SlideShare a Scribd company logo
Simplifying Data
Governance and Security
with a Logical Data Fabric
D E N O D O L U N C H & L E A R N
SPEAKERS
Elaine Chan
Regional Vice President,
ASEAN & Korea
Chris Day
Director, APAC Sales
Engineering
Agenda
DENODO LUNCH AND LEARN ASEAN
1. Simplifying Data Governance and Security
with a Logical Data Fabric
2. Product Demonstration
3. Q&A
4. Next Steps
5. Closing
DENODO LUNCH AND LEARN ASEAN
Simplifying Data
Governance and Security
with a Logical Data Fabric
Elaine Chan
Regional Vice President,
ASEAN & Korea
Virtual Data Fabric
6
How to Get More from Your Data in 2020, Jan 2020
A data fabric architecture is designed to stitch
together historical and current data across multiple
data silos to produce a uniform and unified business
view of the data.”
7
Virtual Data Fabric
Consumers
Data
Science
Machine
Learning
Artificial
Intelligence
Mobile
Applications
Predictive
Analytics
Business
Intelligence
Relational NoSQL Unstructured Docs Cloud Sensors IoT
Sources
Unified Data Security
Abstraction Layer
Universal Access
Self-Service
Data Catalog
Unified Security
Management through
Data Virtualization
9
Unified Security Management
§ Data Virtualization offers an abstraction layer that
decouples sources from consumer applications
§ Single Point for accessing all the information
avoiding point-to-point connections to sources
§ As a single point of access, this is an ideal place
to enforce security and can be defined in terms
of the canonical model with a fine granularity
10
Virtual Data Fabric
Consumers
Data
Science
Machine
Learning
Artificial
Intelligence
Mobile
Applications
Predictive
Analytics
Business
Intelligence
Relational NoSQL Unstructured Docs Cloud Sensors IoT
Sources
Unified Data Data Masking
Abstraction Layer
Role based Authentication
LDAP
Active Directory
Encrypted data
In Cache
Data Specific Permissions
11
Secure Data in Motion
§ Consumer to Denodo Platform (northbound):
Communications between consumer applications
and the Data Virtualization layer can be secured,
typically using of SSL (TLS 1.2)
§ Denodo Platform to Sources (southbound):
Specific security protocol depends on the source e.g.
SSL (TLS 1.2), HTTPS, sFTP, …
12
Secure Data at Rest
§ Two locations with ‘data at rest’
§ Cache database
§ Memory swap files
§ Cache database
§ Use native database encryption mechanism to secure data
§ Memory swap files
§ Use native OS encryption to encrypt files in swap directory
13
Pass-Through Credentials
§ Allows use of existing access permissions and rules in underlying
data sources.
§ Access permissions and rules in data source filter results from
query.
§ Data Virtualization layer permissions and rules imposed on
results from data source.
§ Results filtered by both sets of access controls are returned to
user.
14
Role-Base Data Privacy
§ Control what data is visible based on user role
§ Roles can be imported from AD and LDAP
§ Roles can be organized in hierarchies
§ More complex logic also possible
15
Row-level Restrictions
§ You can add restrictions to allow users to obtain only the rows that match a
certain condition.
Administrator can see all records User only see the data related to his location
16
Dynamic Data Masking
§ The Dynamic Data Masking (DDM) technique intercepts queries sent to the
database and/or the database responses and applies some more or less
sophisticated logic to protect sensitive information when it’s displayed for end-
users in the application or BI tool.
