We help companies with sensitive data share their data securely, confidently and consistently. Our infoSecur software tool grants appropriate access internally with employees and externally with partners, customers and vendors.
Data is an Asset
Share it Widely. Protect it Fiercely.
infoSecur provides a low-code approach to apply policies that govern who receives what data. Share only the appropriate data to people, partners, and third parties through reports, apps, dashboards, and even direct queries.
infoSecur is easy to implement, technology agnostic and requires minimal data skills to use (SQL only). No new technology is needed to adopt infoSecur. It works with any BI tool but doesn’t require a BI expert to provision and share data.
Traditional set-based data provisioning often leads to data delivery bottlenecks, limited data accessibility and heavier IT resource and management needs. With infoVia’s policy-based data provisioning tool, teams can quickly and widely deliver business intelligence while ensuring sensitive data remains in the hands of only those whose roles require it.
Protect Your Data
Security at the cell level makes infoSecur the best product to protect your data.
Technology Agnostic
Works with any relational database on cloud, on-premises, or hybrid.
Scalable
Layer of security for future growth to near-infinite users.
Simplify Provisioning
Easy to use interface for administering user management and provisioning.
Easy to Implement
Works within your current architecture and without downstream impacts.
Optimized
Optimized to transfer the heavy lifting appropriately to the database .
Deliver Access
Users gain the access they need to utilize your data and provide solutions.
Instant Data Provisioning
Grant access to users with any level of permissions and roles.
Future Proof
Configurable compliance with expanding data protection and de-identification laws (e.g., HIPAA, FERPA, GDPR, CaCPA)
“infoSecur is the best and simplest data security framework I have seen.”
You have questions. We’ve got answers.
Why is infoSecur special?
No other solution is as lightweight and performant. It uses the capabilities of the technology your organization already has. It is easy to implement, learn, and reasonable to manage.
There is no other layer or point in your data environment where you can achieve optimum reuse and consistency.
High productivity and low risk… You can have both!
What does infoSecur require?
A curious and inquisitive team culture with management support.
A relational database or similar technology that supports views and joins.
Trusted identity of the end user at the data layer.
What's the best time to implement infoSecur?
Starting early is best because you can architect the solution into your entire architecture: data model, database layer, software layer, reporting tools, etc.
We’ve already implemented our data warehouse. Is it too late?
No, infoSecur can be added on to most any data platform. Depending on your data model, there may be some amount of re-engineering and re-modeling, but usually that is minimal.
Why not just secure my tables themselves?
First, there are too many of them. Second, requirements change and you need to react to change easily. Third, when you combine users, their roles, and the data, the permutations of security requirements grow exponentially and become unmanageable.
Can’t I just use filtering at the client or in the reporting tool?
You could, but that is not consistent. You are trusting that a team or teams of developers, reporting analysts, and users all implement the security rules in the same way and understand them sufficiently to be consistent and thorough. That is a dangerous assumption.
I provision data files for my users and it works. Why change?
First, it’s risky and untrustworthy. If humans are involved in building those data files, mistakes will be made and data will be inadvertently leaked. It’s just a matter of time.
Second, it’s not scalable. You would hope your data becomes more valuable and demands increase over time. As that progresses, the requirements become complex and the number of data sets (files) grows and the risk grows exponentially with each copy of data you make.
Third, it wastes everyone’s time – both inside your organization and for your customers/users/partners.
How does infoSecur perform?
Since it leverages the database technologies, which today are highly capable of query optimization, it seldom adds noticeable overhead. At worst, the overhead increase is usually within 5% linearly. Often the query performance actually improves because of the optimization inherent in the methodology.
Does it work with all data models?
Data Vault, Dimensional/Star-Schema, and 3rd Normal Form (3NF) are all optimal. Other models like tabular, graph, etc. can be made to accommodate, as can hyper-normalized models like Anchor or Focal.
Can I implement infoSecur in my analytic “cube”?
