Skip to content

Scale Access Control with ABAC policies

Watch a short demo from Okera's 2.1 release: define and manage fine-grained ABAC policies without any code.
Read More

Scaling Access Control for the Enterprise: The Power of ABAC

In this webinar, you will learn about the challenges with existing access control solutions, as well as our three building blocks for scaling access control.
Read More

A Practical Guide to Data Obfuscation

One thing I have learned working with Big Data, and Hadoop in particular, over the last thirteen years is that data is truly an important asset of any organization, no matter its size.
Read More

How to Secure Data Access at Scale for the Modern Analytics Platform

Watch this webinar to learn how the promise of “volume and variety” in the data lake turned into a problem, and the core capabilities needed to provide secure data access at scale.
Read More

Securing Data Access on the Modern Enterprise Analytics Platform

The modern enterprise data analytics platform is sophisticated, which means ensuring secure access to the data is complex.
Read More

Securing Amazon S3 Data Lakes

Download this whitepaper to learn best practices for securing your Amazon S3 data lake.
Read More

What Is Data Lake Security?

The main principle of data lake security is ensuring that users only have access to the data they need – only specific files, or specific data within a file – as defined by the company’s security and access policies for the data lake.
Read More

Securing Azure Data Lakes

Download this whitepaper to learn best practices for securing your Azure data lake.
Read More

Visualizing Tightly Controlled Data & Metadata Using Common BI Tools

Watch this webinar to learn how Okera can help visualize data and create custom reports about your data lake, and how to use certain datasets and detect the presence of sensitive data.
Read More

How to Control Access to Sensitive Data at Scale in Your Data Lake

Watch this webinar to learn how Okera can protect your sensitive data, including how to automate tagging of sensitive data and assign fine-grained security policies with obfuscation at scale.
Read More