Presentations

Securing deployments: top to bottom, all around

Securing deployments: top to bottom, all around

Regulatory compliance is a hot topic these days. As the volume of data and number of applications moving to Couchbase has increased, so has the need to secure that data and those applications. While meeting the challenges of compliance can be a daunting task, Couchbase provides a rich set of features that can help customers achieve their compliance goals quickly and easily. In this presentation, we will examine and explain the security controls used across the stack for authentication, authorization, audit, and encryption. We’ll also take a brief look at where Couchbase security is today and then peer into the future to see where Couchbase security is headed. Come and attend this demo filled session to hear how the latest innovations can let you securely connect more data to more users across your organizations.

Securing Couchbase Server 4.0 Deployments

Securing Couchbase Server 4.0 Deployments

Couchbase Server 4.0 offers new security features that allow administrators to customize security for different users and, above all, protect their deployments. A secure deployment requires defensive, in-depth security controls for authentication, authorization, encryption, auditing and administration. In this session, Solutions Engineer Darin Briskman and Senior Product Manager Don Pinto will show attendees how to leverage the features in Couchbase Server 4.0 and present integration options with third-party partner solutions. This talk will include technical details of the new administrative auditing functions and a demonstration of a centralized auditing solution.

Securing Couchbase Server Deployments with Vormetric

Securing Couchbase Server Deployments with Vormetric

With increased adoption of the NoSQL, companies are also increasingly populating Couchbase Server with sensitive information. This information can take the form of such things as personally identifiable information (PII), personal health information (PHI), or sensitive customer/internal information. This information must adhere to regulatory requirements – such as PCI and HIPPA, adhere to state and local privacy laws, adhere to customer and partner service level agreements, and have controls in place to prevent insider abuse of the sensitive information. In this session, learn how Vormetric and Couchbase have partnered together to address the data security needs for protecting sensitive information being stored in Couchbase Server.