SlideShare a Scribd company logo
GDPR Compliance Made Easy
with Data Virtualization
Mark Pritchard, UK Sales Engineering Director
May 2017
Agenda1.GDPR Principles
2.Challenges of Data Provisioning
3. Data Virtualization
1. Abstraction
2. Security
3. Reuse
4.Customer Case Study
5.Summary & Q&A
1. General Data Protection Regulation
Principles
4
Wikipedia
Information privacy, or data privacy (or data protection), is the
relationship between the collection and dissemination
of data, technology, the public expectation of privacy, and
the legal and political issues surrounding them.
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
SECURE
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
2. Challenges of Data Provisioning
Governing Personal Data
16
The Business Need
Ready Access to Critical Information to Support Business Processes
16
MarketingSales ExecutiveSupport
Customers
Invoices Products
Service
Usage
Access to complete information:
business entities and pre-integrated
views
Access to related information:
discovery and self service
Access in real-time from different
apps and devices
The Challenge
17
Governing Personal Data
MarketingSales ExecutiveSupport
Is the data being
processed in a lawful,
fair and transparent
way?
Is the data being
collected for a
specific, explicit and
legitimate purpose?
Is the data adequate
and limited to what is
necessary for
processing?
Is the data you are
viewing accurate, up-
to-date?
Is the data kept in a
form where subject is
identifiable no longer
than is necessary?
Is the data processed
in a manner that
ensures appropriate
security of data?
Database
Apps
Warehouse Cloud
Big Data
Documents AppsNo SQL
Multiple ungoverned and
potentially unsecured
copies of the data?
Lineage of the data?
Consistent security of the
data?
Data on premise and off?
Data access audit? Who is
replicating the data?
Discovery what data is
actually published to
consumers?
Access to most up to date
data?
Is data anonymised ?
GDPR Compliance Made Easy with Data Virtualization
3. Data Virtualization
Governing Personal Data
Data Abstraction Layer
20
The Solution
Abstracts access to
disparate data sources
Acts as a single repository
(virtual)
Makes data available in
real-time to consumers
20
DATA ABSTRACTION LAYER
21
Data Abstraction Layer
Logical Data Model
Sources
Combine,
Transform
&
Integrate
Publish
Base View
(Source
Abstraction)Client Address Client
Type
Company Invoicing Service
Usage
Product Logs Web
Incidents
Customer Invoice Product
Customer Invoicing
Service Usage Incident
Hadoop Web SiteRest
Web Service
Multi-
dimensional
SalesforceSQL
Server
Oracle
SQL, SOAP, REST, ODATA, etc. Denodo’s Information Self Service
GDPR Compliance Made Easy with Data Virtualization
GDPR Compliance Made Easy with Data Virtualization
24
Abstraction Lasagne
Bringing Replicated Data Under Control
ERP / CRM 1
Agile BI
/ App1
2
Data Virtualization
Enterprise
BI / App
3
Data Lake /
Warehouse
4
4
4
ETL
“3 Steps to Data Protection Compliance”
www.datavirtualizationblog.com
Mark Pritchard
Don’t update tomorrow what
you could update today!
GDPR Compliance Made Easy with Data Virtualization
27
Security in Denodo
Overview
Authentication
• Pass-through authentication
• Kerberos and Windows SSO
• OAuth, SPNEGO
Authentication
• Standard JDBC/ODBC security
• Kerberos and Windows SSO
• Web Service security
LDAP
Active Directory
Role based Authentication &
Authorization
Guest, employee, corporate
Schema-wide Permissions
Data Specific Permissions
(Row, Column level, Masking)
Policy Based Security
Data in motion
• SSL/TLS
Data in motion
• SSL/TLS
Encrypted
data at rest
• Cache
• Swap
Security in Denodo
28
Role-Based Granular Privileges
Security in Denodo
29
Advanced Selective Data Masking
Security in Denodo
30
Advanced Selective Data Masking
Security in Denodo
31
Partial Data Masking
32
Custom
Policy
Conditions satisfied
Security: applies custom security
policies
• If person accessing data has role of
'Supervisor' and location is 'New
York', then show compensation
information for employees in the
New York office only.
