Looking for Data Security? Yurbi’s Multi-Level Security Model Has You Protected
At 5000fish, we’re passionate about delivering the highest level of security with Yurbi. In fact, it’s the biggest feature that sets us apart from our competition. Our philosophy is that if we’re going to make Yurbi easy for business users to use, we have to ensure that the data within Yurbi is absolutely secure.
This is why we use a multi-level security model to protect our customers’ data. This multi-level security has four different levels that work together so that Yurbi users can be confident that their data is fully protected.
Level 1: Access
The first level of Yurbi’s multi-level security works with users’ access permissions within each data source, which live in Yurbi Apps. The access permission to each Yurbi App determines whether and how a user can communicate with the Yurbi App.
Within Yurbi, we make it easy for administrators to grant or revoke access to each Yurbi App. Administrators can also adjust the level of access granted within the Yurbi App based upon user roles. These user roles include:
- Builders: Builder user access allows users to build reports and new queries from the data source.
- Agents: Agent access allows users to view information in the data source, but the user cannot build reports or query the database (but they can build their own dashboards from the reports they can view).
- Architects: Architect access allows users to manage the data source and Yurbi App, adding or deleting database elements and virtual formula fields.
- Admin: Admin access provides a user with “master” access where the user has access to everything (but they can be monitored by Level 4 below).
Yurbi’s user access security structure sets security measures at the individual user level, which ensures that the data users are able to see and how users are allowed to interact with the data is customized to the user’s data needs.
Level 2: Security Groups
The second level of Yurbi’s multi-level security works with security groups at the object level that determine which dashboards, folders, and reports a user can see within each data source/Yurbi App. Security groups set security standards about which objects different groups (e.g. sales, marketing, or finance) can view and manage based upon each group’s need.
For example, the security group settings for dashboards determine which groups can see a dashboard and which groups can edit a dashboard. The same idea applies to reports, determining which groups can view, modify, delete, or administrate reports.
Level 3: App Shield
The third level of security within Yurbi is App Shield. App Shield is a data-level security, which controls the specific data a user can see within a report or dashboard.
For example, two people from different departments may need to view the same report but need to view different data within the report. App Shield caters to and delivers only the data that is pertinent to the individual users.
Level 4: Audit and Data Governance
It’s nice to say that you have security, but it’s another thing to prove it. That’s where Yurbi’s fourth level of security of audits and data governance comes through. Yurbi has audit trackers built into the product that track the activity of each user, including logins and login failures, all aspects of reporting (e.g. building, modifying, deleting reports), and the exporting of data.
Not only does audit and data governance allow Yurbi admins to keep tabs on user behavior within the product, but it also aids in user adoption by showing admins both who is and who is not running reports. If specific users aren’t running reports, this may indicate they need more training or help with product adoption.
Another important feature of Yurbi audit and data governance is notifications. Notifications can be sent to assigned users so they are “in the know” when new users receive access to a Yurbi App connected to a data source they are responsible for.
Additional Security Measures
Security is a part of everything we do, which is why we take our security a step further and do security checks against a username every time a user logs in and every time a user attempts to perform a task within Yurbi. This means if a user is working within Yurbi and has his or her security access revoked, the user will not be able to perform another task within Yurbi even though the user is logged in.
Beyond our own security measures, we support SSL certificates that allow clients to share Yurbi outside their organization or via mobile devices through data encryption. We also support secure ODBC connections, which is the communication from the data source to Yurbi.
Another big security measure we take is to encrypt all usernames and passwords for clients’ data sources, and we will never unencrypt those usernames and passwords and display them in our interface. This isn’t especially convenient for our customers or us, but it’s an important key to ensuring our customers’ data is completely secure.
The Bottom Line
We take security very seriously and have engrained a high level of security within Yurbi. Among the four layers of security above, administrators are able to give users access to only the data they absolutely need and prevent unauthorized users from performing tasks within Yurbi.
Have additional questions about Yurbi’s multi-level security? Contact us or give us a call!
Learn more about the features of Yurbi and how they may optimize the way your organization leverages data. Check out our on-demand webinars.