Data

Provide Security Without Sacrificing Performance

InterSystems’ products provide flexible and robust security capabilities while minimizing the burden on application performance. Our products are designed to support secure application deployment in three ways:

Security model chart

 

The security of our products is based on:

Authentication
Authentication is how users (humans, devices, other applications) prove that they are who they say they are. Our products support a number of authentication mechanisms, including two-factor authentication.

Authorization
Determines what resources a user is allowed to use, view, or alter. Assignation and management of privileges (including role-based and application-based privileges) are easily accomplished through our products’ System Management Portals.

Auditing
In our products, all system and application events are recorded in an append-only log, which is compatible with any query or reporting tool that uses SQL.

Data Encryption
We provide mechanisms for encrypting both data-at-rest and data-in-motion.

How Else Can We Help You?

Learning Services

Classroom courses, free online courses, hands-on tutorials, and more.

Learn More

Developer Community

Network with your peers and with InterSystems developers and product managers.

Learn More

Careers at InterSystems

Work with terrific people creating technology that matters.

Learn More

Take the Next Step

Complete this form and we’ll contact you to discuss your needs.

Take the Next Step

We don’t share your personal info with anyone.
Check out our Privacy Policy for more information.