Enforcement: rejects/filters
queries by specified criteria like
user priority, cost, time of day etc.
• If the production batch window runs
from 3 am - 6 am, there is
increased load on production
servers at this time. So, all queries
on these servers can be blocked
during this time to prevent failure of
a process.
Data consuming users, Apps
Query
Accept / add filters
Reject
Security in Denodo
Custom Policies: Interception of queries before they are executed
Policy Server
(e.g. Axiomatics)
33
Security in Denodo
• Audit trail of all the queries and other actions executed on the
system
Complete Auditability
• With this information it is possible
to check at any time who has
accessed to which resources, what
changes have been made or what
queries have been executed, and
when it happened
• The information is stored centrally
and Denodo supports SNMP, JMX
and WS-Management standards
GDPR Compliance Made Easy with Data Virtualization
35
Information Self Service
E/R diagram
1
Click on a view to
navigate to the
details
2
Hover on the
arrows to show
the details of
the PK-FK
relationships
36
Information Self Service
Browse and Search Metadata Catalog
1Browse and search
virtual databases
2 Browse and search
available views
3 Review metadata
and descriptions
4 Query the view
37
Information Self Service
Querying Data
1Access to the
Denodo catalog
2 Query and filter
for data
3 Click on the green arrows to drill
down into related information
38
Information Self Service
Data Lineage
1 Select Data Lineage
for the View
2 Select column
to see lineage
3 Hover and click the
icons to see details
39
Data Virtualization Supports GDPR
Adhering to GDPR principles
Purpose Based
Processing
• Role based access
ensures that views
can be reused for
multiple purposes.
• Users and
Applications can
access single view
but ensure that
the data returned
is applicable for
the
user/applications
purpose.
Consent Based
Processing
• Integrate real-
time with consent
management
systems
• Row level, column
level policies can
be applied in
Denodo
• Custom policies
have access to
context
information
Data Minimization
• Create virtual
model for data
necessary for
given purpose
• Limit specific
access of data as
designed centrally
in Denodo
Data
Anonoymization
• Views can be
configured in
Denodo to offer
anonymized
reporting of data
• Allow access only
to aggregated
data
3. Denodo Customer Case Study
Centralizing data security with
data virtualization
Asurion’s continuous innovation is helping 290M customers globally
stay connected while driving loyalty to our partners’ brands
• Founded in the mid 1990’s, Asurion has been serving the communications and retail industries for over 20 years
• Based in Nashville, Tennessee, Asurion has over 17,000 associates worldwide
• Serving more then 290 million consumers globally through our operations in 18 countries:
• Asurion is privately-held with annual revenues in excess of $5.8 billion
• Our management team comes from best-in-class companies with experience across mobile, wireline telecom, logistics, insurance, service
contracts, consulting, customer care, marketing, retail and more
• Asurion partners with the worlds leading mobile carriers, retailers cable satellite and cable providers.
North America
• Global Headquarters
• 15 Corporate Owned
Call Centers
• Logistics Center
South America
• 2 Corporate Offices
Europe
• 3 Corporate Offices
• 1 Corporate Owned Call Center
Asia Pacific
• 13 Corporate Offices
• Logistics Center
• 2 Corporate Owned
Call Centers
• Australia
• Brazil
• Canada
• China/Hong-Kong
• Colombia
• England
• France
• Israel
• Japan
• Korea
• Malaysia
• Mexico
• Philippines
• Peru
• Singapore
• Taiwan
• Thailand
• United States
Expanding Global Presence
Corporate Overview
Asurion’s Data Architecture Started Here
Identify targeted business
initiatives
Define Data
Strategy
Implement Big
Data
infrastructure
Build
analytics
model
Determine
required insights
Conduct Data
scientist training
& certification
Security Constraints
Geogr
aphic
Client
Based
PII
Depart
mental
Constr
aints
Technical Challenges
Security Constraints
Geographical
Constraints
Contractual
Client
Obligations
PII Protection
Departmental
Restrictions
Fast Changing Hadoop & Cloud Technologies
Hive, Spark,
Redshift
Maintaining
different code
base
Discover, Co-relate, Enable
Predictive Analytics
Text, CSV, Voice, JSON,
Streaming, 3rd Party Data
60TB+ structured, 200TB+
telemetry & unstructured
data
45
On-Premise
Global Device Insurance and Support Services Company
DataVirtualization
Abstraction/Security
AWS
Postgres
MySQL
Oracle
SQL Server
Customer
Interactions
Telemetry
Legacy
Migration
Reporting /
Analytics
e.g.