§ For example, a credit card number might look like 1234 **** **** 5678 instead of
the real value or an email address might be shown as jd****@denodo.com.
17
Virtual Data Fabric
Relational NoSQL Unstructured Docs Cloud Sensors IoT
Dynamic Data Masking Rules
Authorized users can
see the real data
Other users can only see
scrambled data
18
Auditing
§ Audit trail of all the queries and actions executed in the DV platform.
§ With this information it is possible to check at any time who has accessed which resources, what
changes have been made or what queries have been executed.
Case Study
Problem Solution Results
CASE STUDY
20
Consumer electronics insurance company
achieves cloud modernization while
securing customer data
Asurion needed a next-generation data
architecture that could enable the company to spin
up additional infrastructure, services, and products
in weeks instead of months.
Asurion also faced strict restrictions on migrating
data, and had to remain compliant with stringent
governmental regulations hence needed to
centralize companywide security management
around a single point of control.
Asurion leveraged on Denodo Platform to establish
a hybrid data layer that abstracted data consumers
from the complexities of access across on-
premises and cloud sources while also providing
better data integration for improved analytics.
With Asurion’s stringent security requirements,
they needed to keep the two types of sources
physically separate, but logically connected,
indefinitely.
Asurion deployed a Denodo instance in both
infrastructures, with a bridge between the two,
which formed a hybrid data layer that establishes a
single access point to the on-premises sources, in
keeping with the company’s security requirements.
With a hybrid data layer in place, Asurion is able to
better discover and correlate data from disparate
sources, and also engage in predictive analytics
with data scattered across text, voice, streaming
data, third-party data, and various other structured,
unstructured, and telemetry based sources
Most importantly, Asurion is able to gain this
intelligence while satisfying customer and
regulatory demands for highly strict security.
Asurion is a consumer electronics insurance and warranty provider that serves more than 300 million consumers
globally across 18 countries. With it’s global 19,000 employees Asurion generates around $6B in annual revenue.
21
CASE STUDY
Reference Architecture
DENODO LUNCH AND LEARN ASEAN
Key Takeaways
KEY
TAKEAWAYS
Single Entry Point
for Enforcing
Security and
Governance
Policies
Data on-premises
and off, combined
through the same
governed virtual
data fabric layer
Single Source of
Truth /
Canonical Views
Who is Doing /
Accessing What,
When and How
Fewer copies of
personal data.
Lineage of copies
is available.
24
Demo
Presented by Chris Day, Director, APAC Sales Engineering
Next Steps
26
Get Started Today
Try Denodo for a Test Drive with a 30-
day free trial in the cloud marketplaces
CHOICE
Under your cloud account
SUPPORT
Community forum AND remote sales
engineer
OPPORTUNITY
30 minutes free consultation with
Denodo Cloud specialist
denodo.link/drive22
Thanks!
www.denodo.com info@denodo.com
© Copyright Denodo Technologies. All rights reserved
Unless otherwise specified, no part of this PDF file may be reproduced or utilized in any for or by any means, electronic or mechanical, including photocopying and
microfilm, without prior the written authorization from Denodo Technologies.

