Vertica Blog


Building a Secure Vertica Environment

This blog post was authored by Soniya Shah. Vertica has a client-server architecture system, where applications that reside on the client access the Vertica cluster through drivers including ODBC, JDBC, OLEDB and ADO.NET. This post discusses secure client to server communications, authenticating access to Vertica, and administrator access. Method Vertica Options Authentication: Validate user credentials […]

LDAP and User Accounts

This blog post was authored by Soniya Shah. If you are a database administrator, you probably need to authenticate users in Vertica. There are many methods users can use to authenticate, including Ident, Kerberos, LDAP, and hash. This blog walks you through the steps to take if you want to authenticate some users using LDAP […]

What’s New in Vertica 8.0.1?

Learn what’s new in Vertica version 8.0.1!

Customize Your Security Authentication in Vertica

Learn more about authentication methods in Vertica. 

Best Practices for Using LDAP Link with Vertica

There are a few best practices that you should follow to make sure that you don’t accidentally lose any users or data. This blog explains how to keep your LDAP Link service working smoothly.

What’s New in 8.0: FIPS Compliance

Data security is an important part of managing your big data. Learn more about FIPS compliance with Vertica 8.0. 

Classified: FAQs on Access Policies

In Vertica 7.2.2 we’ve added more security features, including a row-level access policy option. Combined with our previously existing column access policy, Vertica verifies that your data is more secure than ever.

User Security Auditing in Vertica

Are you a database administer who manages users and roles in your Vertica database? Do you need to keep track of who has permission to access certain database objects?

If so, here’s a quick guide to queries that help you review the users, roles, privileges, and permissions that you have configured in your database. These queries access one or more Vertica system tables to retrieve this information.

Integrate Data Security with Your Big Data Platform

Are you concerned about protecting PII/PHI data in your Big Data implementations? Are you worried when your data flows across your Hadoop and Vertica clusters deployed on premise or in cloud? Are you looking for a security solution that will allow you to meet PCI and other industry compliance and data privacy regulations?

Data-Centric Security: Vertica and SecureData

Take advantage of the recent integration of HPE Vertica and HPE SecureData. This integration allows you to keep your data protected when it flows across multiple systems spread across multiple data centers on premise or in the cloud.