-
Iceberg best practices – security and compliance
In this video, Apache Iceberg co-creator Daniel Weeks covers best practices for implementing security, data privacy and regulatory compliance when…
-
[WEBINAR] Tabular 101: How Tabular implements Iceberg best practices
In this webinar, Jason Reid, head of product at Tabular discusses how Tabular makes it easy to implement best practices…
-
Make Spark secure (RBAC)
This step-by-step demo will show you how to set up role-based access controls in Tabular to secure Spark access to…
-
Members and roles (RBAC)
This interactive demo will show you how to use members and roles in Tabular to secure data cross multiple compute…
-
Cascading privileges (RBAC)
This stepwise walkthrough shows you how to use cascading privileges to set up multiple tiers of roles for RBAC in…
-
Implementing RBAC best practices with Tabular
Your cloud data lake storage can be difficult to secure as we’ve previously discussed in our Securing the data lake blog series.…
-
Tabular Bits: Cascading Privileges
Tabular’s cascading privileges feature provides a roles hierarchy that simplifies changing user permissions against your databases. This video demonstrates…
-
Securing the Data Lake – Part III
Categories: OpinionThe growing need for a secure data lake We’re experiencing two powerful business trends that seem at odds with each…
-
Tabular Bits: Members and roles
This short video explains the member/role relationship within Tabular and shows you how to add and manage members and roles.
-
What are Tabular credentials?
Introduction Tabular provides a centralized layer of security for your Apache Iceberg tables with regard to how various compute engines…
-
Securing the Data Lake – Part II
Categories: OpinionMotivation Seemingly every day, more people across the business are using more data in more ways to deliver value. At…
-
Securing the Data Lake – Part I
Categories: OpinionMotivation Seemingly every day, more people across the business are using more data in more ways to deliver value. At…