https://store-images.s-microsoft.com/image/apps.63375.e3d92e27-9a3a-4412-94f0-d969b328a86e.649fc9d1-17a1-4c9b-9524-31bc8b43c397.b3b372ca-7381-4053-8d72-0dca4c0be592

RPS for Reporting Power BI data protection

seuraavan mukaan: REGDATA

Reporting Power BI data protection

Statically or dynamically protect confidential data exports from customer’s IS systems (DB or Files) to Microsoft Azure.

Dynamically unprotect confidential/sensitive data for customer’s authorized users only during reporting data processing by calling our RPS integration components & RPS Protection server. RPS integration components will dynamically capture and ask RPS Protection server to transform encrypted, tokenized and/or pseudonymized data at rest into a clear state. All data report accesses in clear by only authorized users via Power BI client and or Power BI Online will be logged.

Users

-Business analyst

-Business managers

Pain points solved

-Nonacceptable usability for Business analyst / managers for reporting in terms of reads, searches, filters involving data fields encrypted, tokenized or pseudonymized at rest.

-Business analysts, super users accessing confidential data in clear when they build complex reports. (Cross filters, …).

-Compliance with GDPR and Swiss regulations = evidence of purpose for access in clear to confidential data via protection & unprotection logs reports.

-Compliance with in country banking regulations related to Client Identifying Data: FINMA in Switzerland

Value proposition

-Segregation of duty between MS functional services (Power BI tool) & security/compliance services provided by a third party Trusted platform (RPS), fully managed by you

-Dynamic Data protection and unprotection covering all types of data processing - for authorized users only, according to purpose.

ROI
-2 Clicks to benefit from Audit evidences related to data used for reporting purposes while protected by RPS. It drastically shortens the time to gather information that all regulated data are effectively protected (during audit phases led by Internal Auditor, external Auditors and regulators).  

Unique Selling proposition

-Rich encryption, tokenization, pseudonymization libraries > 50 techniques
-Preserved usability for users: Read, search, filter, ...
-Preserved application performance: 0,15ms latency per field in average
-Scalability: All the protection configurations per field can be reused for multiple type of reports

Yhdellä silmäyksellä

https://store-images.s-microsoft.com/image/apps.1216.e3d92e27-9a3a-4412-94f0-d969b328a86e.649fc9d1-17a1-4c9b-9524-31bc8b43c397.c2a32137-1be9-4577-b995-502f87d71ecc
/staticstorage/5610156/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.1216.e3d92e27-9a3a-4412-94f0-d969b328a86e.649fc9d1-17a1-4c9b-9524-31bc8b43c397.c2a32137-1be9-4577-b995-502f87d71ecc
/staticstorage/5610156/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.64834.e3d92e27-9a3a-4412-94f0-d969b328a86e.649fc9d1-17a1-4c9b-9524-31bc8b43c397.848280b4-767b-4dd7-8859-0bb939f96b13
https://store-images.s-microsoft.com/image/apps.23993.e3d92e27-9a3a-4412-94f0-d969b328a86e.649fc9d1-17a1-4c9b-9524-31bc8b43c397.826f6078-f250-404b-b56d-f3a5a90593b2
https://store-images.s-microsoft.com/image/apps.15844.e3d92e27-9a3a-4412-94f0-d969b328a86e.649fc9d1-17a1-4c9b-9524-31bc8b43c397.94f5e0fc-d5ec-459c-8cf5-4cd10b209b4b