Secure Extension Gallery for Tableau
Section Title
Overview

Complete Security Control for Your Tableau Extensions

The Secure Extension Gallery eliminates data exfiltration risks while maintaining full functionality of trusted Tableau extensions.

  • Custom gallery of sandboxed Tableau extensions with trusted resource whitelisting
  • Sleek web user interface for seamless administration and management
  • Multiple authentication methods ensure secure access for all users

environment into a secure, controlled ecosystem where functionality meets enterprise-grade security.

Section CTA
Overview
Capabilities

Secure Extension Gallery Management

Our solution bridges the gap between Tableau’s sandboxed security and functional extension requirements. It enables you to maintain robust security protocols without sacrificing the powerful capabilities of trusted extensions.

Eliminate data exfiltration risks

Eliminate data exfiltration risks

Complete protection against unauthorized data transfer

Streamline extension management

Streamline extension management

Centralized administration through an intuitive web interface for all extension configurations

Whitelist trusted resources

Whitelist trusted resources

Granular control over external resource access, ensuring only approved connections

Configure authentication flexibly

Configure authentication flexibly

Multiple authentication methods, including Basic, AD and OAuth for seamless integration

Maintain full functionality

Maintain full functionality

Preserve all extension capabilities while operating in a secure, controlled environment

Section CTA
Services

Secure Extension Gallery Implementation Services

We provide end-to-end implementation and configuration services to establish your secure Tableau extension environment.

Gallery setup and configuration

Gallery setup and configuration

Complete installation and configuration of your secure extension gallery with custom branding options

Extension security assessment

Extension security assessment

Comprehensive evaluation of your existing extensions to determine security requirements and compatibility. Before adding any items to the Gallery, a thorough evaluation is conducted to assess security needs and ensure compatibility

Resource whitelisting configuration

Resource whitelisting configuration

Expert-level configuration of trusted external resources and security protocols for optimal performance

Authentication integration

Authentication integration

Seamless integration with your existing authentication systems, including active directory and custom solutions

Ongoing support and maintenance

Ongoing support and maintenance

Continuous monitoring, updates and technical support to ensure optimal security and performance. Optional technical support is available for software update integrations.

_ Cancel

Contact Us

Want more information? Let’s connect