-
Manage your Success Plans and Engagements, gain key insights into your implementation journey, and collaborate with your CSMsSuccessAccelerate your Purchase to Value by engaging with Informatica for Customer SuccessAll your Engagements at one place
-
A collaborative platform to connect and grow with like-minded Informaticans across the globeCommunitiesConnect and collaborate with Informatica experts and championsHave a question? Start a Discussion and get immediate answers you are looking forCustomer-organized groups that meet online and in-person. Join today to network, share ideas, and get tips on how to get the most out of Informatica
-
Troubleshooting documents, product guides, how to videos, best practices, and moreKnowledge CenterOne-stop self-service portal for solutions, FAQs, Whitepapers, How Tos, Videos, and moreVideo channel for step-by-step instructions to use our products, best practices, troubleshooting tips, and much moreInformation library of the latest product documentsBest practices and use cases from the Implementation team
-
Rich resources to help you leverage full capabilities of our productsLearnRole-based training programs for the best ROIGet certified on Informatica products. Free, Foundation, or ProfessionalFree and unlimited modules based on your expertise level and journeySelf-guided, intuitive experience platform for outcome-focused product capabilities and use cases
-
Library of content to help you leverage the best of Informatica productsResourcesMost popular webinars on product architecture, best practices, and moreProduct Availability Matrix statements of Informatica productsMonthly support newsletterInformatica Support Guide and Statements, Quick Start Guides, and Cloud Product Description ScheduleEnd of Life statements of Informatica productsMonitor the status of your Informatica services across regions
- Success Portal
- Learning Path
- Cloud Data Access Management
- Data Protection
Cloud Data Access Management
Unlock Cloud Data Securely and Seamlessly
Data protections use de-identification rules to safeguard data while preserving its consistency, reversibility, and usefulness. Sensitive data is now key to innovation and growth, requiring democratized access that balances security and usability. Organizations must move beyond traditional controls to enable agile, compliant, and data-driven decision-making.
Create data access control rules to grant read, write, or delete permissions on tables or views within a cloud data platform to specified user groups.
Data filter rules control access to specific rows or records. Data filter policies use these rules to manage and enforce row-level data access.
Learn how to develop a Data Filter Policy to enforce data protection by controlling access to specific data subsets.
Data Access Management uses a default de-identification technique when no applicable policies exist. Define data de-identification rules by setting conditions based on user, usage, or metadata, and assign data protections to data classes.
Note: Data protections must be created separately.