bluekern’s comprehensive set of security tools will keep your data safe and let you manage permissions at an individual level.
bluekern’s flexible permission and access model gives you total control over who can see what information.
Data quality, data protection and data confidentiality are intrinsic to our architecture.
Real-time monitoring of platform activity and incidents ensures our ability to serve customers instantly.
With a robust system of data safeguards, security features are built into all our products, services, and infrastructure to protect data at every level.
All data, at rest and in transit, is automatically encrypted using the strongest block ciphers available. All traffic to workspace endpoints is encrypted and secured in transit by TLS (Transport Layer Security) protocols.
The bluekern platform supports multi-layer role-based access control (RBAC), with object-level security, row-level security, column-level security, and dynamic data masking.
bluekern logs authentication activities for auditing, and configures reports and alerts whenever a suspicious login is attempted.
Core network security features include data exfiltration protection, firewall rules, public network access and private endpoints management.
The platform is constantly monitored against anomalous activities that could be a potential threat to the database. Specifically, it searches for potential SQL injection attacks, anomalous database access and queries, or suspicious database activity.
The platform administrator receives end-user
activity logs, alert notifications, details on
incidents, audit reports.