Native support for ACID transactions across multiple engines to avoid lost updates, dirty reads, stale reads and enforce application-specific integrity constraints.
Anonymize data based on row and column filtering.
1. Data ingest and data access
2. Infrastructure and platform
3. Data levels
Leverage your cloud provider’s IAM/AD/LDAP services to restrict particular user access to resources.