An Overview of CData Virtuality’s Comprehensive Security Measures
In our various interactions with clients, security consistently emerges as a top priority. These security concerns extend beyond data protection alone, encompassing the entire management system. In response to this growing demand for transparency and assurance, we’ve put together a comprehensive overview of the robust security layers provided in CData Virtuality.
Security protocols, audit, and certifications
- Security protocols: CData Virtuality assures enhanced data transmission using SSL/TLS and HTTPS protocols.
- Audit information & usage statistics: Organizations can employ SQL from external tools to derive valuable insights into data access patterns.
- Certifications: Our ongoing commitment to security is underpinned by various certifications, including ISO27001, SOC 2 Type 2, SOC 3 and HIPAA compliance.
Authentication and authorization
Officially named the Authorization Management Component by CData Virtuality, it’s built on a dynamic security broker, which is a fundamental part of our system. This robust engine facilitates:
- OpenID connect authentication algorithm: An industry benchmark ensuring smooth and reinforced user authentication.
- Additional authentication support: The Keycloak library enables integration with established protocols such as PingID, OAuth 2, and SAML.
- Kerberos & LDAP authentication: This approach provides reliable data transmission and integrates smoothly with widely-used directory authentication systems.
- Web UI authentication: On-premises users can access and log into the platform with ease.
- Two-factor authentication (2FA): CData Virtuality is enhancing its security measures against contemporary cyber threats by implementing Two-Factor Authentication.
User & permission management
- Job owner assignments: Assigning specific jobs to specific owners enhances traceability and improves permission control.
- Row-based security: Tailored access allows for setting permissions at the level of individual database rows.
- Permission granularity: Users are provided with detailed control, enabling them to set permissions at the schema, table, or even column level.
- Built-in user/role-based permission system: CData Virtuality’s approach to permission management is user-friendly, focusing on streamlined role-based allocations.
Version control
- Git integration: This feature ensures data integrity while providing a clear and detailed history of all alterations.
- History of changes: CData Virtuality’s comprehensive metadata versioning system allows users to precisely track and easily revert modifications.
CData Virtuality consistently focuses on security enhancement through the ongoing development of security-centric features, strict adherence to high standards, and alignment with industry benchmarks, ensuring a secure data environment. Current upgrades include AES encryption and advanced Git Integration as well as, in the development pipeline, Single Sign-On (SSO).
Discover CData Virtuality’s security features
Explore the robust security features of the CData Virtuality by scheduling a personalized demo or starting a free 30-day trial.