Redash is an extremely popular open source BI tool that does a great job democratizing data access to your teams. Like other BI tools, it links to your databases and lets you query data and build visualizations. The problem is securing that data – without Nullafi, all that data is displayed as plain text for anyone, regardless of how it’s protected in the database.
Look, BI tools are great, and extremely important. The problem is that their entire purpose is to provide people with powerful data. The faster and more easily they can do that, the better. Redash is a very powerful tool, but it focuses exclusively on giving access, not controlling that access. Anyone can see anything, anytime, anywhere. That’s a recipe for disaster.
More explicitly, the data security problems in Redash are that controls are:
They simply don’t exist in Redash. Redash is public and open about their approach, which is to delegate permissions to the databases linked to them. This gives rise to many issues.
If you delegate permissions to the database, it becomes extraordinarily hard to operationalize scalable and automated role based permissions as more, and different, data is stored, teams are changed, etc.
Application silos mean even if you can set some rules in a database linked to Redash, you will duplicate the same work countless times to apply a single rule to multiple applications with different configurations.
All you have to do is select a role and click what sensitive data they can or can’t see in the queries and visualizations they create in Redash. You can even hide certain elements of certain fields, leaving the rest. It’s literally that simple. All controlled from a single interface, no developer knowledge is needed.
Whether your Redash is Public Cloud, Private Cloud, or On-Premise, we give you transparency into what users are doing what in your Redash instance. Do you currently know if people are looking at data versus downloading it? It’s a significant difference. An automatic uneditable activity log down to the millisecond ensures nothing is ever done without you knowing.
Turns out a role needs access to a data point in Redash you thought they didn’t? Someone wants to temporarily verify PII? No problem, you can pause, edit, or delete a rule anytime you want, and resume it just as easily. Easy-click on and off lets you give an exception for minutes, or seconds.
Nullafi was built from the ground-up to be different, following a user-forward approach to security. Everything from how easy it is to set up to how little you need to trust us with data is carefully constructed to put you at ease.
You can see the technology obfuscating data in real time within your selected applications. No need to invest in promises that take months to validate.
The whole point of Nullafi’s technology is to not trust any person or tool more than necessary. Our obfuscation is done “just in time,” and we don’t store any of your data.
We bring the ease of use expected of B2C products to data security. We’re stress-free at every step, though of course we hope you stay with us.