Comprehensive Security

Deliver comprehensive security for cloud and on-premises deployments without compromising performance

comprehensive

Comprehensive

Complete security across data in motion from authentication, encryption to access controls to guard against external and internal threats

high performance

High Performance

Maintain performance while meeting strict security requirements with efficient scale-out compute architecture

consistent

Consistent

Deliver the same rigorous security models across on-premises and cloud deployments for application and user consistency

Secure Your Real-Time Data

 

Watch this recorded webcast to learn the importance of database security and understand critical features to secure real-time data

Security Capabilities

RBAC

Role-Based Access Control (RBAC)

Efficiently manage simple or robust security configurations by user role and group while maintaining maximum performance

Encryption

Encryption

Data encryption is supported at time of ingest and when delivered across nodes using SSL and TLS 1.2. Easy to integrate third party encryption for data at rest.

Authentication

Authentication

Manage existing account access with PAM (Pluggable Authentication Module), SAML, and GSSAPI (Kerberos) authentication support

Audit Logging

Audit LoggingADD-ON

Configurable database logging writes all activities to a secure external location to support information security tasks such as tracking user access, investigating suspicious activities and validating access control policies

Strict Mode

Strict ModeADD-ON

Prevent permissive data access from rogue database administrators using strict security configuration control to protect against insider threats

Password Policy

Password Policy

Ensure strong password compliance and best practice with policy controls over length, complexity, and usage configuration

Ready to Get Started?

Take your business real-time