- Oracle
BI
- MSRS
- SQL
clients
Active
Directory
46
Enterprise Architect
Our Denodo rollout was one of the easiest and most successful rollouts of
critical enterprise software I have seen. It was successful in handling our
initial, security, use case immediately, and has since shown a strong ability
to cover additional use cases, in particular acting as a Data Abstraction Layer
via it's web service functionality.”
4. Summary
48
Summary
Data Virtualization for Seamless GDPR Compliance
Q&A
50
Further reading
Seamlessly Comply with the GDPR
Leverage Data Virtualization to Manage Data Access from
a Single Point
http://www.denodo.com/en/document/solution-brief/seamlessly-comply-gdpr
Enhancing the Security of your Enterprise Data
Layer
http://www.datavirtualizationblog.com/enhancing-security-enterprise-data-layer/
https://community.denodo.com/
Product documentation, FAQ, tutorials
Thanks!
www.denodo.com info@denodo.com
© Copyright Denodo Technologies. All rights reserved
Unless otherwise specified, no part of this PDF file may be reproduced or utilized in any for or by any means, electronic or mechanical,
including photocopying and microfilm, without prior the written authorization from Denodo Technologies.

More Related Content

PDF
Accelerate Self-service Analytics with Universal Semantic Model
PDF
Best Practices: Data Virtualization Perspectives and Best Practices
PPTX
Centralize Security and Governance with Data Virtualization
PDF
Analyst Webinar: Enabling a Customer Data Platform Using Data Virtualization
PDF
6 Solution Patterns for Accelerating Self-Service BI, Cloud, Big Data, and Ot...
PDF
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
PDF
Denodo 6.0: Self Service Search, Discovery & Governance using an Universal Se...
PDF
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Accelerate Self-service Analytics with Universal Semantic Model
Best Practices: Data Virtualization Perspectives and Best Practices
Centralize Security and Governance with Data Virtualization
Analyst Webinar: Enabling a Customer Data Platform Using Data Virtualization
6 Solution Patterns for Accelerating Self-Service BI, Cloud, Big Data, and Ot...
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
Denodo 6.0: Self Service Search, Discovery & Governance using an Universal Se...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...

What's hot (20)

PDF
Supporting Data Services Marketplace using Data Virtualization
PDF
Denodo Platform 7.0: What's New?
PDF
Virtual Sandbox for Data Scientists at Enterprise Scale
PDF
Data Marketplace and the Role of Data Virtualization
PDF
In Memory Parallel Processing for Big Data Scenarios
PDF
Big Data Fabric: A Necessity For Any Successful Big Data Initiative
PDF
Parallel In-Memory Processing and Data Virtualization Redefine Analytics Arch...
PDF
Empowering your Enterprise with a Self-Service Data Marketplace (EMEA)
PDF
A Logical Architecture is Always a Flexible Architecture (ASEAN)
PDF
Data Virtualization enabled Data Fabric: Operationalize the Data Lake (APAC)
PDF
Logical Data Fabric: An Introduction
PDF
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
PDF
Analyst Keynote: Forrester: Data Fabric Strategy is Vital for Business Innova...
PDF
GDPR Noncompliance: Avoid the Risk with Data Virtualization
PPTX
Data Virtualization: An Introduction
PDF
Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)
PDF
Education Seminar: Self-service BI, Logical Data Warehouse and Data Lakes
PDF
Data Catalog for Better Data Discovery and Governance
PPTX
Denodo Data Virtualization - IT Days in Luxembourg with Oktopus
PDF
Big Data Fabric Capability Maturity Model
Supporting Data Services Marketplace using Data Virtualization
Denodo Platform 7.0: What's New?
