INTRODUCTION
Protegrity overview and general data security concepts; Introduction to Protegrity products; High level compliance & regulation requirements.
Core Platform
Protegrity data security architecture; Explanation of various methods of securing sensitive data: Separation of duties.
Protegrity Methodology
Provides steps involved in protecting sensitive data throughout the enterprise.
Enterprise Security Administrator (ESA)
Overview & demo of ESA & its role in the Protegrity Data Security Platform; ESA features & functions.
Decision on Data Protection Method
Overview of various methods of protection and what to consider when choosing between them.
Tokenization
Definition of Protegrity Vaultless Tokenization.
Data Security Policy Creation & Management
Definition of data security policy and related attributes (e.g. data stores, data elements, roles, etc.)
Protegrity Discover
Overview, installation & configuration of sensitive data discovery across enterprise.
Application Protector
Overview, installation & configuration of Application Protector including trusted applications setup; Steps to protect data using Protegrity APIs.
Database Protector
Overview, installation & configuration of database Protector; Steps to protect data using Protegrity UDFs.
Protegrity integration with Snowflake for Data Protection
How Protegrity products / Protector components can be integrated with Snowflake for Data Protection.
Key Management
Key management and its importance in securing sensitive data; Key rotation strategy.
Data Security Gateway (DSG)
Overview of Protegrity Data Security Gateway features and functions; Profiles, rules and protocols (e.g. REST API, SFTP, etc.)