Velotix has announced the release of a three-tiered architecture for its security platform that enables enterprises to transition towards fully automated data access. By beginning with data discovery and auto-tagging, and then evolving towards AI powered data access and automatic policy generation, Velotix is providing modules that match an enterprise’s stage on their data governance journey. The phased approach enables companies to experience the benefits of automation faster and control compliant access to data with minimal risk.
The Velotix data security platform currently includes the following modules:
- Data Discovery & Auto-Tagging – Many organizations have their data spread across databases, data warehouses and data lakes, in different regions, which makes keeping an up-to-date inventory of data and permissions extremely challenging. The data discovery module auto-tags data and metadata imported from existing databases to create a single repository for accessing information and granting and revoking permissions. Data classification algorithms are continuously applied to detect sensitive data and build a continuously updated data inventory.
- Access Management Powered by AI – Provides the ability to automatically build fine-grained policies at the attribute level for individuals, groups, and users to replace the role-based access method which requires manual input, a great deal of maintenance, and can be prone to human error. AI is leveraged to automatically identify conflicting authorizations and recommend solutions.
- Policy Database Management – Enables organizations to build and maintain their data protection policies. The dynamic workflow builder and AI-driven policy engine aggregates data catalogs and re-adjusts policies using machine learning to create the right data policy, and maintain it. The policy catalog understands the intricacies of data privacy regulations such as GDPR, HIPAA, and CCPA, to develop optimal authorization strategies.
The Velotix integrated platform provides a single dashboard to manage data discovery and classification, data activity monitoring, data risk analytics, threat detection, data access control, and data masking, plus instant audit and compliance reporting.