Expanded extensibility & SingleStore; available on the Red Hat Marketplace.
Deliver comprehensive security for cloud and on-premises deployments without compromising performance
Complete security across data in motion from authentication, encryption to access controls to guard against external and internal threats
Maintain performance while meeting strict security requirements with efficient scale-out compute architecture
Deliver the same rigorous security models across on-premises and cloud deployments for application and user consistency
Secure Your Real-Time Data
Watch this recorded webinar to learn the importance of database security and understand critical features to secure real-time data
Role-Based Access Control (RBAC)
Efficiently manage simple or robust security configurations by
user role and group
while maintaining maximum performance
Data encryption is supported at time of ingest and when delivered across nodes using SSL and TLS 1.2. Easy to integrate third party encryption for data at rest.
Manage existing account access with
PAM (Pluggable Authentication Module)
, SAML, and
writes all activities to a secure external location to support information security tasks such as tracking user access, investigating suspicious activities and validating access control policies
Prevent permissive data access from rogue database administrators using strict security configuration control to
protect against insider threats
Ensure strong password compliance and best practice with policy controls over length, complexity, and usage configuration
Ready to Get Started?
Experience the performance of
The Database of Now
for your data today
Talk to a Specialist