Virtual Sandbox for Data Scientists at Enterprise Scale
Data Marketplace and the Role of Data Virtualization
In Memory Parallel Processing for Big Data Scenarios
Big Data Fabric: A Necessity For Any Successful Big Data Initiative
Parallel In-Memory Processing and Data Virtualization Redefine Analytics Arch...
Empowering your Enterprise with a Self-Service Data Marketplace (EMEA)
A Logical Architecture is Always a Flexible Architecture (ASEAN)
Data Virtualization enabled Data Fabric: Operationalize the Data Lake (APAC)
Logical Data Fabric: An Introduction
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
Analyst Keynote: Forrester: Data Fabric Strategy is Vital for Business Innova...
GDPR Noncompliance: Avoid the Risk with Data Virtualization
Data Virtualization: An Introduction
Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)
Education Seminar: Self-service BI, Logical Data Warehouse and Data Lakes
Data Catalog for Better Data Discovery and Governance
Denodo Data Virtualization - IT Days in Luxembourg with Oktopus
Big Data Fabric Capability Maturity Model
Ad

Similar to GDPR Compliance Made Easy with Data Virtualization (20)

PPTX
Microsoft Cloud GDPR Compliance Options (SUGUK)
PDF
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
PDF
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
PDF
Beyond GDPR Compliance - Role of Internal Audit
PDF
SureSkills GDPR - Discover the Smart Solution
PDF
How a Logical Data Fabric Enhances the Customer 360 View
PDF
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
PPTX
Vuzion Love Cloud GDPR Event
PDF
A Key to Real-time Insights in a Post-COVID World (ASEAN)
PPTX
How to turn GDPR into a Strategic Advantage using Connected Data
PDF
Big Data LDN 2017: Applied AI for GDPR
PDF
GDPR- The Buck Stops Here
PPTX
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
PPTX
Deep dive into Microsoft Purview Data Loss Prevention
PDF
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
PPTX
Dealing with Dark Data
PPTX
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
PDF
GDPR: Leverage the Power of Graphs
PPTX
GDPR Part 2: Quest Relevance
PPTX
Klarna Tech Talk - Mind the Data!
Microsoft Cloud GDPR Compliance Options (SUGUK)
Webinar Metalogix "Auf der Zielgeraden zur DSGVO!"
DBAs - Is Your Company’s Personal and Sensitive Data Safe?
Beyond GDPR Compliance - Role of Internal Audit
SureSkills GDPR - Discover the Smart Solution
How a Logical Data Fabric Enhances the Customer 360 View
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
Vuzion Love Cloud GDPR Event
A Key to Real-time Insights in a Post-COVID World (ASEAN)
How to turn GDPR into a Strategic Advantage using Connected Data
Big Data LDN 2017: Applied AI for GDPR
GDPR- The Buck Stops Here
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
Deep dive into Microsoft Purview Data Loss Prevention
Implementar una estrategia eficiente de gobierno y seguridad del dato con la ...
Dealing with Dark Data
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
GDPR: Leverage the Power of Graphs
GDPR Part 2: Quest Relevance
Klarna Tech Talk - Mind the Data!
Ad

More from Denodo (20)

PDF
Enterprise Monitoring and Auditing in Denodo
PDF
Lunch and Learn ANZ: Mastering Cloud Data Cost Control: A FinOps Approach
PDF
Achieving Self-Service Analytics with a Governed Data Services Layer
PDF
What you need to know about Generative AI and Data Management?
PDF
Mastering Data Compliance in a Dynamic Business Landscape
PDF
Denodo Partner Connect: Business Value Demo with Denodo Demo Lite
PDF
Expert Panel: Overcoming Challenges with Distributed Data to Maximize Busines...
