…

Intelek Smart Analytics

Data governance software

Data access control and historical record

Grant your users the necessary and sufficient permissions to access data, limiting unwanted access and thus complying with the strictest data protection conditions. In addition, you can consult updated reports on when and how your data has been accessed.

Data access privilege management

Transparently manage and understand the data access levels available to each professional in your organization.


Data-level security

  • Control access to data at the most granular level:

  • Specify the columns in a table that users can access.

  • Define read and modify permissions for each table.

  • Specify the rows in a table that you want users to have access to.

Table-level security

  • An access policy defines a set of privileges for a set of tables.

  • It may include read rights for some tables, modify rights for others, read rights but with row or column restrictions for some, etc.

System-level security

  • Easily manage the permissions you give to each user

  • Create as many roles as you want, defined as a set of data access policies.

  • Assign one or multiple roles to each user, thus granting access to the data in the tables belonging to each policy.

  • Roles allow you to control access to data at the database level.

GDPR Compliance

Within the scope of the GDPR there is sensitive information, the use of which must be highly identified and governed.

Access to information

Intelek Governance allows you to define access permissions to information, which require authorization to process the information.

In addition, authorizations to access confidential data may be permanent or temporary, with an expiration date, after which the data access permission will be automatically revoked.

Authorization request

  • Mark the variables in your corporate model that are confidential.

  • Create the types of data processing that are common in your organization.

  • When an administrator assigns or a user requests an access role to data that contains confidential variables, a reason and justification for accessing the data will be requested.

  • The users responsible for management will approve or reject the request.

Data access history

Any access to data generates a permanent record with detailed information on:

  • What data has been accessed

  • Which user has accessed it and the date and time of access

  • Information about the device and geolocation from which the access was made

  • For any of these accesses, if the data is confidential, it is possible to trace which authorized analytical treatments support this access.

Related content

Your data journey starts now!

We will be delighted to turn your business needs into data-driven growth opportunities.