GigaSpaces provides a secure framework for secured application interconnection, user access and secured data integration options to mitigate cyber threats, and minimize the risks of data leakage due to negligence, human error and malicious behavior.
Gigaspaces provides embedded cyber security functionality, and also offers integrations with external, third-party data security features such as cloud security functionality. Secured infrastructure operations are supported for on-premises, hybrid and cloud-native environments.
GigaSpaces secures data in transit and data at rest, utilizing the Spring Security framework for highly customizable authentication and access control for Java applications, in addition to protection from cyber attacks. A Spring-based security bridge enables an extensible implementation to LDAP (Lightweight Directory Access Protocol) or database authentication.
Sensitive data can be kept in the space in encrypted format, and be decrypted on the client side when the required key is supplied, at the table and column level. GigaSpaces’s Data at Rest Encryption can be based on Spring Security On-Prem Encryption Options, or integrate with Native Cloud encryptions such as AWS EC2 Encryption, S3 SSE, GCP Encryption, and more.
Both models support AES level cipher encryption with integration to external Key management Infrastructure, such as AWS KMS.
GigaSpaces offers comprehensive security coverage:
Data layer: Declare a secured space or a stateless/stateful services, with regards to CRUD operations; includes various interfaces such as Client SDK (JAVA and .NET) RESTFul APIs, Command Line Interface (CLI) and Web UI (Ops Manager)
Management layer: Declare the data store management as secured, which includes the management operations, i.e. deploy/undeployed a function
Transport layer: Provides a generic network encrypted protocol with SSL/TLS support
Secured Data Functionality: focused on maintaining data confidentiality; provides a mix of data at rest encryption options for on-premises, cloud and hybrid configurations