Skip to main content

The Dymium Platform: A New Approach to Data Privacy and Security

What is the Dymium Platform?

The Dymium Platform is a secure access zone, where data security and compliance policies are dynamically applied to all data access requests, ensuring users only see what they are entitled to see.

Unlike other data platforms, Dymium doesn’t make copies of your data. Instead, Dymium applies data access policies in transit, eliminating both the security problems endemic with data duplication into data warehouses, data lakes and/or virtual warehouses and the data availability issues associated with complex (and often batch-oriented) data pipelines.

 

 

Zero Trust, Zero Friction, and Zero Delay.

How It Works

The Dymium Platform provides real-time, transparent data governance that goes beyond typical access controls and eliminates the challenge of administering data governance policies.  

The Dymium Platform: 

  • Integrates with your existing IAM infrastructure 
  • Addresses PII protection by applying governance policies in real-time
  • Redacts, masks, or replaces data with synthetic information as needed,
  • Identifies and classifies data elements based on their level of sensitivity
  • Recognizes data that should be protected based on compliance and regulation initiatives to protect PII, PCI, PHI, GDPR, etc.
  • Analyzes your data catalog and makes the right choices regarding what is seen, blocked, redacted or obfuscated.

 

Dymium_Platform

Dymium Ghost Data Services

Dymium Ghost Data Services respond to each user on demand in real-time including not just data access, but also data transformation. For example, Dymium defines Contextual Policy-based Data Transformations that secure data based on each user’s defined access privileges and how data should be presented to them such as masking or obfuscation of data. When each user accesses data, they see a view of the data that is specific to them.

 

Centralized Access Policies

The application of policies to transform data is done in real-time — no precalculation, temporary data stores, or caches to slow data access down or create duplicates. Tables and columns may be completely removed from a user's view, or the columns may be displayed but the data redacted, or one of many data obfuscation operations may be applied. 

By integrating with IAM solutions, Dymium provides centralized policy administration which eliminates the spread of policies across multiple tools, ensuring consistent application of security and compliance policies.

Dymium Deployment Architecture

Dymium Architecture
Dymium Client_1_75px (1)
DYMIUM SECURE CLIENT

Dymium provides a secure connection to provide access from those your pre-existing tools to the Dymium data services. End users can continue to use the tools they are familiar with, providing a familiar environment and maintaining their user experience.  

Customers are always in control of who has access to, as well as where and how the Dymium Secure Client is deployed. Supported platforms include Windows, MacOS, and Linux.

Dymium Connector_75px (1)
DYMIUM SECURE CONNECTOR

Where the Dymium Secure Client handles requests originating from users and applications, the Dymium Secure Connector handles data access on servers. Dymium is purpose built for security and won't require new firewall ports. The connectors link your data to Dymium services without affecting your setup.

Whether you use Dymium as a service or manage it yourself, you're in charge of deploying the Connectors for your data sources. You can use Docker, a Linux binary, or a VM for each connector.

Deployment_75px
DEPLOYMENT OPTIONS

The security and privacy controls, as well as data management and manipulation capabilities that are part of the Dymium Platform, are deployed as middleware on infrastructure suitable to client needs — a long-winded way of saying that Dymium can be deployed as SaaS or on customer-controlled infrastructure (e.g., private cloud, on-prem,  or hybrid).

Ready to Try the Dymium Platform?

Let us show you how the Dymium Platform turns data security and privacy from roadblocks to accelerators.