Usages
There are no compromises on security, the platform is 100% secure, ready to store and expose business-critical data.
Integration with your IT security
Authentication
Strong authentication is enforced on the core components with Kerberos. Alternative authentication mechanisms are also supported on a component basis and with perimeter security.
Authorization
Scalable platform to handle a large volume of ingested data, in all possible forms, coming in batch and streaming
Data Protection
TDP provides encryption capability for various channels such as Remote Procedure Call (RPC), HTTP, JDBC/ODBC, and Data Transfer Protocol (DTP) to protect data in motion. Finally, HDFS supports encryption for data at rest.
Perimeter security
Prevent unauthorized access to your TDP platform by hiding the internal cluster network and routing the REST/HTTP access through one central entry point.