iceDQ is the only integrated platform for data testing, monitoring, and observability, offering vast capabilities to meet the most complex data reliability requirements.
Supported Data Source Authentications: User Authentication, Windows Authentication, Active Directory, Kerberos Keytab, Kerberos Ticket Cache, OAuth 2.0, AWS IAM, Azure Key Vault, and more.
Single Sign-On: Simplify logins and access with Single Sign-On (SSO) integration.
Integrated Key Vault: Ensures secure access and management of encryption keys for heightened data protection.
LDAP / Active Directory: Integrate seamlessly with LDAP and Active Directory for centralized user management and authentication.
End-to-End Encryption: Data is fully encrypted in transit and at rest, ensuring complete security and privacy.
Checksum Rule: Checksum rule is used to compare row count, sum, average, min/max, and other aggregated values.
Reconciliation Rule: Recon rule compares data between the source and target. Database vs database, database vs files, API vs database, BI reports vs database, and more.
Validation Rule: Validation rule allows users to test the formats, lengths, ranges, business logic, and other aspects of data in a specific dataset.
Pushdown Rule: Use this rule to offload data validation processing to the source database or system. This rule is typically used for duplicate checks and type II dimension tests.
Script Rule: Write custom groovy script to execute any pre-processing or post-processing tasks and achieve end-to-end testing.
Regression Suite: Use our workflows feature to run a collection of rules in a sequence for Regression Testing or Release Testing.
Macro Metrics: Focus on aggregated data such as freshness and volume metrics.
Micro Metrics: Focus on individual records in the data such as completeness and accuracy.
Segmented Metrics: Segmented metrics are simply macro metrics applied to specific data subgroups, like volume by country code.
Autometrics: The system offers built-in data profiling and automatic metric generation. This enables rapid scaling of observability.
Parameterization: Leverage parameters to define reusable rules that adapt to different environments and data sets.
User-Defined Functions: Extend iceDQ's capabilities by creating custom UDFs (User-Defined Functions) within the platform.
Rules Wizard: The Rules Wizard helps you create bulk rules in a flash.
Built-in Scheduler: Trigger rules and workflows based on a time-based schedule.
Alerts & Notifications: Receive timely alerts and notifications about data issues via email, Teams, or Slack.
User Role-based Controls: Assign roles with granular permissions to specific users.
Group-based Controls: Streamline user access control by creating groups and assigning roles at the group level.
External-Library Support: Users can import Java or custom libraries for use in advanced scripting rules.
Custom Tags & Label Support: Add custom labels and tags to rules, workflows, and checks for improved reporting, and easier identification of rule types.
Central Repository: Simplified management with a central repository for rules, setting and other critical configurations.
Audit History: Track every action with a detailed audit history.
Import-Export: Import or export rules, workflows and other configuration between environments.
Architecture: Based on microservices and follows an API-first approach.
Deployment: SaaS, On-premises, Cloud, more…
Query Builder: The intuitive query builder eliminates the need to write complex queries.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.