
In our various interactions with clients, security consistently emerges as a top priority. These security concerns extend beyond data protection alone, encompassing the entire management system. In response to this growing demand for transparency and assurance, we’ve put together a comprehensive overview of the robust security layers provided in CData Virtuality.
Security protocols, audit, and certifications
Security protocols: CData Virtuality assures enhanced data transmission using SSL/TLS and HTTPS protocols.
Audit information & usage statistics: Organizations can employ SQL from external tools to derive valuable insights into data access patterns.
Certifications: Our ongoing commitment to security is underpinned by various certifications, including ISO27001, SOC 2 Type 2, SOC 3 and HIPAA compliance.
Authentication and authorization
Officially named the Authorization Management Component by CData Virtuality, it’s built on a dynamic security broker, which is a fundamental part of our system. This robust engine facilitates:
OpenID connect authentication algorithm: An industry benchmark ensuring smooth and reinforced user authentication.
Additional authentication support: The Keycloak library enables integration with established protocols such as PingID, OAuth 2, and SAML.
Kerberos & LDAP authentication: This approach provides reliable data transmission and integrates smoothly with widely-used directory authentication systems.
Web UI authentication: On-premises users can access and log into the platform with ease.
Two-factor authentication (2FA): CData Virtuality is enhancing its security measures against contemporary cyber threats by implementing Two-Factor Authentication.
User & permission management
Job owner assignments: Assigning specific jobs to specific owners enhances traceability and improves permission control.
Row-based security: Tailored access allows for setting permissions at the level of individual database rows.
Permission granularity: Users are provided with detailed control, enabling them to set permissions at the schema, table, or even column level.
Built-in user/role-based permission system: CData Virtuality’s approach to permission management is user-friendly, focusing on streamlined role-based allocations.
Version control
Git integration: This feature ensures data integrity while providing a clear and detailed history of all alterations.
History of changes: CData Virtuality’s comprehensive metadata versioning system allows users to precisely track and easily revert modifications.
CData Virtuality consistently focuses on security enhancement through the ongoing development of security-centric features, strict adherence to high standards, and alignment with industry benchmarks, ensuring a secure data environment. Current upgrades include AES encryption and advanced Git Integration as well as, in the development pipeline, Single Sign-On (SSO).
Discover CData Virtuality’s security features
Explore the robust security features of the CData Virtuality by scheduling a personalized demo or starting a free 30-day trial.