Deliver superior customer experiences with an AI-driven platform for creating and deploying cognitive chatbots
Deliver Awesome UI with the most complete toolboxes for .NET, Web and Mobile development
Automate UI, load and performance testing for web, desktop and mobile
A complete cloud platform for an app or your entire digital business
Detect and predict anomalies by automating machine learning to achieve higher asset uptime and maximized yield
Automate decision processes with a no-code business rules engine
Optimize data integration with high-performance connectivity
Connect to any cloud or on-premises data source using a standard interface
Build engaging multi-channel web and digital experiences with intuitive web content management
Personalize and optimize the customer experience across digital touchpoints
Build, protect and deploy apps across any platform and mobile device
Securing your data has never been more important, but enterprise security has also never been more complex. Join us for a webinar to explore your options.
Enterprise data security is one of the foremost topics in data access today and, unfortunately, it’s also one of the most complicated topics. Cyber attacks are relentless and are not going away. The collective costs of data breaches are painfully high. None of us want our company to suffer these losses or make the headlines because of a security breach.
Data security is complicated for a variety of reasons. You have security threats, users misusing their credentials, compliance standards and laws to understand and satisfy. And finally, you must evaluate an unending list of technologies and solutions to meet your product’s environment and architectural security needs.
There are a substantial number of distributed technologies required for a robust security implementation, as seen in the graphic below. You must identify that the client is who or what they claim to be, noted in green. You must determine what data and actions are accessible to the client, noted in blue. You must secure the data as it moves by means of encryption, noted in purple. And you must monitor and/or trace access and movement as it occurs, noted in orange.
In our recent webinar, Enterprise Security in Data Access, we took a deep dive into each of these topics:
In addition, we also discuss network security options such as CASB, or Cloud Access Security Brokers, and topics specific to securing big data and cloud implementations, such as Amazon AWS’s IAM, or Identity and Access Management.
During our webinar, we polled the hundreds of attendees to learn where companies are seeing increasing complexity with data access security.
In short, the answer is that companies are seeing increased security complexity everywhere. Whether using traditional relational sources, Big Data or APIs, there is no simple, one size fits all solution to data access security needs. The technologies and implementations vary according to data stores, applications, API and use cases.
In this webinar, the speakers also spoke about technological advancements across different databases. While there is Knox, Ranger and Sentry for the Big Data world, the cloud data access security has seen OAuth, SSL / TLS, HTTPS, 2FA, MFA and other sophisticated technologies. On the relational side, the industry has moved from NTLM to Kerberos. There are a variety of encryption technologies including SHA, AES, Data Masking, Data Scrambling, WS-Security etc.
Even the databases themselves are increasingly supporting new technologies. For example, Oracle has Oracle Wallet and Oracle Internet Directory (LDAP). Access this webinar on-demand to learn about all these technologies and understand how to stay ahead of security risks.
While deciding on and implementing a security protocol may seem like the ultimate goal, the reality is that enterprise data access security extends far beyond the implementation.
Once you have your security plan in place, how will you test it for ongoing integrity? How will you continually update that security for new attacks, breeches, etc?
As an enterprise software vendor, Progress confronts those same challenges and we share our expertise in this webinar. We’ll tell you about our experience with VeraCode, PREfast, Fuzz testing, and other third party tools. We’ll also share details on the breadth of our security testing environments and how we handle new vulnerabilities with our Security Vulnerability Response policy. Join this webinar to learn how Progress DataDirect is delivering secure data access connectivity to its partners.
Security is a complex topic, and that complexity continues to grow. To learn more about options and challenges implementing enterprise data security, including technologies such as Kerberos, SSL/TLS, Apache Knox, OAuth, Oracle Wallet, and more, watch our webinar today!
Nishanth Kadiyala is a Technical Marketing Manager at Progress. He got his B.Tech degree from IIT Guwahati and his MBA from UNC Chapel Hill. He has worked on several technologies including database designing, SQL querying and Cloud Computing in the past. Currently, he is committed to educating enterprises about standards based connectivity via ODBC, JDBC, ADO.NET and OData. He is also proficient with DataDirect Hybrid Connectivity Services – DataDirect Cloud and Hybrid Data Pipeline. You can stay in touch with him through Twitter.
Copyright © 2018 Progress Software Corporation and/or its subsidiaries or affiliates.
All Rights Reserved.
Progress, Telerik, and certain product names used herein are trademarks or registered trademarks of Progress Software Corporation and/or one of its subsidiaries or affiliates in the U.S. and/or other countries. See Trademarks for appropriate markings.