"We work with organizations that analyze many different kinds of data from many different sources, each of which is typically governed by its own access control or security policies." . . . .