In and of itself, data doesn’t hold any special value. Instead, the insights drawn from data analytics uncover information and metadata about events, products and historical facts. And while that has added a lot of value in our analysis, occasionally that data contains confidential aspects such as personally identifiable information (PII data - social security numbers and mailing addresses), protected health information (PHI data - health history and medical allergies), and secure fiscal data. As data engineers, it is our ethical and legal responsibility to protect that information.
Database systems have evolved in the way they share information from traditional methods such as EDI and APIs to database views. Unlike ordinary RDBMS base tables, a view is a virtual table that is usually computed from the database when it is accessed. In general, sharing data via views provides an excellent route for creating dashboards, exporting datasets, integrating with ETL workflows and supporting several business cases. All these data sharing methods, however, lead to higher data accessibility, that could increase the chances of security breaches as the security needs to be set up not only at the database level, but also at the access level.
Snowflake not only supports view-based data sharing but has also revolutionized how organizations distribute and consume shared data. Unlike FTP and email, Snowflake Data Sharing is far easier to use as it provides instant access to live data and eliminates data copying. The Snowflake built for the cloud architecture enables data sharing without any complicated ETL and setup, and more importantly, allows you to control security at a single place - the data level.
The data sharing feature of Snowflake uses its cloud data warehouse and unique multi-cluster, shared data architecture to allow users to quickly setup and govern data shares within minutes to the data consumers, who can view and seamlessly combine it with their own data sources. The real-time secure sharing of data is ready as soon as a data provider adds or updates data for the end consumers.
There are some out-of-the box advantages to this approach such as:
Immediate access: No transformation, data movement, loading or reconstruction is required, and the data is available for immediate use.
Live data: Changes made in real-time by a data provider are immediately available to data consumers without effort, which ensures data remains current.
Secure managed access: A data provider can share all their data to N number of data consumers in a secure, governed manner with minimal effort. Flexibility of controlling all aspects of the managed access increases the ease of use.
No ETL management: Users do not need to manage any ETL for secure data sharing capabilities and operations.
Access Logs: Data providers can track and monitor access to data shares and quickly respond to the user’s actions.
Snowflake’s secure data sharing is an excellent candidate where data monetization, the elimination of data silos and the ease of data management are important criteria for business operations.
For example, take an energy utility company that wants to illustrate the importance of its CRM by demonstrating how to boost customer retention, growth and other steps to justify the cost of their software.
The company can target its top customers with self-reporting metrics/dashboard capabilities that are deployed via secure data sharing, allowing for real-time access to key metrics, as well as creating unique views to meet their customers’ needs.
Shared data exists independently and can be queried along with any other database within a Snowflake environment. Objects’ access is regulated through grants and only objects granted with access privileges are shared with other Snowflake users. No ETL is required to enable this and Snowflake offers both, a guided wizard and the ability to write SQL queries to establish data shares. The latter functionality allows you to automate the grants through a third-party system with SnowSQL, further reducing the time it takes to onboard a customer and ensuing that the grants follow best practices and security protocols.
These high-level steps establish a secure data share:
Create an empty share as a shell
Add privileges for associated objects
Confirm share contents to make any updates
Share the database objects in the share via data consumers
This straightforward process allows users to create secure Data Sharehouses using the power of Snowflake’s architecture. There is enough flexibility to share data with several organizations, sustain data concurrency and share views, tables, etc. without any ETL creation or management.
Snowflake Sharehouses provide a strong, enterprise grade workflow that enables users to spend less time to quickly and securely share their data with high flexibility and spend more time on tapping into powerful insights to uncover the hidden potential of their datasets.
For all your data footprint and migration conversations, you can reach out to us at [email protected].
Director of Analytics Practice
Kireet Kokala is a senior data technologist and high-performance leader in the Data and Analytics Practice at Trianz who helps clients with digital transformation and data monetization. The Data and Analytics Practice works with enterprises to achieve significant competitive advantage via modern cloud technologies, with a focus on the Snowflake Computing ecosystem.
Contact Us Today
Whether looking at a specific technology or business practices in general, when a company is stagnant, it is actually losing ground to the competition. That is why all companies, regardless of their current market position, are looking to constantly transform and improve. This is truer today than ever before thanks to the incredible pace of technological advancement.Explore
With the sweeping spread of COVID-19, enterprises have seen an unprecedented level of disruption to their daily operations. As governments struggle to contain the escalation of the virus, many countries have begun to enforce either nationwide lockdowns or strict curfews to minimize person-to-person contact via social distancing measures.Explore
Technology is an essential tool for every company today. Unfortunately, most companies take a reactive approach to manage their IT systems. When they find that they need something to accomplish a business goal, they purchase it and go from there. This lack of a digital strategy is the most expensive and least effective way to manage this critical department.Explore
How is the digital strategy for your business working? Is there a proactive strategy in place, or is your IT staff constantly scrambling to keep up with the demands of the company? If your IT department is not helping the other departments to operate on the cutting-edge, then you are missing out on the digital age. If you are looking to improve on the way things are done at your company, the first step is to get acquainted with the digital benchmarking process.Explore
Within organizations, there is often some level of conflict between the business side of things and IT. While both divisions want to do what is best for the organization, there is a sort of “language barrier” that can make this hard to accomplish. IT Service Management (ITSM) is an effort to effectively bring these two areas together so that they can work together to deliver the best possible service to end users.Explore
The COVID-19 pandemic has caused immeasurable damage to virtually every aspect of life around the world. Almost overnight, this virus has disrupted the way people live their lives: as individuals, consumers, employees, and enterprise leaders. For many people, one of the biggest adjustments has been moving from working in an office to working from home. The way people do businesses has also transitioned from in-person to online very rapidly.Explore