Specifications include, but are not limited to: Classification and discovery of sensitive data across relational database management systems (RBAC) and data warehouses including unstructured and semi structured formats such as SharePoint, and semi structured big data platforms. These capabilities much cover both on-premises and cloud-based services. Set, monitor and control privileges of unique user identities (including highly privileged users such as administrators and developers) with access to the data. Also, the ability to provide segregation of duties, whether based on role-based access control (RBAC) or attribute-based access control (ABAC) principles. Use behavior analytics techniques to monitor users when accessing data in real time, generate customizable security alerts, and block unacceptable user behavior. Create auditable reports of user access to data and security events with customizable details that can address defined regulations or standard audit process requirements. Prevent specific data access by individual users and administrators. This may also be achieved through encryption, tokenization, masking, redaction or blocking.