Access Control
Manage your security policies without changing your data model, to meet security & compliance requirements easily. Satori’s security policies are applied universally to all your databases, data warehouses, and data lakes.

You can assign names to security policies, and apply several policies at once.
Your policies can be applied on one or more datasets, or even only for specific users or roles.
When setting or updating policies, you can view statistics about their use.

You can assign names to security policies, and apply several policies at once.
Your policies can be applied on one or more datasets, or even only for specific users or roles.
When setting or updating policies, you can view statistics about their use.
Dynamic Data Masking
With Satori you can apply dynamic masking on thousands of tables in minutes. Masking policies can be based on data types and identities, not specific locations. This eliminates spending on maintenance and ensures the masking of newly discovered sensitive data.
Your masking policies can be RBAC, as well as tailored for specific users, and are universal across databases, data warehouses, and data lakes.
Blog:
Blog:


Row-Level Security
Often, users should only be able to access partial data from data tables, according to specific conditions. For example, each user should only be able to view customer data for their region.
Satori’s row-level security works across all of your data stores and is easy to configure without writing any code. It supports a multitude of row-level security and entitlement scenarios to ensure access control is easily applied.
Blog:
ABAC: Attribute-Based Access Control
Attribute-based access control allows you to set policies on attributes that can be based on user identity, connecting tool, and more.
Satori allows data owners to implement ABAC regardless of the data store technology and its native capabilities. It allows data owners the ability to apply security policies such as restricting access to sensitive data from certain locations or locking in users to specific BI tools.
