Securely Designed Architecture
Product Designed for Security from the Ground Up
While every DataDirect product is designed to give you the highest possible performance, the same strategies used in their design inherently reinforce your security.
Take a look at some of the important security factors in the design of our products:
Security Challenge | Risk | DataDirect Feature | Feature Benefit |
Network Vulnerabilities | Security vulnerabilities such as packet sniffing and router logging used to capture data. | Wire Protocol Architecture in Connect and Connect64 for ODBC drivers | Each of these architectures is single tier. Combined with a network data encryption algorithm such as SSL, this means that they can communicate directly with the database in a completely secure format. |
100% Managed Code in Connect for ADO.NET |
Type 5 JDBC driver architecture |
Denial of Service Attacks | Database client libraries are often rife with memory leak issues that propagate up through a client-based driver to the application. Hackers may intentionally leverage the memory leak to impede access to legitimate users of the application. Identifying and fixing these memory leaks in every single deployment of the client is an expensive and time-consuming proposal. | Wire Protocol Architecture in Connect and Connect64 for ODBC drivers | Clientless wire protocol drivers avoid the memory leaks that client libraries engender. |
100% Managed Code in Connect for ADO.NET | Because Connect for ADO.NET software runs entirely within the .NET Framework’s CLR, common Denial of Service attacks that involve making API methods operate out of specification, causing buffer overruns, are theoretically impossible. |
Type 5 JDBC driver architecture | Type 5 architecture means that no shared libraries or DLLs are required for use of any feature, thus eliminating this risk. |
Sub-Optimal Middleware Design and Implementation | Data connectivity middleware not subjected to thorough and rigorous QA testing in multiple scenarios leaves itself open to unforeseen security compromises. | Comprehensive Test Suite | DataDirect thoroughly tests and certifies our products in a wide variety of scenarios. |
Validation of Design & Implementation by 3rd Party Security Specialists | The Internet Security Advisers Group (ISAG) applied its specialized expertise in IT security to ensuring that DataDirect's software is free of known security vulnerabilities. |