell level in line with business policies and regulations.

writing on a whiteboard
collaborating women

Approved database access

Axiomatics authorization fabric for databases ensures that users have access to the data they are authorized to and nothing else by filtering, masking or redacting sensitive data.

Key benefits of using our dynamic solution include:

  • Single point of access control management for the database layer
  • Enforces authorization in a non-intrusive way; application changes are not required
  • Minimizes risk exposure for data in transit
  • Consistently enforces authorization across multiple channels/applications
  • Ensures policies and control rules are in place by users accessing and extracting source data
  • Masks/filters data at row, column and cell level
  • Simple integration with other Identity & Access Management (IAM) solution providers

How it works

Axiomatics´solution derives user permissions from the real-time evaluation of policies, and filters, masks or redacts data based on these policies. Policy-based authorization applied on the content of relational databases provides the required high visibility and control to achieve data security protection at source, within the data layer. This ensures that users only have access to what they are authorized to see.

Central policy management utilizes Attribute Based Access Control (ABAC). Once configured, authorization policies are consistently applied across all incoming connections to which they are applied, regardless of application end-point. A central policy can thus protect multiple databases from queries sent from multiple applications.

Get the datasheet
writing on a whiteboard

Key features of dynamic authorization for multiple databases

Policy authoring & editing

Multiple policy editors help meet the needs of policy lifecycle management in individual departments, and across different collaborative workflows. This supports efficient creation, editing and maintenance of both policies and their related attributes.

Data filtering & masking

Protects data down to cell level without hindering the effective and efficient sharing of sensitive data by filtering or masking data that users are not authorized to see or edit.

Simplified UI

An enhanced user interface ensures ease of management for individual users and APIs for SQL Filter Service configurations and changes. Automated reporting removes much of the manual auditing proceses.

SQL proxy

A central generic proxy protects multiple database types, such as Oracle, IBM DB2, Microsoft SQL Server, or Teradata. The proxy intercepts requests to all of these databases and queries the core engine for authorization of intercepted SQL statements.

Context aware

Thanks to the powerful Attribute Based Access Control capabilities, sensitive data can be filtered based on any available criteria including. location, date/time, device being used, citizenship, and more.

Recommended Resources

Policy-driven security for the financial industry

Our datasheet helps demonstrate how ABAC ensures these businesses meet the authorization demands of the modern financial marketplace head-on.

Get the datasheet

Axiomatics Policy Server Product Sheet

With on-premise, hybrid and cloud-native capabilities, this authorization engine works seamlessly within a DevOps environment, and is ideal for secure new application development.

Get the solution brief

Dynamic Authorization in the Banking and Finance industry

Dynamic authorization can be applied to many use cases across the Banking and Finance industry. Moreover, be inspired and read about a handful of case study examples.

Get the case study

Have 30 minutes?
Let's show you a demo!

See how Axiomatics enables you to balance the demands of your security team and your business users with the authorization solution that our customers love.

In the meantime, check out this example demo...

Book a full demo