DataStax Enterprise Advanced Security

Protect What Matters Most

Empowers enterprises with advanced security capabilities that provide fine-grained user and access controls to keep their application data protected and increase compliance to lower business risk.

Mimimize Risk

Minimize Risk

Unified authentication, parameterized statements, and SSL-enabled drivers allow you to minimize risk exposure, increase transparency and control, and prevent things like SQL Injection attacks.

Achieve Granular Access Control

Achieve Granular Access Control

Client-to-node encryption, node-to-node encryption, and transparent data encryption, combined with the ability to easily manage user permissions, ensure no improper access to data.

Ensure Compliance

Ensure Compliance

Enhanced data auditing and reporting along with end-to-end encryption and redaction of sensitive application data enable you to easily comply with regulatory standards like PCI, SOX, HIPAA, and GDPR.

Safe data? Check. DataStax Enterprise Advanced Security

DataStax Enterprise (DSE) Advanced Security plays a critical role in keeping our customers’ data safe. Enterprise companies have very strict security requirements, which is why DSE Advanced Security provides robust and easy-to-use security functionality, including: Unified Authentication and Role Management

Read More

Introducing DataStax Enterprise 6.7 with Amit Chaudhry

DataStax Enterprise 6.7 delivers the leading distribution of Apache Cassandra with multi-workload support for operational analytics, geospatial search, increased data protection in the cloud, better performance insights, Docker production support, and connectivity to Apache Kafka™. Listen to this podcast to

Read More
 
 

Advanced Security In Action

Separation of Duties

Separation of Duties

There are many cases where administrators need full control of the database but should not have access or visibility to the data itself. For example, imagine a doctor or nurse who requires access to sensitive medical data. In this case, the administrator would still have the correct privileges to grant access to the doctor or nurse but the administrator would not be able to access the data.

Auditing by Role

Auditing by Role

Traditionally, auditing in DSE was controlled by which respective database object you wanted to keep track of. Having role-based auditing greatly reduces the audit trail, since most administrators want to keep track of human activity rather than machine-generated activity.

Key Features

Resources

 

Five Ways to Secure Your Distributed Data

Securing your data should be top of mind for any modern application. Security breaches...

Read More

Using Your Data Layer to Secure Financial Data

Let’s face it: Securing financial data in the 21st Century is a major headache.

Read More