PDF
Drive Data Privacy Regulatory Compliance
PDF
Знакомство с виртуализацией данных для профессионалов в области данных
PDF
Data Democratization: A Secret Sauce to Say Goodbye to Data Fragmentation
PDF
Denodo Partner Connect - Technical Webinar - Ask Me Anything
PDF
Lunch and Learn ANZ: Key Takeaways for 2023!
PDF
It’s a Wrap! 2023 – A Groundbreaking Year for AI and The Way Forward
PDF
Quels sont les facteurs-clés de succès pour appliquer au mieux le RGPD à votr...
PDF
Lunch and Learn ANZ: Achieving Self-Service Analytics with a Governed Data Se...
PDF
How to Build Your Data Marketplace with Data Virtualization?
PDF
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
PDF
Enabling Data Catalog users with advanced usability
PDF
Denodo Partner Connect: Technical Webinar - Architect Associate Certification...
PDF
GenAI y el futuro de la gestión de datos: mitos y realidades
Enterprise Monitoring and Auditing in Denodo
Lunch and Learn ANZ: Mastering Cloud Data Cost Control: A FinOps Approach
Achieving Self-Service Analytics with a Governed Data Services Layer
What you need to know about Generative AI and Data Management?
Mastering Data Compliance in a Dynamic Business Landscape
Denodo Partner Connect: Business Value Demo with Denodo Demo Lite
Expert Panel: Overcoming Challenges with Distributed Data to Maximize Busines...
Drive Data Privacy Regulatory Compliance
Знакомство с виртуализацией данных для профессионалов в области данных
Data Democratization: A Secret Sauce to Say Goodbye to Data Fragmentation
Denodo Partner Connect - Technical Webinar - Ask Me Anything
Lunch and Learn ANZ: Key Takeaways for 2023!
It’s a Wrap! 2023 – A Groundbreaking Year for AI and The Way Forward
Quels sont les facteurs-clés de succès pour appliquer au mieux le RGPD à votr...
Lunch and Learn ANZ: Achieving Self-Service Analytics with a Governed Data Se...
How to Build Your Data Marketplace with Data Virtualization?
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
Enabling Data Catalog users with advanced usability
Denodo Partner Connect: Technical Webinar - Architect Associate Certification...
GenAI y el futuro de la gestión de datos: mitos y realidades

Recently uploaded (20)

PPTX
1_Introduction to advance data techniques.pptx
PPTX
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PPTX
Computer network topology notes for revision
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PPT
Quality review (1)_presentation of this 21
PDF
annual-report-2024-2025 original latest.
PDF
Fluorescence-microscope_Botany_detailed content
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPTX
Supervised vs unsupervised machine learning algorithms
PPT
ISS -ESG Data flows What is ESG and HowHow
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
PPTX
Database Infoormation System (DBIS).pptx
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
1_Introduction to advance data techniques.pptx
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
Miokarditis (Inflamasi pada Otot Jantung)
Computer network topology notes for revision
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
Quality review (1)_presentation of this 21
annual-report-2024-2025 original latest.
Fluorescence-microscope_Botany_detailed content
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
Supervised vs unsupervised machine learning algorithms
ISS -ESG Data flows What is ESG and HowHow
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
Database Infoormation System (DBIS).pptx
MODULE 8 - DISASTER risk PREPAREDNESS.pptx

GDPR Compliance Made Easy with Data Virtualization

  • 1. GDPR Compliance Made Easy with Data Virtualization Mark Pritchard, UK Sales Engineering Director May 2017
  • 2. Agenda1.GDPR Principles 2.Challenges of Data Provisioning 3. Data Virtualization 1. Abstraction 2. Security 3. Reuse 4.Customer Case Study 5.Summary & Q&A
  • 3. 1. General Data Protection Regulation Principles
  • 4. 4 Wikipedia Information privacy, or data privacy (or data protection), is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.
