ALTR offers customers the option to provide their own encryption keys for tokenization. This page explains how they can do it.
This page provides information about what Custom Masking and Extensibility Functions are, an explanation of how they function, how to use them, and example cases.
Learn more about how you can utilize ALTR’s API to observe, govern, and protect your data.
Learn more about how to protect sensitive data with ALTR’s tokenization API.
The Client Database Manager (CDM) serves as a bridge between ALTR and your databases, allowing you to choose which data to govern and protect through the ALTR platform. The following information will walk you through the process of installing it on a host machine.
TDS Proxy is a database proxy that communicates on TDS protocol, which is the protocol leveraged by SQL Server. This proxy sits between your application and database. learn how you can install ALTR's TDS Proxy.
Your ALTR Organization can be configured to send data usage and Anomaly Information to a client-owned AWS S3 bucket. Read this article to learn how to integrate important governance notifications from ALTR with your amazon S3.
Tableau allows the dashboard author to set an Initial SQL command for use on the data connection to the database. This enables ALTR to get user level information for each user/session that is querying the database. User level information can be observed in Analytics, detected in the query log, and applied to governance policy.
The following information will walk you through the process of installing our ODBC driver for applications on Windows only. If your application is Java-based on Windows or Linux, refer to JDBC Driver Installation.
The following information will walk you through the process of installing our JDBC driver for Java applications on any operating system. If your application is on Windows only, refer to ODBC Driver Installation.
Vaulted Tokenization is a scalable tokenization solution to bolster your organization’s data security and governance.
Row Access Policies enable you to control access to individual rows within a Snowflake table
Thresholds enable ALTR admins to set up rules to trigger notifications and block access to data when certain criteria are met.
Data management and the data classification report make it even easier to govern your sensitive data. This feature allows you to gain insights and control over your data.
Column Access Policies allow users to enforce fine-grained control over their columnar data. Easily specify which roles can access particular columns, and control access through the use of flexible masking policies.
Settings allow you to edit your privacy and security settings, manage API keys and administrators, as well as S3 bucketing settings.
Audit logs allow you to view detailed summaries of all queries performed on the databases added on the platform. Audit all policy violations to this data, and actions taken by all administrators.
Learn about our Data Consumption Heatmap to observe who is accessing what data. Drill-down to granularly view how your data is being accessed by your users.
Connecting Columns to ALTR let our platform know which data to govern!
How to ensure that ALTR can successfully communicate with your Snowflake Account
How to setup your 30 day consumption history to monitor queries.
Learn how to navigate ALTR and begin your journey towards complete control and protection of your data.
If your account was created on the ALTR website, view this guide to get set up with Snowflake. For all tiers of the product you can connect your Snowflake database directly from the ALTR console by using this connection method.
In this tutorial we will show you how to create governance policy by using Locks and Thresholds. You will also add data for governace.
In this guide you will learn how to connect additional data sources through Snowflake Partner Connect.
Successfully connecting a database to the ALTR platform is a crucial first step in your data governance journey.