Tag: Encryption

How to Ensure Data Integrity for NoSQL Systems
Learn strategies and best practices to ensure data integrity, protect against corruption, and maintain accurate information across your NoSQL systems.

Securing Communication with TLS Certificates: A Definitive Guide for Couchbase Server (Part 1 of 3)
This guide demystifies configuration and utilization of TLS certificates in Couchbase Server, empowering administrators to enhance deployment security.

Flexible and Resilient Data Protection with Couchbase Server 7.1
Couchbase 7.1 adds flexibility for direct data protection backups to GCP cloud storage and a new restore resume option for cbbackupmgr, plus more.

Couchbase Server 7.0.2 Enforce TLS, HSTS & Enforce IP Address Family
Learn how Couchbase Server 7.0.2 security features include making a robust barrier for attackers who try to compromise your systems

Why Data Encryption Is Essential
Data encryption can help organizations mitigate risks and stop data sprawl and cyberattacks before they occur. ✓ Do more with Couchbase.

TLS 1.3 encryption arrives to Couchbase Server 7.0
Couchbase Server version 7.0 introduces the TLS version 1.3 protocol for secure encrpytion on the wire. TLS 1.3 Security is for data that your application writes to the database or even the data travelling between the nodes in the cluster or across multiple clusters.

Node-to-Node Encryption with Couchbase Server 6.5
With security on everyone’s mind, organizations need to run sensitive workloads under stringent security and compliance standards. Couchbase 6.5 preview brings several new security capabilities, and node-to-node encryption has been a top wish list item for many customers. In this...

Cipher Suites in Couchbase Server 6.5
For many, “Cryptography” is the little green lock icon next to the web address of their favorite websites, and for others, they might recall the TLS vulnerabilities that have hit in recent years. Data is today’s digital gold, and in...

Announcing General Availability of Couchbase Mobile 2.1
Today, we are announcing the general availability of Couchbase Mobile 2.1.With Couchbase 2.1, we continue to innovate and bolster our platform with security, performance and high availability enhancements to meet the demands of business critical applications.

Securely Storing Password Data in Couchbase with Golang and BCrypt
Learn how to use BCrypt in a Golang application to hash sensitive information like passwords before storing them in a NoSQL database like Couchbase.

Configuring IPsec for a Couchbase Cluster
Introduction Some Couchbase deployments require secure communications between nodes across the network, this could be due to reasons like data governance policies or regulatory compliance. Internet Protocol Security (IPsec) is a protocol suite for secure Internet Protocol (IP) communications by...
Top Posts
- Data Modeling Explained: Conceptual, Physical, Logical
- Data Analysis Methods: Qualitative vs. Quantitative Techniques
- New Enterprise Analytics Brings Next Generation JSON Analytics to...
- What are Embedding Models? An Overview
- What Is Data Analysis? Types, Methods, and Tools for Research
- What are Vector Embeddings?
- Column-Store vs. Row-Store: What’s The Difference?
- High Availability Architecture: Requirements & Best Practice...
- How I Built a Plant RAG Application with Couchbase Vector Search...