  • 15. 2. Challenges of Data Provisioning Governing Personal Data
  • 16. 16 The Business Need Ready Access to Critical Information to Support Business Processes 16 MarketingSales ExecutiveSupport Customers Invoices Products Service Usage Access to complete information: business entities and pre-integrated views Access to related information: discovery and self service Access in real-time from different apps and devices
  • 17. The Challenge 17 Governing Personal Data MarketingSales ExecutiveSupport Is the data being processed in a lawful, fair and transparent way? Is the data being collected for a specific, explicit and legitimate purpose? Is the data adequate and limited to what is necessary for processing? Is the data you are viewing accurate, up- to-date? Is the data kept in a form where subject is identifiable no longer than is necessary? Is the data processed in a manner that ensures appropriate security of data? Database Apps Warehouse Cloud Big Data Documents AppsNo SQL Multiple ungoverned and potentially unsecured copies of the data? Lineage of the data? Consistent security of the data? Data on premise and off? Data access audit? Who is replicating the data? Discovery what data is actually published to consumers? Access to most up to date data? Is data anonymised ?
  • 20. Data Abstraction Layer 20 The Solution Abstracts access to disparate data sources Acts as a single repository (virtual) Makes data available in real-time to consumers 20 DATA ABSTRACTION LAYER
  • 21. 21 Data Abstraction Layer Logical Data Model Sources Combine, Transform & Integrate Publish Base View (Source Abstraction)Client Address Client Type Company Invoicing Service Usage Product Logs Web Incidents Customer Invoice Product Customer Invoicing Service Usage Incident Hadoop Web SiteRest Web Service Multi- dimensional SalesforceSQL Server Oracle SQL, SOAP, REST, ODATA, etc. Denodo’s Information Self Service
  • 24. 24 Abstraction Lasagne Bringing Replicated Data Under Control ERP / CRM 1 Agile BI / App1 2 Data Virtualization Enterprise BI / App 3 Data Lake / Warehouse 4 4 4 ETL
  • 25. “3 Steps to Data Protection Compliance” www.datavirtualizationblog.com Mark Pritchard Don’t update tomorrow what you could update today!
  • 27. 27 Security in Denodo Overview Authentication • Pass-through authentication • Kerberos and Windows SSO • OAuth, SPNEGO Authentication • Standard JDBC/ODBC security • Kerberos and Windows SSO • Web Service security LDAP Active Directory Role based Authentication & Authorization Guest, employee, corporate Schema-wide Permissions Data Specific Permissions (Row, Column level, Masking) Policy Based Security Data in motion • SSL/TLS Data in motion • SSL/TLS Encrypted data at rest • Cache • Swap
  • 28. Security in Denodo 28 Role-Based Granular Privileges
  • 29. Security in Denodo 29 Advanced Selective Data Masking
  • 30. Security in Denodo 30 Advanced Selective Data Masking
  • 32. 32 Custom Policy Conditions satisfied Security: applies custom security policies • If person accessing data has role of 'Supervisor' and location is 'New York', then show compensation information for employees in the New York office only. Enforcement: rejects/filters queries by specified criteria like user priority, cost, time of day etc. • If the production batch window runs from 3 am - 6 am, there is increased load on production servers at this time. So, all queries on these servers can be blocked during this time to prevent failure of a process. Data consuming users, Apps Query Accept / add filters Reject Security in Denodo Custom Policies: Interception of queries before they are executed Policy Server (e.g. Axiomatics)
  • 33. 33 Security in Denodo • Audit trail of all the queries and other actions executed on the system Complete Auditability • With this information it is possible to check at any time who has accessed to which resources, what changes have been made or what queries have been executed, and when it happened • The information is stored centrally and Denodo supports SNMP, JMX and WS-Management standards
  • 35. 35 Information Self Service E/R diagram 1 Click on a view to navigate to the details 2 Hover on the arrows to show the details of the PK-FK relationships
  • 36. 36 Information Self Service Browse and Search Metadata Catalog 1Browse and search virtual databases 2 Browse and search available views 3 Review metadata and descriptions 4 Query the view
  • 37. 37 Information Self Service Querying Data 1Access to the Denodo catalog 2 Query and filter for data 3 Click on the green arrows to drill down into related information