Yes
Can it extend to my source systems or transactional databases?
Typically Yes
What Industries can it protect?
- Health Care HIPAA, Patient Privacy
- Global Manufacturing
- Insurance
- Education
- Government
- Services
- Hi Tech
- Trade Secrets
- Contractual Obligations
- FERPA, Student Privacy
- Information Classification
- Multi-Tenancy Client Protection
- Intellectual Property Non-Disclosure
What skills are required to set it up?
After initial setup, your DBA can completely back away. Developers with basic SQL skills can implement incremental enhancements with ease based on infoSecur’s patterns. Users need no new skills at all. Its strength is in its simplicity.
How many people need to manage it?
After a few days of initial setup and training, 1-3 analysts can easily manage policies for an entire data environment to be shared with even tens of thousands of diverse users. It is usually a part-time job.
Ready to Start?
In under two weeks, you can implement infoSecur to better protect your data, simplify IT data provisioning and user management, and deliver more to your organization – all while learning industry-leading practices and implementation techniques. Curious about how we deliver results?Watch the Demo
Watch our 12 min demo on the right.View the Ebook
Download the infoSecur ebookAdvisors
Get Started
Recap of Snowflake Summit: Key Themes and Highlights
The recent Snowflake Summit was a hub of innovative ideas and groundbreaking tools, showcasing how businesses can not only collect data but also derive significant value from it. Here are some of the major themes and highlights from the event: Beyond Data...
Recap of the Worldwide Data Vault Consortium (WWDVC) Conference 2024
The Worldwide Data Vault Consortium (WWDVC) conference this year was a remarkable gathering, filled with insightful discussions, innovative presentations, and a strong emphasis on the role of AI in data management. Here are the key takeaways from the event: AI and...
Legos for Data Management
To meet the insatiable demand for data and analytic solutions, teams must innovate to become faster, clean, lean, and consistent in their data management practices. Looking for patterns to modularize the components of a data pipeline and creating a consumable...
A Review of 2023 Meets an Exciting Outlook for 2024
We couldn't be more excited about 2024, but before we move forward let’s look back at all our accomplishments. This year, infoVia announced incredible growth, a new access control pricing model, growing leadership, and a new advisory board as well as new customers and...
Liberate Your Data, Don’t Isolate It!
In times of uncertainty, tendencies are to isolate and restrict access. This goes for our personal lives and applies to our organizations... especially when sensitive information is in play. However, maybe we should consider a radical, alternative approach. Realizing...
September Snow Day: Knowing When to Pivot
Knowing when to hold and when to fold is a crucial skill, not only in life's adventures but also in preparing your business for better data-driven insights using data warehouse and advanced analytics like artificial intelligence. Let me share a personal experience...
Lead, Follow, or Get out of the Way – Navigating the Complexities of Decision-Making with Advisors
It’s a quote originally attributed to Thomas Paine and famously leveraged by General George Patton and Media Tycoon Ted Turner. It sounds easy, but having the confidence to lead requires applied knowledge and experience. Lacking those, it may be wiser to follow...
The Great Data Adventure- When Failure is not an Option
Embarking on the Great Data Adventure is akin to undertaking risky wilderness pursuits like rafting the River of No Return Wilderness or climbing Mt. Borah. Earlier this month, I checked off two items on my personal bucket list with friends. We rafted the River of...
First Zebra Syndrome: How Smart Businesses Avoid Being ‘Lunch’ in Data Projects
In business, where time and resources are precious, it is often beneficial to learn from others' experiences rather than taking on the risks of being a trailblazer. My boss at Micron once shared a piece of wisdom that stuck with me: “Let’s not be the first zebra in...
Are You a Data Superstar? How to Craft Hit Data Products
Recently, I had the chance to attend a concert featuring Steve Miller, Journey, and Def Leppard—three iconic bands that delivered five solid hours of non-stop hits. Thousands of us screamed the lyrics at insane decibel levels, creating an unforgettable experience. ...
