Fabric Security

Overview

K2View Fabric is a modern and highly secure distributed data management platform that securely liberates data from your existing systems and turns it into a dynamic resource that moves at the speed required by your business.

With more and more data breaches making the headlines in today's world, enterprises need to scrutinize their own security controls to ensure that their most valuable asset, data, is fully secured.

IT departments use a variety of encryption protocols to protect their data. However, when these protocols need to be applied to a diverse IT ecosystem with hundreds, or even thousands of interacting systems, the process can be cumbersome and lead to an all-or-nothing approach. This means that if the security controls for a particular system are breached, all the data in that system and possibly across all the interacting systems will be compromised.

By design, Fabric eliminates a significant number of potential large-scale breaches inherent to data exploration, while turning disconnected and untapped data into valuable new information.

Security Layers

In this section, we address how Fabric security tools address each layer in a Fabric cluster that has been fully deployed across multiple data centers, and how these tools interact with northbound or southbound systems spread across the cloud.

We show, in detail, how to handle each of the following components that are crucial to any Fabric implementation:

  • Data stored in Fabric
  • Interfaces
  • Web Services
  • Role-based access control and permissions management
  • User identification and access management

Note that this section only addresses security features related to Fabric as a product. For information about safeguarding the Fabric DevOps environment, rules, policies and best practices, click here.

Fabric Security

Overview

K2View Fabric is a modern and highly secure distributed data management platform that securely liberates data from your existing systems and turns it into a dynamic resource that moves at the speed required by your business.

With more and more data breaches making the headlines in today's world, enterprises need to scrutinize their own security controls to ensure that their most valuable asset, data, is fully secured.

IT departments use a variety of encryption protocols to protect their data. However, when these protocols need to be applied to a diverse IT ecosystem with hundreds, or even thousands of interacting systems, the process can be cumbersome and lead to an all-or-nothing approach. This means that if the security controls for a particular system are breached, all the data in that system and possibly across all the interacting systems will be compromised.

By design, Fabric eliminates a significant number of potential large-scale breaches inherent to data exploration, while turning disconnected and untapped data into valuable new information.

Security Layers

In this section, we address how Fabric security tools address each layer in a Fabric cluster that has been fully deployed across multiple data centers, and how these tools interact with northbound or southbound systems spread across the cloud.

We show, in detail, how to handle each of the following components that are crucial to any Fabric implementation:

  • Data stored in Fabric
  • Interfaces
  • Web Services
  • Role-based access control and permissions management
  • User identification and access management

Note that this section only addresses security features related to Fabric as a product. For information about safeguarding the Fabric DevOps environment, rules, policies and best practices, click here.