- Database Encryption
-
Application Level Encryption 3 min
-
DBMS Level Encryption 3 min
-
Column Masking 3 min
- Database Object Access
-
Authorize Access - GRANT 2 min
-
Authorize Access - REVOKE 1 min
Avalanche Cloud Data Platform Architect: Data Access Security
Data security is of utmost importance to organizations. The Actian Avalanche Platform offers native data security for implementation in accordance with your company's needs. From the restricted access to table data, data masking and encryption of data at rest.
At the end of this course you will:
|
You will understand how to secure access to your Avalanche Warehouse via table permissions and encrypt data at rest.
|
Course Style:
|
The course is provided in a step-by-step fashion to ensure you understand the process to implement data security for Actian Avalanche Platform.
|
Audience:
|
For architects who have a responsibility for designing solutions using the Actian Avalanche Platform.
|
Prerequisites:
|
|
Resource Links:
|
Software Download: https://esd.actian.com/
Actian Community: https://communities.actian.com
Documentation: https://docs.actian.com/
|