More Related Content

PDF
GDPR Compliance Made Easy with Data Virtualization
PDF
Secure Your Data with Virtual Data Fabric (ASEAN)
PPTX
Centralize Security and Governance with Data Virtualization
PDF
Govern and Protect Your End User Information
PDF
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...
PDF
Secure your data with Virtual Data Fabric (Middle East)
PDF
Consumption based analytics enabled by Data Virtualization
PDF
Modern Data Management for Federal Modernization
GDPR Compliance Made Easy with Data Virtualization
Secure Your Data with Virtual Data Fabric (ASEAN)
Centralize Security and Governance with Data Virtualization
Govern and Protect Your End User Information
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...
Secure your data with Virtual Data Fabric (Middle East)
Consumption based analytics enabled by Data Virtualization
Modern Data Management for Federal Modernization

Similar to Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN) (20)

PDF
Introduction to Modern Data Virtualization 2021 (APAC)
PDF
Data Virtualization. An Introduction (ASEAN)
PDF
Large Bank Leverages the Denodo Platform as the Foundation for a Shift to a D...
PDF
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
PDF
Secure Data Sharing with the Denodo Platform
PDF
Introduction to Modern Data Virtualization (US)
PDF
Three Dimensions of Data as a Service
PDF
Rethink Your 2021 Data Management Strategy with Data Virtualization (ASEAN)
PDF
Data Virtualization: An Introduction
PDF
A Logical Architecture is Always a Flexible Architecture (ASEAN)
PDF
Why Data Virtualization? An Introduction
PDF
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
PDF
Data Services Marketplace
PDF
Data virtualization an introduction
PDF
A Journey to the Cloud with Data Virtualization
PDF
MasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
PDF
GDPR Noncompliance: Avoid the Risk with Data Virtualization
PDF
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
PDF
Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...
PDF
Connecting Silos in Real Time with Data Virtualization
Introduction to Modern Data Virtualization 2021 (APAC)
Data Virtualization. An Introduction (ASEAN)
Large Bank Leverages the Denodo Platform as the Foundation for a Shift to a D...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Secure Data Sharing with the Denodo Platform
Introduction to Modern Data Virtualization (US)
Three Dimensions of Data as a Service
Rethink Your 2021 Data Management Strategy with Data Virtualization (ASEAN)
Data Virtualization: An Introduction
A Logical Architecture is Always a Flexible Architecture (ASEAN)
Why Data Virtualization? An Introduction
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
Data Services Marketplace
Data virtualization an introduction
A Journey to the Cloud with Data Virtualization
MasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data Virtualization
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...
Connecting Silos in Real Time with Data Virtualization
Ad

More from Denodo (20)

PDF
Enterprise Monitoring and Auditing in Denodo
PDF
Lunch and Learn ANZ: Mastering Cloud Data Cost Control: A FinOps Approach
PDF
Achieving Self-Service Analytics with a Governed Data Services Layer
PDF
What you need to know about Generative AI and Data Management?
PDF
Mastering Data Compliance in a Dynamic Business Landscape
PDF
Denodo Partner Connect: Business Value Demo with Denodo Demo Lite
PDF
Expert Panel: Overcoming Challenges with Distributed Data to Maximize Busines...
PDF
Drive Data Privacy Regulatory Compliance
PDF
Знакомство с виртуализацией данных для профессионалов в области данных
PDF
Data Democratization: A Secret Sauce to Say Goodbye to Data Fragmentation
PDF
Denodo Partner Connect - Technical Webinar - Ask Me Anything
PDF
Lunch and Learn ANZ: Key Takeaways for 2023!
PDF
It’s a Wrap! 2023 – A Groundbreaking Year for AI and The Way Forward
PDF
Quels sont les facteurs-clés de succès pour appliquer au mieux le RGPD à votr...
PDF
Lunch and Learn ANZ: Achieving Self-Service Analytics with a Governed Data Se...
PDF
How to Build Your Data Marketplace with Data Virtualization?
PDF
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
PDF
Enabling Data Catalog users with advanced usability
PDF
Denodo Partner Connect: Technical Webinar - Architect Associate Certification...
PDF
GenAI y el futuro de la gestión de datos: mitos y realidades
Enterprise Monitoring and Auditing in Denodo
Lunch and Learn ANZ: Mastering Cloud Data Cost Control: A FinOps Approach
Achieving Self-Service Analytics with a Governed Data Services Layer
What you need to know about Generative AI and Data Management?
Mastering Data Compliance in a Dynamic Business Landscape
Denodo Partner Connect: Business Value Demo with Denodo Demo Lite
Expert Panel: Overcoming Challenges with Distributed Data to Maximize Busines...
Drive Data Privacy Regulatory Compliance
Знакомство с виртуализацией данных для профессионалов в области данных
Data Democratization: A Secret Sauce to Say Goodbye to Data Fragmentation
Denodo Partner Connect - Technical Webinar - Ask Me Anything
Lunch and Learn ANZ: Key Takeaways for 2023!
It’s a Wrap! 2023 – A Groundbreaking Year for AI and The Way Forward
Quels sont les facteurs-clés de succès pour appliquer au mieux le RGPD à votr...
Lunch and Learn ANZ: Achieving Self-Service Analytics with a Governed Data Se...
How to Build Your Data Marketplace with Data Virtualization?
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
Enabling Data Catalog users with advanced usability
Denodo Partner Connect: Technical Webinar - Architect Associate Certification...
GenAI y el futuro de la gestión de datos: mitos y realidades
Ad

