CData Acquires Data Virtuality, Modernizing Enterprise Data Virtualization

Article contents

Share Article

An Overview of the Data Virtuality Platform’s Comprehensive Security Measures

Article contents

In our various interactions with clients, security consistently emerges as a top priority. These security concerns extend beyond data protection alone, encompassing the entire management system. In response to this growing demand for transparency and assurance, we’ve put together a comprehensive overview of  the robust security layers provided in the Data Virtuality Platform.

Security Protocols, Audit, and Certifications

  • Security Protocols: Data Virtuality assures enhanced data transmission using SSL/TLS and HTTPS protocols.
  • Audit Information & Usage Statistics: Organizations can employ SQL from external tools to derive valuable insights into data access patterns.
  • Certifications: Our ongoing commitment to security is underpinned by various certifications, including ISO27001, SOC 2 Type 2, SOC 3 and HIPAA compliance. For a comprehensive view of our security certifications, please visit the Data Virtuality Trust Center.

Authentication and Authorization

Officially named the Authorization Management Component by Data Virtuality, it’s built on a dynamic security broker, which is a fundamental part of our system. This robust engine facilitates:

  • OpenID Connect Authentication Algorithm: An industry benchmark ensuring smooth and reinforced user authentication.
  • Additional Authentication Support: The Keycloak library enables integration with established  protocols, such as PingID, OAuth 2, and SAML.
  • Kerberos & LDAP Authentication: This approach provides reliable data transmission and integrates smoothly with widely-used directory authentication systems.
  • Web UI Authentication: On-premise users can access and log into the platform with ease.
  • Two-Factor Authentication (2FA): Data Virtuality is enhancing its security measures against contemporary cyber threats by implementing Two-Factor Authentication.

User & Permission Management

  • Job Owner Assignments: Assigning specific jobs to specific owners enhances traceability and improves permission control.
  • Row-based Security: Tailored access allows for setting permissions at the level of individual database rows.
  • Permission Granularity: Users are provided with detailed control, enabling them to set permissions at the schema, table, or even column level.
  • Built-in User/Role-Based Permission System: Data Virtuality’s approach to permission management is user-friendly, focusing on streamlined role-based allocations.

Version Control

  • Git Integration: This feature ensures data integrity while providing a clear and detailed history of all alterations.
  • History of Changes: Data Virtuality’s comprehensive metadata versioning system allows users to precisely track and easily revert modifications.

Data Virtuality consistently focuses on security enhancement through the ongoing development of security-centric features, strict adherence to high standards, and alignment with industry benchmarks, ensuring a secure data environment. Current upgrades include AES encryption and advanced Git Integration as well as, in the development pipeline, Single Sign-On (SSO).

Discover Data Virtuality’s Security Features

Explore the robust security features of the Data Virtuality Platform by scheduling a personalized demo or starting a free 30 day trial.

More interesting articles

Data Virtuality brings enterprise data virtualization capabilities to CData, delivering highly-performant access to live data at any scale.
Discover how integrating data warehouse automation with data virtualization can lead to better managed and optimized data workflows.
Discover how our ChatGPT powered SQL AI Assistant can help Data Virtuality users boost their performance when working with data.
While caching offers certain advantages, it's not a one-size-fits-all solution. To comprehensively meet business requirements, combining data virtualization with replication is key.
Explore the potential of Data Virtuality’s connector for Databricks, enhancing your data lakehouse experience with flexible integration.
Generative AI is an exciting new technology which is helping to democratise and accelerate data management tasks including data engineering.