Security enforcement

Physical and network security

TDP is compatible with on-premise and cloud environnments. Its users are in control of the target infrastructure, enabling strong physical security of the data center hosting their big data platform. Robust network security measures are activable, including firewalls, intrusion detection and prevention systems, virtual private networks (VPNs), and secure network segmentation.


Strong authentication ensures that only authorized users and services gain access to TDP clusters. Kerberos provides centralized authentication management and is integrated with external authentication systems such as LDAP or Active Directory.

Perimeter security

Implementing network segmentation helps isolate TDP clusters from other parts of the network, creating a security boundary. Users choose between multiple authentication methods and have access to every services through a single point of entry.

Data Encryption

Data encryption plays a critical role in protecting the confidentiality and integrity of the data. TDP provide the tools to encrypt data both at rest and in transit. Strong encryption algorithms is used to safeguard sensitive information stored within the platform.

Access Control

Access to the platform is controlled and granted based on the principle of least privilege. Role-based access control (RBAC) ensure that users only have access to the data and functionalities necessary for their roles.

Patch Management

TDP regularly applies security patches and updates to the software and infrastructure components of the platform to address known vulnerabilities and to protect against emerging threats. A well-defined patch management process is established and followed.

Data Privacy and Compliance

Organizations must comply with relevant data protection regulations, such as the General Data Protection Regulation (GDPR) or the California Consumer Privacy Act (CCPA). TDP provide the nécessary building blocks to implement appropriate measures to protect personal data and ensure compliance with privacy requirements.