Recently uploaded (20)

PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPT
Reliability_Chapter_ presentation 1221.5784
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PDF
Business Analytics and business intelligence.pdf
PDF
.pdf is not working space design for the following data for the following dat...
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PPTX
Introduction to Knowledge Engineering Part 1
PPTX
IB Computer Science - Internal Assessment.pptx
PDF
Introduction to the R Programming Language
PDF
annual-report-2024-2025 original latest.
PDF
Optimise Shopper Experiences with a Strong Data Estate.pdf
PPTX
STERILIZATION AND DISINFECTION-1.ppthhhbx
PDF
[EN] Industrial Machine Downtime Prediction
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
Database Infoormation System (DBIS).pptx
PPTX
Computer network topology notes for revision
PDF
Mega Projects Data Mega Projects Data
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Galatica Smart Energy Infrastructure Startup Pitch Deck
Reliability_Chapter_ presentation 1221.5784
Introduction-to-Cloud-ComputingFinal.pptx
Business Analytics and business intelligence.pdf
.pdf is not working space design for the following data for the following dat...
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
Miokarditis (Inflamasi pada Otot Jantung)
Introduction to Knowledge Engineering Part 1
IB Computer Science - Internal Assessment.pptx
Introduction to the R Programming Language
annual-report-2024-2025 original latest.
Optimise Shopper Experiences with a Strong Data Estate.pdf
STERILIZATION AND DISINFECTION-1.ppthhhbx
[EN] Industrial Machine Downtime Prediction
IBA_Chapter_11_Slides_Final_Accessible.pptx
Database Infoormation System (DBIS).pptx
Computer network topology notes for revision
Mega Projects Data Mega Projects Data

Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)

