The Dymium Platform provides real-time, transparent data governance that goes beyond typical access controls and eliminates the challenge of administering data governance policies.
The Dymium Platform:
Dymium Ghost Data Services respond to each user on demand in real-time including not just data access, but also data transformation. For example, Dymium defines Contextual Policy-based Data Transformations that secure data based on each user’s defined access privileges and how data should be presented to them such as masking or obfuscation of data. When each user accesses data, they see a view of the data that is specific to them.
The application of policies to transform data is done in real-time — no precalculation, temporary data stores, or caches to slow data access down or create duplicates. Tables and columns may be completely removed from a user's view, or the columns may be displayed but the data redacted, or one of many data obfuscation operations may be applied.
By integrating with IAM solutions, Dymium provides centralized policy administration which eliminates the spread of policies across multiple tools, ensuring consistent application of security and compliance policies.
Dymium provides a secure connection to provide access from those your pre-existing tools to the Dymium data services. End users can continue to use the tools they are familiar with, providing a familiar environment and maintaining their user experience.
Customers are always in control of who has access to, as well as where and how the Dymium Secure Client is deployed. Supported platforms include Windows, MacOS, and Linux.
Where the Dymium Secure Client handles requests originating from users and applications, the Dymium Secure Connector handles data access on servers. Dymium is purpose built for security and won't require new firewall ports. The connectors link your data to Dymium services without affecting your setup.
Whether you use Dymium as a service or manage it yourself, you're in charge of deploying the Connectors for your data sources. You can use Docker, a Linux binary, or a VM for each connector.
The security and privacy controls, as well as data management and manipulation capabilities that are part of the Dymium Platform, are deployed as middleware on infrastructure suitable to client needs — a long-winded way of saying that Dymium can be deployed as SaaS or on customer-controlled infrastructure (e.g., private cloud, on-prem, or hybrid).
©2024 Dymium. All rights reserved.