m
Our Mission Statement
This is Photoshop's version of Loremer Ipsn gravida nibh vel velit auctoregorie sam alquet.Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit.
Follow Us
Top
Security and Auditing - VoltDB
10957
page-template-default,page,page-id-10957,page-child,parent-pageid-10675,mkd-core-1.0,highrise-ver-1.0,,mkd-smooth-page-transitions,mkd-ajax,mkd-grid-1300,mkd-blog-installed,mkd-header-standard,mkd-sticky-header-on-scroll-up,mkd-default-mobile-header,mkd-sticky-up-mobile-header,mkd-dropdown-slide-from-bottom,mkd-dark-header,mkd-header-style-on-scroll,mkd-full-width-wide-menu,mkd-header-standard-in-grid-shadow-disable,mkd-search-dropdown,mkd-side-menu-slide-from-right,wpb-js-composer js-comp-ver-5.4.2,vc_responsive
VoltDB / Product  / Features and Benefits / Security and Auditing

Security and Auditing

VoltDB believes in keeping your system secure. To that end, we focus on doing two things well:

  1. We give you industry standard tools and technology to make your system secure.
  2. We give you auditing and observability tools to understand how your system is being used, to verify that all access and usage is valid, and to understand when attempts are made to compromise your system.

Customer Proof Points

Through customers like Nokia, HPe and Openet, a significant amount of the world’s mobile traffic involves VoltDB in some way.

Through customers like Huawei and some unamed global banks, hundreds of millions of financial transactions pass through VoltDB daily.

Each of the customers have security validation processes that VoltDB met and exceeded.

Role-Based Permissions

Rather than assign permissions directly to users, VoltDB follows best practices and assigns permissions to roles and then roles to users.

Several built-in roles make getting started simpler, such as administrators and read-only users. But roles can be customized to have very fine grained permissions if needed.

Audit-Friendly Logging

VoltDB generates log lines for many events that contribute to a comprehensive picture of how users are using, or attempting to use your system.

Log events are generated for successful and failed login attempts, all configuration changes or attempted changes, as well as all administrative actions or attempted actions. In each case, the log message will contain a timestamp, the username and any connection-related info available, starting with the remote IP address and port.

TLS

The VoltDB server supports TLS 1.2 (the latest and most secure version which replaces the older SSL) for all client-server communication and for all administration tools, like our web dashboard, the Volt Management Center.

Kerberos

When combined with TLS encryption, VoltDB’s default password-based security can be quite secure, VoltDB optionally supports Kerberos technology for authentication as well. This allows for more centralized authentication and account management, and enables some additional flexibility in security measures.