  • 1. Simplifying Data Governance and Security with a Logical Data Fabric D E N O D O L U N C H & L E A R N
  • 2. SPEAKERS Elaine Chan Regional Vice President, ASEAN & Korea Chris Day Director, APAC Sales Engineering
  • 3. Agenda DENODO LUNCH AND LEARN ASEAN 1. Simplifying Data Governance and Security with a Logical Data Fabric 2. Product Demonstration 3. Q&A 4. Next Steps 5. Closing
  • 4. DENODO LUNCH AND LEARN ASEAN Simplifying Data Governance and Security with a Logical Data Fabric Elaine Chan Regional Vice President, ASEAN & Korea
  • 6. 6 How to Get More from Your Data in 2020, Jan 2020 A data fabric architecture is designed to stitch together historical and current data across multiple data silos to produce a uniform and unified business view of the data.”
  • 7. 7 Virtual Data Fabric Consumers Data Science Machine Learning Artificial Intelligence Mobile Applications Predictive Analytics Business Intelligence Relational NoSQL Unstructured Docs Cloud Sensors IoT Sources Unified Data Security Abstraction Layer Universal Access Self-Service Data Catalog
  • 9. 9 Unified Security Management § Data Virtualization offers an abstraction layer that decouples sources from consumer applications § Single Point for accessing all the information avoiding point-to-point connections to sources § As a single point of access, this is an ideal place to enforce security and can be defined in terms of the canonical model with a fine granularity
  • 10. 10 Virtual Data Fabric Consumers Data Science Machine Learning Artificial Intelligence Mobile Applications Predictive Analytics Business Intelligence Relational NoSQL Unstructured Docs Cloud Sensors IoT Sources Unified Data Data Masking Abstraction Layer Role based Authentication LDAP Active Directory Encrypted data In Cache Data Specific Permissions
  • 11. 11 Secure Data in Motion § Consumer to Denodo Platform (northbound): Communications between consumer applications and the Data Virtualization layer can be secured, typically using of SSL (TLS 1.2) § Denodo Platform to Sources (southbound): Specific security protocol depends on the source e.g. SSL (TLS 1.2), HTTPS, sFTP, …
  • 12. 12 Secure Data at Rest § Two locations with ‘data at rest’ § Cache database § Memory swap files § Cache database § Use native database encryption mechanism to secure data § Memory swap files § Use native OS encryption to encrypt files in swap directory
  • 13. 13 Pass-Through Credentials § Allows use of existing access permissions and rules in underlying data sources. § Access permissions and rules in data source filter results from query. § Data Virtualization layer permissions and rules imposed on results from data source. § Results filtered by both sets of access controls are returned to user.
  • 14. 14 Role-Base Data Privacy § Control what data is visible based on user role § Roles can be imported from AD and LDAP § Roles can be organized in hierarchies § More complex logic also possible
  • 15. 15 Row-level Restrictions § You can add restrictions to allow users to obtain only the rows that match a certain condition. Administrator can see all records User only see the data related to his location
  • 16. 16 Dynamic Data Masking § The Dynamic Data Masking (DDM) technique intercepts queries sent to the database and/or the database responses and applies some more or less sophisticated logic to protect sensitive information when it’s displayed for end- users in the application or BI tool. § For example, a credit card number might look like 1234 **** **** 5678 instead of the real value or an email address might be shown as jd****@denodo.com.
  • 17. 17 Virtual Data Fabric Relational NoSQL Unstructured Docs Cloud Sensors IoT Dynamic Data Masking Rules Authorized users can see the real data Other users can only see scrambled data
  • 18. 18 Auditing § Audit trail of all the queries and actions executed in the DV platform. § With this information it is possible to check at any time who has accessed which resources, what changes have been made or what queries have been executed.
  • 20. Problem Solution Results CASE STUDY 20 Consumer electronics insurance company achieves cloud modernization while securing customer data Asurion needed a next-generation data architecture that could enable the company to spin up additional infrastructure, services, and products in weeks instead of months. Asurion also faced strict restrictions on migrating data, and had to remain compliant with stringent governmental regulations hence needed to centralize companywide security management around a single point of control. Asurion leveraged on Denodo Platform to establish a hybrid data layer that abstracted data consumers from the complexities of access across on- premises and cloud sources while also providing better data integration for improved analytics. With Asurion’s stringent security requirements, they needed to keep the two types of sources physically separate, but logically connected, indefinitely. Asurion deployed a Denodo instance in both infrastructures, with a bridge between the two, which formed a hybrid data layer that establishes a single access point to the on-premises sources, in keeping with the company’s security requirements. With a hybrid data layer in place, Asurion is able to better discover and correlate data from disparate sources, and also engage in predictive analytics with data scattered across text, voice, streaming data, third-party data, and various other structured, unstructured, and telemetry based sources Most importantly, Asurion is able to gain this intelligence while satisfying customer and regulatory demands for highly strict security. Asurion is a consumer electronics insurance and warranty provider that serves more than 300 million consumers globally across 18 countries. With it’s global 19,000 employees Asurion generates around $6B in annual revenue.
  • 22. DENODO LUNCH AND LEARN ASEAN Key Takeaways
  • 23. KEY TAKEAWAYS Single Entry Point for Enforcing Security and Governance Policies Data on-premises and off, combined through the same governed virtual data fabric layer Single Source of Truth / Canonical Views Who is Doing / Accessing What, When and How Fewer copies of personal data. Lineage of copies is available.
  • 24. 24 Demo Presented by Chris Day, Director, APAC Sales Engineering
  • 26. 26 Get Started Today Try Denodo for a Test Drive with a 30- day free trial in the cloud marketplaces CHOICE Under your cloud account SUPPORT Community forum AND remote sales engineer OPPORTUNITY 30 minutes free consultation with Denodo Cloud specialist denodo.link/drive22
  • 27. Thanks! www.denodo.com info@denodo.com © Copyright Denodo Technologies. All rights reserved Unless otherwise specified, no part of this PDF file may be reproduced or utilized in any for or by any means, electronic or mechanical, including photocopying and microfilm, without prior the written authorization from Denodo Technologies.