My Database Driver is “Secure”

Default Blog Top Image
by Jeff Reser Posted on April 23, 2013

Internet securityDid you catch my previous post on how premium database drivers can improve performance? Well, today I’ll be continuing the blog series and delving into another huge benefit of premium drivers: risk reduction and the design of secure applications.

Premium drivers, like DataDirect Connect, make it easy to provide robust application security features, which makes it possible to secure data exchange, address potential vulnerabilities inherent in database access and networks, and prevent a highly publicized security breach. There are three areas in particular that you should focus on in order to help reduce risk and secure your company’s information:

  • OS Authentication: Integrating OS authentications, such as Kerberos and NTLM protocols, into a Single Sign-On environment can help eliminate the need for users to log in separately from each application – enabling multiple logins and user IDs to live in the same environment.  
  • Network Data Encryption: Exchanging data between an application and its database using TLS / SSL encryption standards or native database encryption ensures that the data is encrypted automatically. This is the type of encryption offered by DataDirect Connect to significantly reduce the risk associated with most common data thefts.
  • Secure Architecture: Choose middleware that reinforces application security and eliminates the need for database client libraries, as these are often a point of vulnerability. 

Maintaining a secure architecture doesn’t mean that you have to break the bank. Many premium drivers actually simplify pricing because data encryption and authentication is automatically included in the cost of the driver. This built-in security makes it easy to develop secure applications without the need to purchase additional products. DataDirect Connect, in particular, minimizes complexity, as it is compatible with many existing IT architectures.

Have additional questions about how to secure your enterprise architecture? Leave a comment below or ask us directly at @DataDirect_News.


Jeff Reser
View all posts from Jeff Reser on the Progress blog. Connect with us about all things application development and deployment, data integration and digital business.
More from the author

Related Tags

Related Articles

Progress DataDirect Now Connects to Denodo
Progress DataDirect has added Denodo, a data virtualization software platform, to its catalog of connectors.
What Is the Difference Between SSO, 2FA and MFA?
Learn about the three main security protocols and their differences: Single Sign-On (SSO), Two-Factor Authentication (2FA) and Multi-Factor Authentication (MFA).
Website & App Security: What You Need to Know to Protect the Products You Build
What can you do to ensure that you’re not setting up your clients for failure or their end users for trouble? In this post, we’ll look at the four parts of a digital product that are the most vulnerable along with what you can do to secure those weak spots.
Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation