(This is a multipart series about how to evaluate and select the right BI tool for you and your team. To see the entire outline of the series and a framework for how to evaluate a BI tool, see How to Select the Best BI Tool for You.)
Like shopping for a car or a new electronic device, there are likely a lot of features that the average Jane won’t need. We aim to cover the breadth of features that the top tools and analysts in the market are talking about.
It’s important to focus on what’s right for you and your use case. We recommend buyers be careful to not let features creep onto their “Want to have” or “Mission critical” lists when doing your research. It can be really easy to learn about a cool feature and then think about all the cool and creative ways you could use it. Curiosity and creativity is to be human.
Remember: You started shopping to fill a specific need. Keep that front and center as you research while getting educated on other cool features and how you may use them after your initial set of requirements are delivered.
Here are the top security features of BI tools to consider as part of your evaluation.
1. Annual Security Audit and Penetration Test
Does the vendor conduct an annual security audit and penetration test by an independent review company based on the standardized security testing guidelines like OWASP Testing Guide, etc. for product security testing?
2. Application Activity Tracking
The solution maintains a record of administrative and user actions and generates a report on such activities.
3. Authentication Protocols and Systems
The solution supports or integrates with authentication protocols and systems such as SAML, OpenID, Kerberos, LDAP, Active Directory, etc. to access existing corporate user directory.
4. Column Level Security
The system enables applying column-level security policies and defining which table columns are revealed to any given user, user groups, or user roles.
The solution provides encryption capabilities for stored data to ensure that data-at-rest is protected and in-transit information is secure.
6. Integrated Security
The solution supports importing and inheriting the security settings and specifications from an external security system.
7. Object-level Security
The system enables applying object-level security policies and defining which visualizations, reports, dashboards, worksheets, and other objects are revealed to any given user, user groups, or user roles.
8. Row-Level Security (RLS) and User Filtering
The system enables applying row-level security policies and defining which records are revealed to any given user, user groups, or user roles.
9. Single Sign-on and Trusted Authentication
The solution allows configuring SSO to provide automatic access to the users without prompting them to log in separately if they have already authenticated themselves into the corporate authentication system.
10. Source Code Control
The solution supports automated version control of configurations including user permissions, data modeling, dashboard and reporting creation, editing and viewing?
Follow the links above to read more about core functional requirements of a BI and analytics tool.
Did we miss something? Drop us a line and we’ll see about getting it added.
Need help with your BI tool selection? Book a call with us and we’ll see if we can help. If we can point you in the right direction with a short phone call, great! If you’d like to hire us to do an evaluation and selection for you, contact us and we’ll make a selection together.