Progress Acquires MarkLogic! Learn More

Blog

Everything From Data Tips and NoSQL Best Practices to Industry Specific Insights

 
MarkLogicの高度なセキュリティ機能を活用することにより、極めて複雑で機密性の高いワークロードも、確実にクラウドに移行することができます。
 
Customers are relying on MarkLogic's advanced security capabilities to give them the assurance they need to migrate some of the most complex and sensitive workloads in the world to the cloud.
3rd Eye Technologies discusses its new offerings and latest mobility innovations to combat a lack of hardware support, security and infrastructure challenges when trying to leverage smartphones and mobile devices.
 
2018年版「アナリティクス向けデータ管理ソリューションマジック・クアドラント」1において、MarkLogicとグーグルの2社がビジョナリーに位置付けられました。ガートナーのこのマジック・クアドラントでビジョナリーに選ばれたのは、2年連続です。
 
In the 2018 Magic Quadrant for Data Management Solutions for Analytics1, MarkLogic and Google are the two companies positioned in the Visionaries quadrant of the Magic Quadrant. We see our positioning as a big validation of our vision of making data analytics and management central to the success of every enterprise around the world, and […]
Today, the UK’s intelligence services and police forces have to deal with an overwhelming amount of data. As if that wasn’t challenging enough, getting this data out of the silos it has long been stored in in order to transform it into actionable intelligence is even more difficult.
Cross-site scripting attacks are becoming more and more popular amongst hackers. According to the annual OWASP Foundation Top 10 report XSS (Cross-Site Scripting) and CSRF (Cross-Site Request Forgery) attacks remain in the high on list. Since cybercrime is on the rise, it is imperative for organizations to secure their web applications from these types of attacks.
How do you find and control access to Personally Identifiable Information and sensitive information in a MarkLogic database?
MarkLogic 9 provides the ability to select certain paths within documents and protect them from viewing or updating, unless the user has the proper credentials. This post covers the performance implication of using this functionality and provides some recommendations to design and implement a solution that uses element level security.
The MarkLogic REST API is a great tool, but be sure to use it in its intended architecture.