• Protect your databases. Share your sensitive data.

    Protect and share senstive data with dynamic data filtering and masking for relational databases, on-premise and in the cloud.

    Discover more +
Laptop sitting in front of a large screen with two code windows opened | Axiomatics

Secure senstive data at cell level

Data Access Filtering for Multiple Databases is a industry-leading solution for controlling run-time access to business critical data. Unrivalled dynamic filtering and masking capabilities ensure fine-grained data access controls are enforced  at cell level in line with business policies and regulations.

Laptop sitting in front of a large screen with two code windows opened | Axiomatics

Want to know how to protect data(bases) and enforce compliance?

Approved database access

Axiomatics authorization fabric for databases ensures that users have access to  the data they are authorized to and nothing else by filtering, masking or redacting sensitive data. Key benefits of using our dynamic solution include:

  • Single point of access control management for the database layer
  • Enforces authorization in a non-intrusive way; application changes are not required
  • Minimizes risk exposure for data in transit
  • Consistently enforces authorization across multiple channels/applications
  • Ensures policies and control rules are in place by users accessing and extracting source data
  • Masks/filters data at row, column and cell level
  • Simple integration with other Identity & Access Management (IAM) solution providers

How secure are your databases?

Meet one of our experts and we can assess your needs

How it works

Axiomatics´solution derives user permissions from the real-time evaluation of policies, and filters, masks or redacts data based on these policies. Policy-based authorization applied on the content of relational databases provides the required high visibility and control to achieve data security protection at source, within the data layer. This ensures that users only have access to what they are authorized to see.

Central policy management utilizes Attribute Based Access Control (ABAC). Once configured, authorization policies are consistently applied across all incoming connections to which they are applied, regardless of application end-point. A central policy can thus protect multiple databases from queries sent from multiple applications.

Key features of dynamic authorization for multiple databases

Policy authoring & editing

Multiple policy editors help meet the needs of policy lifecycle management in individual departments, and across different collaborative workflows. This supports efficient creation, editing and maintenance of both policies and their related attributes.

Data filtering & masking¨

Protects data down to cell level without hindering the effective and efficient sharing of sensitive data by filtering or masking data that users are not authorized to see or edit.

Simplified UI

An enhanced user interface ensures ease of management for individual users and APIs for SQL Filter Service configurations and changes. Automated reporting removes much of the manual auditing proceses.

SQL proxy

A central generic proxy protects multiple database types, such as Oracle, IBM DB2, Microsoft SQL Server, or Teradata. The proxy intercepts requests to all of these databases and queries the core engine for authorization of intercepted SQL statements.


Context aware

Thanks to the powerful Attribute Based Access Control capabilities, sensitive data can be filtered based on any available criteria including. location, date/time, device being used, citizenship, and more.

Our customers trust us to protect their critical assets in applications

Efficient enterprise-wide risk management and secure collaboration using ABAC

A major US automotive manufacturer was faced with a consolidation challenge for their authorization. As with many large enterprises, security authorization had historically been handled...

Cutting through export control with Bell helicopter and Axiomatics

In this webinar, together with guest speaker Greg Heartsfield from Bell Helicopter, we will focus on the complexity of export control and PLM systems and...

Financial Services
European bank achieves proactive data security, compliance with ABAC

Executive Summary The primary driver for this project was to achieve compliance with a Personal Data Protection Law and to prepare for future regulatory challenges....

Get in touch

Regulations are getting stricter and competitors are getting more aggressive. Don’t spend time on authorization, focus on your core activities and we will ensure data is secured and regulations are met.

Customer support

Do you have a question for an Axiomatics engineer? Our support team are ready to help you.