MarkLogic Security Workshop – Coming to a City Near You

Another day, another security breach.

At least that’s what it feels like lately. The attacks take many different shapes and forms. From the high profile, massive scale breaches of consumer credit data to the theft of mobile phone user data. And no organization is immune. There have even been ransomware attacks on fuzzy talking teddy bears Teddy bears!!

As business leaders and technologists we are challenged each day to make decisions and implement systems that place security as a top priority. Doing so reduces risk and protects our customers and business. But we’re also faced with intense pressure to deliver new applications and data services faster than ever before.

Fortunately, time to market and information security don’t need to be at odds with one another.
Customers choose NoSQL technology because of the agility, flexibility, scalability and speed it provides.

And you have chosen MarkLogic NoSQL because of its enterprise capabilities and proven, certified security model. In this FREE workshop, you will learn hands-on how to use MarkLogic to implement security inside the database. You will also get to hear from industry leaders to gain insight into real-world examples of security concepts in action.


Why You Need to Attend

What you will learn: Why it is important:
How to design and implement role-based access control to secure information in the database. Users should be given access to the least amount of information that is needed in order for them to do their jobs. By implementing roles and permissions you can be restrictive, but also flexible, so that you create a model that is easy to manage over time.
How to control access to data on a granular level Some people need access to certain bits of information but not to other bits. Information within the database can be protected at the XML element or JSON property level. This enables you to restrict user access to certain parts of a document – or to prevent a user from even knowing that those parts exist.
How to implement encryption. External hackers aren’t the only threat. There is also the threat from internal sources. How do you protect against a rogue DBA or system administrator? Encryption enables you to encrypt the data in the database (including logs and configuration files). Key management to the encrypted data enables you to limit the power of an individual, so that even if someone with access to the disk was to steal data and take it offsite, they couldn’t use that data without the keys.

Hurry! Spaces Are Limited — Register Today!