Protecting PII and Customer Data

How to protect PII and keep customer data safe with Apono

Intro

PII protection is crucial. The two most common use cases for PII protection are:

  1. Your company needs to comply with HIIPA, SOC 2, PCI DSS, GDPR or other compliance standards and regulations that require safeguarding Personal Identifiable Information.
  2. To enable sales and client satisfaction, you need to put guardrails around customer data; they want to know access is highly restricted to their tenant and their data.

Apono is here help!

πŸ“˜

Read more about PII and why it's so important

How to protect PII with Apono

Apono specializes in protecting data. With Access Flows, you can control exactly who can access DBs with any permission (read, write, create, delete, duplicate, admin, and more):

  1. We support all common databases and keep adding more:
    Apono integration with MySQL, PostgreSQL, Elasticsearch, Redshift, RDS, Bigquery
  2. We help you manage access with full granularity and flexibility:

πŸ‘

Apono can automate access management for clusters and databases, but also for collections and schemas

How it works

  1. Integrate Apono with your data repository
  2. Apono will auto-discover clusters, databases, collections and schemas
  3. Create an Access Flow for the resource type you want to control
  4. Fully auditable with logs and reports out-of-the-box

How to secure customer data with Apono

Database access control is key to customer satisfaction - customers want to (and are required to) ensure least privilege to their data and their customers' data by their vendors.

This may include metadata, like users, resource names (like DBs, repositories, etc.), DaaS (data as a service) titles and paths, and also actual data, especially Personal Identifiable Information of customers and employees (names, IDs, addresses, emails, phone numbers, and any other personal attribute).

Apono handles the access workflow for each user who needs to access a customer environment, account, tenant or database, including approval, provisioning, secure access details, revocation and audit:

How it works

  1. Put your customers at ease with Apono's documentation and architecture. Contact us and we'll provide out-of-the-box, white-labeled documentation!
  2. Integrate Apono with your data repository
  3. Apono will auto-discover clusters, databases, collections and schemas
  4. Create an Access Flow for the resource type you want to control. Limit access using:
    1. Tags for customers' resources
    2. Specific environments or tenants
    3. Specific customer databases
  5. Users will be able to request access to perform any action (READ, WRITE, DELETE, ADMIN, etc.) on customer data

🚧

COMING SOON: Customers will approve sensitive access to their data. Contact us to learn more!