Privacera Encryption Integrations¶
Privacera Encryption integrates with various data platforms and processing tools to enable secure and centralized encryption, masking, and tokenization workflows. This document provides a high-level overview of integration options, architectural patterns, and how Privacera Encryption Gateway (PEG) is leveraged across different environments.
Each connector (Databricks, Trino, StreamSets, etc.) has its own dedicated integration guide. Refer to those guides for specific installation and configuration instructions.
Integration Categories¶
Privacera Encryption supports the following types of integrations:
Plugin-Based Integrations¶
For data platforms for which Privacera provides plugin integrations, encryption and masking can be performed directly within the platform using UDFs or native connectors.
Below are some examples of supported platforms:
- Databricks Cluster
- Open Source and Starburst Trino
- Vertica
External Function Integrations¶
For data platforms which provide external function support, encryption and masking can be performed using UDFs or external functions. These integrations typically call out to the Privacera Encryption Gateway (PEG) for encryption and decryption operations.
Below are some examples of supported platforms:
- Snowflake
- Amazon Redshift
Data Pipeline Integrations¶
For data pipeline tools, Privacera provides built-in processors or custom scripts to enable encryption and masking operations. These integrations typically use native encryption where data is encrypted locally in the client or agent.
Below are some examples of supported platforms:
- Apache Spark
- StreamSets
File-Based Integrations¶
For file-based workflows, Privacera provides a File Encryption Utility (FEU) for encrypting and decrypting files. This utility supports binary and structured data formats (CSV, JSON) and can be used in various environments.
Discovery & DLP Integrations¶
In Privacera Discovery, policies can be configured to automatically apply encryption or masking based on classification, workflow, and compliance context.
- Prev topic: User and Roles
- Next topic: Data Validation