Partner Blueprints

Snowflake
Implementing Snowflake Column-Level Security for PII & PHI

As sensitive data, like personally identifiable information (PII) and protected health information (PHI), becomes...

Snowflake
How to Scale Cross-Organization Snowflake Data Sharing

In this blog, you’ll learn about: Snowflake data shares Considerations and complexities that can...

Alation
How to Implement Immuta Within Alation

Immuta is the modern data security platform that gives you the power to leverage...

Redshift
Enforcing Redshift Attribute-Based Access Control

Organizations are increasingly adopting data lakehouse architectures to reap the benefits of added flexibility,...

Databricks
How to Enforce Policy-As-Code for Databricks Tables

Data security is the responsibility of everyone in the organization. From ETL developers to...

Databricks
How to Enforce Databricks Row-Level Security & Cell-Level Security

Implementing row- and cell-level security by hand can be a pain, whether that means...

Azure
How to Implement Azure Data Access Control for Lakehouse Architectures

The adoption of the Data Lakehouse architecture is soaring across various industries, as the...

Databricks
How to Implement Databricks Data Masking Across Platforms

As cloud data platform adoption accelerates and organizations become more reliant on data, teams...

Databricks
How to Anonymize Data with Databricks Access Control

Organizations with large workforces are increasingly analyzing employee data using cloud data platforms such...

Snowflake
How to Manage Snowflake Fine-Grained Access Control

If Disney World were a database, we would rave about its access control strategy....

Snowflake
How to Implement Snowflake Data Masking Across Platforms

As cloud data platform adoption accelerates and organizations become more reliant on data, teams...

Snowflake
How to Implement Row-Level Security in Snowflake

Segmenting data by geographies is a common requirement for row access policies in Snowflake....

Snowflake
How To Enable Snowflake Attribute-Based Access Control

Cloud data platforms such as Snowflake provide native security and data access controls engineered for platform-specific administrators to...

Snowflake
Enforce Compliance & Audit Reports for Data Sharing in Snowflake

Data use agreements (DUAs) are vital to ensuring individuals’ data is used compliantly and...