Immuta provides Azure Synapse customers with advanced security, access-control, auditing and privacy management. Data-driven organizations that have moved to Azure Synapse can now add Immuta to easily store, analyze and share even the most sensitive data sets.
Apply dynamic row-level security, column-level security and cell-level protection.
Subscription-based Azure Synapse data catalog with always-on security and access control.
Discover and protect sensitive data for use.
Automated Access Control
Controlling access to data within Azure Synapse can be complex, requiring DDL operations to grant access to specific columns for hundreds of roles, or writing functions for row-level filtering on a table to define data access. With Immuta, you can streamline access control by automatically governing who can see and use what data. Data engineers use Immuta to create modern, fine-grained access control policies — across all data. When users query data from Azure Synapse, Immuta policies are dynamically enforced to simplify role management.
Active Data Catalog for Azure Synapse
While the market is filled with offerings that claim to provide a unified data catalog, most do not enable true self-service, subscription-based access to live data due to the inherent security risks. Immuta’s active data catalog provides always-on policy enforcement that is explainable in plain English for full transparency. As a result, analysts can use Immuta to search, explore, understand policies and subscribe to Azure Synapse data sources. Because Immuta dynamically enforces access control policies on each Azure Synapse query, data engineering teams can confidently provide a live Azure Synapse data catalog without worrying about security or privacy risks.
Dynamic Data Masking
Data engineers must ensure analytics data and data use are compliant with complex, growing sets of regulatory and business rules. Immuta and Azure Synapse provide a dynamic approach to sensitive data classification, discovery and de-identification using advanced math-based data masking, randomization and anonymization techniques that are fully auditable. Policies can be enforced based on geography, time duration, user attributes such as clearance level and more, without copying data or managing hundreds of roles.