Security & Compliance

Data science is where the potential for innovation and digital transformation is the greatest. It is also the activity that requires access to the largest amount of sensitive information in an organization.

As a consequence, data processes fall under the most stringent compliance and security requirements.

By bringing the state-of-the-art of data security technology to data science and embracing the zero-trust mindset, Sarus finally empowers organizations to reap the full value of their data.
security & compliance

Anonymization?

Absolute anonymization is impossible. Pseudonymization and data masking are merely imperfect proxies that come at the cost of altering data utility and accepting residual risk of re-identification.

With Sarus, there is no need to try to "anonymize" datasets as they will never be accessed. Data consumers only retrieve statistical aggregates derived from them. To further strengthen protection, Sarus uses Differential Privacy to make re-identification from aggregates impossible (read more here).

The delineation between user-level data (sitting behind Sarus) and anonymous outputs is clear: only anonymous information can be retrieved with Sarus.
security & compliance

Regulatory treatment

If each personal data processing is different, some principles are universal like using the highest standard of protection for all individuals. In some cases, the lawfulness of a processing depends directly on how much personal data has been protected.

For instance, when processing is necessary for purposes of the legitimate interest, you are taking on extra responsibility for considering and protecting people’s rights and freedoms.

Having a mathematical guarantee against re-identification risk is highly valuable.
security & compliance

Zero-Trust Mindset

Sarus by default embraces the mindset of zero-trust between data consumers and data owners.

Data consumers are granted the ability to query data but never to access it. They don't need to be trusted with access to the source database, which may be lost, compromised, or misused.

Privilege minimization finally applies to all data interactions.This default behavior can of course be relaxed for trusted users.

Ready?

Ready to unlock the value of your data? We can set you up in no time.
main.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17

Shell

Subscribe to our newsletter

You're on the list! Thank you for signing up.
Oops! Something went wrong while submitting the form.
32, rue Alexandre Dumas
75011 Paris — France
Resources
Blog
©2023 Sarus Technologies.
All rights reserved.