Data is encrypted in transit and at rest; additional data protection is available with proven solutions from noted security partners.
Cloud Data Security as-a-service
Teradata meets strict cloud data security requirements for Vantage delivered as-a-service
Cloud security solutions
Expert protection in the cloud
Cloud computing revolutionized the way organizations manage their data. Customers want as-a-service offerings for Vantage and at the same time there may be anxiety about entrusting intellectual property and IT infrastructure to an external provider.
Get serious about security
Cloud data security is the top priority
Teradata recognizes and respects customer concerns. Teradata treats data security as the number one priority for its as-a-service offerings. Industry best practices are overseen by a team of experts empowered to keep threats at bay.
Cloud data security for Vantage delivered as-a-service
Get the details of Teradata data security policies and regulatory compliance certifications.
Features and benefits
As-a-service environments are LDAP ready, or you can use either database authentication or the Active Directory to authenticate database sessions.
Database user roles
All data stored within as-a-service systems are accessible only by individual user-IDs that are assigned to each of your designated users; the Cloud Operations team does not have access to customer data.
Teradata uses the process documented in NIST Special Publication 800-39, Managing Information Security Risk, as the basis for its security risk management program. The Teradata security risk management process focuses on tier 3, information systems view, as defined in the document and is organized as follows:
The General Data Protection Regulation (GDPR), a regulation in European Union law on data protection and privacy, aims to give individuals control over personal data.
PCI DSS 3.2 attestation of compliance
Payment Card Industry (PCI) Data Security Standards (DSS) clarify the online credit card transaction requirements around encryption, access control, change management, application security, and risk management programs.
HIPAA audit reports
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) addresses technical and non-technical safeguards that “covered entity” organizations must put in place to secure individuals’ electronic protected health information (e-PHI).
SOC 1 and 2 audit reports
Coalfire Controls, LLC performed a Statement on Standards for Attestation Engagements No. 16 (SSAE16 SOC 1) and AICPA Service Organization Controls 2 (SOC 2) Type 2 examination for Vantage delivered as-a-service systems.