Data Access Control Solution (DACS)
It is truly remarkable when not just one, but two long-term trends meet with a cutting-edge challenge and mutually reinforce each other.
- "Information centric security" means increased focus on the protection of critical data in addition to the networks, systems and applications.
- Decoupling the application from special functions, which in actual fact is a purging of the application, shifts the focus back to the essentials: the business functions which generate added value for the company.
- Furthermore, for the past few years, data protection against external as well as internal attacks has been a particularly explosive topic; no governance, risk & compliance requirements which do not include this point.
If this situation coincides with our experience and our long-term successful approach, then the time and the market are ripe for launching a product that follows the trends and addresses the data protection challenge at the same time.
Our solution for a fine-granular control of the data access expands and complements existing approaches such as Identity & Access Management (IAM). It does this revolutionarily in the sense of a truly new approach, and yet evolutionarily, by enabling it to be gradually implemented into the existing environments as needed.
Due to its unique features, the solution thereby generates sustainable and measurable benefits. As part of the application security, the product also addresses known deficiencies of modern JEE-applications, such as the lack of reference to the user identity when accessing the database.
A selection of "use cases" indicates the considerable potential of the product at every stage of the lifecycle of the supported application: BUILD, CHANGE & RUN!