Comprehensive Security

Deliver comprehensive security for cloud and on-premises deployments without compromising performance
comprehensive
Comprehensive
Complete security across data in motion from authentication, encryption to access controls to guard against external and internal threats
secure_performance
High Performance
Maintain performance while meeting strict security requirements with efficient scale-out compute architecture
risk-management
Consistent
Deliver the same rigorous security models across on-premises and cloud deployments for application and user consistency

Secure Your Real-Time Data

 
Watch this recorded webcast to learn the importance of database security and understand critical features to secure real-time data

users
Role-Based Access Control (RBAC)
Efficiently manage simple or robust security configurations by user role and group while maintaining maximum performance
encrypt
Encryption
Data encryption is supported at time of ingest and when delivered across nodes using SSL and TLS 1.2. Easy to integrate third party encryption for data at rest.
account-level-security
Authentication
Manage existing account access with PAM (Pluggable Authentication Module), SAML, and GSSAPI (Kerberos) authentication support
audit
Audit Logging
add-on
Configurable database logging writes all activities to a secure external location to support information security tasks such as tracking user access, investigating suspicious activities and validating access control policies
exactlyonce
Strict Mode
add-on
Prevent permissive data access from rogue database administrators using strict security configuration control to protect against insider threats
password_policy
Password Policy
Ensure strong password compliance and best practice with policy controls over length, complexity, and usage configuration