by CData Software | October 16, 2023

An Overview of CData Virtuality’s Comprehensive Security Measures

cdata virtuality

In our various interactions with clients, security consistently emerges as a top priority. These security concerns extend beyond data protection alone, encompassing the entire management system. In response to this growing demand for transparency and assurance, we’ve put together a comprehensive overview of the robust security layers provided in the CData Virtuality.

Security protocols, audit, and certifications

  • Security protocols: CData Virtuality assures enhanced data transmission using SSL/TLS and HTTPS protocols.
  • Audit information & usage statistics: Organizations can employ SQL from external tools to derive valuable insights into data access patterns.
  • Certifications: Our ongoing commitment to security is underpinned by various certifications, including ISO27001, SOC 2 Type 2, SOC 3 and HIPAA compliance. 

Authentication and authorization

Officially named the Authorization Management Component by CData Virtuality, it’s built on a dynamic security broker, which is a fundamental part of our system. This robust engine facilitates:

  • OpenID connect authentication algorithm: An industry benchmark ensuring smooth and reinforced user authentication.
  • Additional authentication support: The Keycloak library enables integration with established protocols such as PingID, OAuth 2, and SAML.
  • Kerberos & LDAP authentication: This approach provides reliable data transmission and integrates smoothly with widely-used directory authentication systems.
  • Web UI authentication: On-premises users can access and log into the platform with ease.
  • Two-factor authentication (2FA): CData Virtuality is enhancing its security measures against contemporary cyber threats by implementing Two-Factor Authentication.

User & permission management

  • Job owner assignments: Assigning specific jobs to specific owners enhances traceability and improves permission control.
  • Row-based security: Tailored access allows for setting permissions at the level of individual database rows.
  • Permission granularity: Users are provided with detailed control, enabling them to set permissions at the schema, table, or even column level.
  • Built-in user/role-based permission system: CData Virtuality’s approach to permission management is user-friendly, focusing on streamlined role-based allocations.

Version control

  • Git integration: This feature ensures data integrity while providing a clear and detailed history of all alterations.
  • History of changes: CData Virtuality’s comprehensive metadata versioning system allows users to precisely track and easily revert modifications.

CData Virtuality consistently focuses on security enhancement through the ongoing development of security-centric features, strict adherence to high standards, and alignment with industry benchmarks, ensuring a secure data environment. Current upgrades include AES encryption and advanced Git Integration as well as, in the development pipeline, Single Sign-On (SSO).

Discover CData Virtuality’s security features

Explore the robust security features of the CData Virtuality by scheduling a personalized demo or starting a free 30-day trial.