  • 38. 38 Information Self Service Data Lineage 1 Select Data Lineage for the View 2 Select column to see lineage 3 Hover and click the icons to see details
  • 39. 39 Data Virtualization Supports GDPR Adhering to GDPR principles Purpose Based Processing • Role based access ensures that views can be reused for multiple purposes. • Users and Applications can access single view but ensure that the data returned is applicable for the user/applications purpose. Consent Based Processing • Integrate real- time with consent management systems • Row level, column level policies can be applied in Denodo • Custom policies have access to context information Data Minimization • Create virtual model for data necessary for given purpose • Limit specific access of data as designed centrally in Denodo Data Anonoymization • Views can be configured in Denodo to offer anonymized reporting of data • Allow access only to aggregated data
  • 40. 3. Denodo Customer Case Study
  • 41. Centralizing data security with data virtualization
  • 42. Asurion’s continuous innovation is helping 290M customers globally stay connected while driving loyalty to our partners’ brands • Founded in the mid 1990’s, Asurion has been serving the communications and retail industries for over 20 years • Based in Nashville, Tennessee, Asurion has over 17,000 associates worldwide • Serving more then 290 million consumers globally through our operations in 18 countries: • Asurion is privately-held with annual revenues in excess of $5.8 billion • Our management team comes from best-in-class companies with experience across mobile, wireline telecom, logistics, insurance, service contracts, consulting, customer care, marketing, retail and more • Asurion partners with the worlds leading mobile carriers, retailers cable satellite and cable providers. North America • Global Headquarters • 15 Corporate Owned Call Centers • Logistics Center South America • 2 Corporate Offices Europe • 3 Corporate Offices • 1 Corporate Owned Call Center Asia Pacific • 13 Corporate Offices • Logistics Center • 2 Corporate Owned Call Centers • Australia • Brazil • Canada • China/Hong-Kong • Colombia • England • France • Israel • Japan • Korea • Malaysia • Mexico • Philippines • Peru • Singapore • Taiwan • Thailand • United States Expanding Global Presence Corporate Overview
  • 43. Asurion’s Data Architecture Started Here Identify targeted business initiatives Define Data Strategy Implement Big Data infrastructure Build analytics model Determine required insights Conduct Data scientist training & certification Security Constraints Geogr aphic Client Based PII Depart mental Constr aints
  • 44. Technical Challenges Security Constraints Geographical Constraints Contractual Client Obligations PII Protection Departmental Restrictions Fast Changing Hadoop & Cloud Technologies Hive, Spark, Redshift Maintaining different code base Discover, Co-relate, Enable Predictive Analytics Text, CSV, Voice, JSON, Streaming, 3rd Party Data 60TB+ structured, 200TB+ telemetry & unstructured data
  • 45. 45 On-Premise Global Device Insurance and Support Services Company DataVirtualization Abstraction/Security AWS Postgres MySQL Oracle SQL Server Customer Interactions Telemetry Legacy Migration Reporting / Analytics e.g. - Oracle BI - MSRS - SQL clients Active Directory
  • 46. 46 Enterprise Architect Our Denodo rollout was one of the easiest and most successful rollouts of critical enterprise software I have seen. It was successful in handling our initial, security, use case immediately, and has since shown a strong ability to cover additional use cases, in particular acting as a Data Abstraction Layer via it's web service functionality.”
  • 48. 48 Summary Data Virtualization for Seamless GDPR Compliance
  • 49. Q&A
  • 50. 50 Further reading Seamlessly Comply with the GDPR Leverage Data Virtualization to Manage Data Access from a Single Point http://www.denodo.com/en/document/solution-brief/seamlessly-comply-gdpr Enhancing the Security of your Enterprise Data Layer http://www.datavirtualizationblog.com/enhancing-security-enterprise-data-layer/ https://community.denodo.com/ Product documentation, FAQ, tutorials
  • 51. Thanks! www.denodo.com info@denodo.com © Copyright Denodo Technologies. All rights reserved Unless otherwise specified, no part of this PDF file may be reproduced or utilized in any for or by any means, electronic or mechanical, including photocopying and microfilm, without prior the written authorization from Denodo Technologies.