Learn more about how you can utilize ALTR’s API observe govern and protect your data.
Learn more about how to protect sensitive data with ALTR’s tokenization API.
The Client Database Manager (CDM) serves as a bridge between ALTR and your databases, allowing you to choose which data to govern and protect through the ALTR platform. The following information will walk you through the process of installing it on a host machine.
TDS Proxy is a database proxy that communicates on TDS protocol, which is the protocol leveraged by SQL Server. This proxy sits between your application and database. learn how you can install ALTR's TDS Proxy.
Your ALTR Organization can be configured to send data usage and Anomaly Information to a client-owned AWS S3 bucket. Read this article to learn how to integrate important governance notifications from ALTR with your amazon S3.
Tableau allows the dashboard author to set an Initial SQL command for use on the data connection to the database. This enables ALTR to get user level information for each user/session that is querying the database. User level information can be observed in Analytics, detected in the query log, and applied to governance policy.
The following information will walk you through the process of installing our ODBC driver for applications on Windows only. If your application is Java-based on Windows or Linux, refer to JDBC Driver Installation.
The following information will walk you through the process of installing our JDBC driver for Java applications on any operating system. If your application is on Windows only, refer to ODBC Driver Installation.
Here you can view all admins in your org, and edit admin credentials and settings.
Settings allow you to edit your privacy and security settings, manage API keys and administrators, as well as S3 bucketing settings.
Preferences give you that ability to manage your password and 2FA settings, configure S3 bucketing, and manage and create API Keys.
Data Tags enable ALTR users to group similar data together to simplify actions such as defining governance policy.
Administrative actions taken within ALTR can be viewed in the System Audit Log.
The Query Log displays queries sent from connected applications. This includes what query was sent, when it was sent, and where it was sent from.
Thresholds allow you to set access limitations on groupings of users and data and responses if those limitations have been exceeded.
Audit logs allow you to view detailed summaries f all queries preformed on data added to ALTR, as well as audit all policy violations to data added to ALTR, and actions taken by all administrators within ALTR.
User Groups allow you to set role based policy on data. Explore how ALTR allows you to add user level governance to the data source of your choice.
Applications added to ALTR correspond to a single instance of an application driver or API. Entrprise and Enterprise plus users have the ability to connect applications for governance in addition to databases.
Locks allow you to restrict access to data and choose user groups to retain access to certain groupings of data. They also allow you to create masking policies on groupings of data.
ALTR’s advanced security policy engines allow you to limit and restrict access to data, as well as respond to credentialed access threats. Understand how our policy builder makes this a reality.
Data Consumption Heatmap allows you to observe who is accessing what data and how frequently. Drill down to granularly view how your data is being accessed and how your users are accessing data.
Once a data source has been connected to ALTR, the doors are wide open to discover, govern, and manage the data in the ALTR platform. Explore how ALTR allows you to gain insight and control over your data.
ALTR provides a variety of options for connecting your data sources. Understand how data sources are connected and determine which data source connection method is right for you.
This guide contains information on how to set up your ALTR account, and log in for the first time.
Learn how to navigate ALTR and begin your journey towards complete control and protection of your data.
This tutorial will show you how to identify irregular data access, and respond by tokenizing data, or refining data access through observing and resolving anomalies.
If your account was created on the ALTR website, view this guide to get set up with Snowflake. For all tiers of the product you can connect your Snowflake database directly from the ALTR console by using this connection method.
Understand how user groups are automatically generated from Snowflake, and how you can create your own user groups for any cloud data warehouse.
This tutorial will show you how to set access limits and response policy to irregular data access by utilizing Thresholds
This tutorial will show you how to create Masking Policy, and restrict row level, and column level access by utilizing ALTR’s unique Locks feature.
In this tutorial we will show you how to create governance policy by using Locks and Thresholds. ALTR provides an advanced set of security policy builders that allow you to dynamically mask data, restrict data access, rate limit data consumption, create response policy when irregular access is detected, and more.
Learn how utilize ALTR's classification report to gain insights into your data sensitivity, and govern data from your already connected data sources.
Connecting with Snowflake Partner Connect is the simplest way for Free Tier ALTR users to begin using ALTR. This connection method utilized the Snowflake Partner Connect feature found in the Snowflake workbook. Read this guide to learn how you can connect with Snowflake Partner Connect.
Successfully connecting ALTR to your data source is a crucial first step in your journey with ALTR.