We’re excited to announce the new integration between Alation and TrustLogix. This integration empowers organizations to unlock the value of their data while ensuring secure access across cloud environments. By combining Alation’s powerful data catalog and discovery features with TrustLogix’s robust security controls, this solution enables businesses to confidently harness their data without compromising security.
This integration offers key benefits for both business and data teams:
- Discover sensitive data through Alation’s Data Classification. This helps organizations identify and protect critical information that requires heightened security.
- Automatically enforce least-privilege access policies using TrustLogix’s Data Security Platform. This reduces the need for manual governance tasks by applying dynamic data masking and controls across multiple platforms.
- Monitor and manage data access across platforms. TrustLogix ensures only authorized users with the correct entitlements can access data, accelerating safe and timely data access.
- Detect and prevent non-compliant data usage. The platform tracks and addresses issues like exposure of sensitive data, helping companies demonstrate compliance with HIPAA, PCI, SOX, and other regulations.
- Automate data access controls. This enables faster, self-service access to data without burdening multiple teams, driving operational efficiency and secure data use.
Alation is the industry leader in Data Intelligence, providing artificial intelligence-driven data search and discovery, classification, governance, and analytics capabilities to help organizations foster a data culture.
TrustLogix provides a cloud-native and proxyless Cloud Data Security platform for monitoring and enforcing fine-grained data access control policies to secure data in cloud platforms like Snowflake, Redshift, and Databricks. The joint solution combines these powerful capabilities to empower mutual customers to use Alation’s classification and Data Catalog as part of TrustLogix Access Policies, security monitoring, and recommendations.
Large enterprises in verticals such as manufacturing and healthcare with massive and critically sensitive data sets across multi-cloud data sources utilize the combined solution to leverage Alation’s metadata and enable fine-grained and dynamic access based on attributes like usage purpose, data type, and more through TrustLogix.
Leveraging Data Classification and Metadata
With Alation, business data owners can classify and tag information based on its sensitivity and risk. Based on the data's contents, PII, financial, healthcare, and other information are appropriately tagged as such. This streamlines compliance, strengthens security, simplifies audits, and ensures that only authorized users access high-risk data. Accurate classification also supports AI-driven processes that rely on well-organized data.Metadata is a powerful means by which to monitor key assets and manage access control policies. TrustLogix provides a data security and security governance layer that can be integrated with metadata from Alation for monitoring and data access control policies.
Alation Classification Tags to enforce access policies - Dynamic data masking from TrustLogix
Alation Catalog Integration
Alation helps customers organize their datasets into a user-friendly catalog so that their data consumers can easily navigate and request access to those datasets within a business context. Data owners and stewards can use Alation to select datasets for data access control policies, eliminating manual coding and reducing human error. Data ops experts and analysts can leverage those same datasets from within the TrustLogix console, streamlining security workflows for policy creation:
Leveraging Alation Data Catalog in TrustLogix Data Access Policies
Simplified Data Access Management
By combining information from Alation and underlying cloud data source systems, TrustLogix empowers data owners and stewards to navigate and select datasets from Alation when designing data access control policies, and combine them with roles and security controls from the underlying cloud data platforms like Snowflake and Redshift.
For example, a data owner can now define a single policy from the TrustLogix interface that incorporates Alation metadata and classification tags, as well as Snowflake roles and privileges. Why is this valuable? As an example, now data owners can custom-build policies with specific access parameters. The below example showcases a policy that grants a healthcare super admin access to patient claim/insurance data (PII) in a particular Snowflake dataset – while restricting access to the finance team:
In this example the healthcare data policy uses the Alation tag, “PII” , Alation Catalog : and FINANCE_DATA from the HEALTH_CARE database to automate the masking of PII data from all users on the finance team.
No-Code Policy Management for Data-Centric Security
The Alation-TrustLogix integration simplifies data security for data owners and stewards by eliminating the need for manual coding. Previously, admins had to understand Alation tags, datasets, and security constructs for platforms like Snowflake and Databricks, then manually write and execute SQL code for security policies. This process was complex and prone to errors.
TrustLogix uses Alation’s catalog and tags to automatically generate and deploy security policies, following the data platform’s primitives and constructs (e.g., Snowflake, Redshift, S3). This ensures accurate enforcement without manual effort, reducing risks and improving efficiency. Now, The policy is automatically deployed to the underlying platform and DataSecOps teams can have full confidence that policies are being modeled and enforced exactly as intended by the business.
Recognize High Risk "Blind Spots"
As TrustLogix discovers dark (unused) data, overprivileged activity, and data exfiltration indicators, it leverages Alation’s Classification Tags to determine the sensitivity level of that data and spotlight high-risk areas for security and governance teams. These insights are accompanied by intelligent recommendations, allowing teams to prioritize their efforts on the most significant risks to the organization.
Remove Barriers for Data Consumers to Access Data
Business data owners leverage Alation to make sensitive data easily available for their data scientists, analysts, and other consumers. TrustLogix offers a data security and governance layer that integrates with Alation's metadata to automate controls and enforce enterprise policies. Instead of completely blocking access for certain data consumers, users can query resources and receive relevant insights, while sensitive objects are masked or obfuscated. Users will see data with appropriate levels of insight based on dynamic attributes like usage purpose, data type, time, and more.This continuous enforcement on cloud data platforms applies to any data consumer, whether accessing data from data science notebooks, analytical tools, or through Alation Compose, and it further reduces the need to use manual workflow steps to request or deny access to sensitive data.This automated process occurs at query time, ensuring data security while still providing necessary self-service access without overloading multiple teams with policy management responsibilities.
Talk with a data security specialist or register for a free 90-day data protection service and learn more about how we work with Alation to help enterprises accelerate their AI & Data Security projects.
About TrustLogix
TrustLogix's cloud-native Data Security Platform streamlines data security posture management and access control management across multi-cloud data platforms (Snowflake, AWS Redshift, Databricks, MySQL, SQL Server, Tableau, and others), all without seeing or touching the data itself. Data owners can implement fine-grained role-based access control (RBAC) and attribute-based access control (ABAC) in minutes, thus helping data consumers get the data they need quickly and securely. The Data Security Posture Management use case helps security get proactive visibility into data risks and contain them immediately.It discovers and monitors data access and sharing activities and helps review existing security policies deployed within structured data applications. With no code and no agents or proxies, TrustLogix can be implemented quickly, with initial configuration and visibility of data access issues in a given data platform account possible in 30 minutes or less.
For more information about TrustLogix, which is headquartered in Mountain View, CA, please visit www.trustlogix.io or connect with us on LinkedIn or Twitter.