Data

Provide Security Without Sacrificing Performance

InterSystems’ products provide flexible and robust security capabilities while minimizing the burden on application performance. Our products are designed to support secure application deployment in three ways:

Security model chart

 

The security of our products is based on:

Authentication
Authentication is how users (humans, devices, other applications) prove that they are who they say they are. Our products support a number of authentication mechanisms, including two-factor authentication.

Authorization
Determines what resources a user is allowed to use, view, or alter. Assignation and management of privileges (including role-based and application-based privileges) are easily accomplished through our products’ System Management Portals.

Auditing
In our products, all system and application events are recorded in an append-only log, which is compatible with any query or reporting tool that uses SQL.

Data Encryption
We provide mechanisms for encrypting both data-at-rest and data-in-motion.

Hoe kunnen wij je nog meer helpen?

Learning Services

Klassikale cursussen, gratis online cursussen, praktische tutorials en meer.

Meer weten

Ontwikkelaarscommunity

Netwerk met je collega’s, ontwikkelaars en productmanagers van InterSystems.

Meer weten

Loopbanen bij InterSystems

Werken met geweldige mensen die technologie ontwikkelen die ertoe doet.

Meer weten

Zet de volgende stap

Vul dit formulier in en wij nemen contact met je op om je wensen te bespreken en te zien hoe InterSystems jouw organisatie kan helpen haar doelstellingen te bereiken.

Zet de volgende stap

  • Volgens AVG: Door op verzenden te klikken, geef je InterSystems toestemming om bovenstaande persoonlijke gegevens op te slaan en te verwerken, en aangevraagde content naar je op te sturen.

Wij delen je gegevens met niemand.
Bekijk onze Privacy Policy voor meer informatie.