Skip to content

Privacera Encryption Integrations

Privacera Encryption integrates with various data platforms and processing tools to enable secure and centralized encryption, masking, and tokenization workflows. This document provides a high-level overview of integration options, architectural patterns, and how Privacera Encryption Gateway (PEG) is leveraged across different environments.

Each connector (Databricks, Trino, StreamSets, etc.) has its own dedicated integration guide. Refer to those guides for specific installation and configuration instructions.

Integration Categories

Privacera Encryption supports the following types of integrations:

Plugin-Based Integrations

For data platforms for which Privacera provides plugin integrations, encryption and masking can be performed directly within the platform using UDFs or native connectors.

Below are some examples of supported platforms:

  • Databricks Cluster
  • Open Source and Starburst Trino
  • Vertica

External Function Integrations

For data platforms which provide external function support, encryption and masking can be performed using UDFs or external functions. These integrations typically call out to the Privacera Encryption Gateway (PEG) for encryption and decryption operations.

Below are some examples of supported platforms:

  • Snowflake
  • Amazon Redshift

Data Pipeline Integrations

For data pipeline tools, Privacera provides built-in processors or custom scripts to enable encryption and masking operations. These integrations typically use native encryption where data is encrypted locally in the client or agent.

Below are some examples of supported platforms:

  • Apache Spark
  • StreamSets

File-Based Integrations

For file-based workflows, Privacera provides a File Encryption Utility (FEU) for encrypting and decrypting files. This utility supports binary and structured data formats (CSV, JSON) and can be used in various environments.

Discovery & DLP Integrations

In Privacera Discovery, policies can be configured to automatically apply encryption or masking based on classification, workflow, and compliance context.

Comments