Why infoVia Commits to Remaining Agnostic -The infoVia Way!
Our dedication to client success is unwavering, and it's no secret that we prioritize our clients' needs above all. Our commitment to staying technology-agnostic ensures that our clients come first—not tech vendors. As we approach infoVia’s seventh anniversary, I...
Unveiling the Challenges IT Professionals Face Without Access Control
In today's digital age, IT professionals play a crucial role in managing and securing the vast amount of data within organizations. However, without proper access control measures in place, they encounter a myriad of challenges that can hinder productivity, compromise...
Automatic backing up repository by using batch file
This document explains the complete RED command line example code to automate the backing up repository by using the window batch script. Use the scheduler to back up the 3d repository daily, weekly, monthly or by request. Automatic backing up repository by...
WhereScape 3D DV deployment in Red Repository
This document explains the complete command line example code to automate the wherescape 3d XML mode deployment to red repository through the scheduler by using the batch script. (If you know what this means, congratulations! 🙂 Wherescape 3d DV Model Automation...
When “IT” doesn’t come naturally
I participated in the Society’s Process Consulting Training course at just the right moment. My professional life, previously so successful and smooth-flowing, hit an unexpected bump when my decades-long employment came to an end. Undeterred, I started my own company...
WhereScape Release 2022 New Features
Wherescape December “DevOps” release , this includes new Metadata Ingestion, Model Test Automation workflows, Merge and Compare options, and Performance tweaks PLUS the official launch of Where scape Enablement Packs along with new File Parser...
All you need is Love… and Automation
It’s Valentine’s Day! At the risk of being corny, we’re going to write about love. Which is harder to find? A lifelong relationship or a fantastic data engineer. There are so many opportunities to transform data into practical decision-making in 2022. As such,...
Know what’s Cooler than Magic?
Spoiler Alert: Well, just a one-liner rather; not a plot spoiler at all. So read on without fear… 🙂 Our family took in the new Spider-Man movie this week. A good flick it was, we all agreed. It includes one of my new favorite movie...
Unwrapping WhereScape Red
Part of what makes WhereScape Red such a powerful tool is how it treats metadata. The metadata is used to drive every component of WhereScape Red's GUI and often that is sufficient for business needs. However!Moving beyond the GUI and opening up the WhereScape Red...
High Water Mark Loads
High-Water Mark Loading is a way to optimize your load strategy. Some data sources will have a column such as "update" or "effective" which can be relied on to track when data in the table has been inserted or changed. It is possible to track the latest entry (aka...
Part 3: What is Information – Implications
We want to thank Certus for their guest blog. Part 3 in a 3-part series on revisiting the definition of Information. In this third blog post in a three-part series, we’re exploring the implications of both the definition of information and the...
Part 2: What is Information – Laws of Nature
We want to thank Certus for their guest blog. Part 2 in a 3-part series on revisiting the definition of Information. In this second blog post in a three-part series, we’re exploring the connection between Laws of Nature and...
What is Information? – A Much Needed Revisit
We want to thank Certus for their guest blog. Part 1 in a 3-part series on the Laws of Nature for Information. Every so often it is useful to stop and re-examine our previous ideas and understanding. When we considered some of the challenges faced by the Information...
Using Business Key Collision Codes (BKCC) in WhereScape 3D
infoVia is happy to announce a Business Key Collision Code (BKCC) solution for WhereScape 3D! This is a lightweight change that expands 3Ds automation capabilities to integrate the BKCC column in Data Vault models, enabling greater control of how your vault integrates...
Automated Record Tracking Satellites
A crucial component of any Data Vault is making sure there is a way to identify when data is no longer current. For data sources without a form of inbuilt change tracking, Record Tracking Satellites are going to be required. A Record Tracking Satellite compares...
Let’s partner together to create a robust data foundation for successful data-driven transformations.