0 - 12 of 12 tags for encryption

Defense in depth is the practice of implementing multiple layers of security to protect business-critical information.

Hi,
We are using Teradata TTU from our Linux(Red Hat 6) server to connect to teradata via Ab Initio tool.
We are trying to enable encryption in the network layer of connection from our Linux server to Teradata server.

Many industry regulations, standards, and policies mandate the use of strong encryption to meet various security requirements.

Hi All,
How encryption happens in Teradata? What are the different levels of encryption defined in Teradata? And of course decryption too.
Thanks,
Dinesh

Can a column that will be encrypted be used as part of an index? 

I am connecting to Teradata via JDBC and LDAP using the following URL format:
jdbc:teradata://myserver/LOGMECH=LDAP,LOGDATA=username@@password

We have the scenario where we need to encrypt certain sensitive information. Can you please clarify / confirm encryption of specific columns in Teradata?   Can we control access to who can decrypt this column?

I have a couple application are are using ENCRYPTION=ON in their connection strings.  Is there any way to tell on the database side (DBQL, etc) so that I may verify that the encryption parameters are being accepted?

Security of data warehouse assets is a primary concern for most enterprises. This course focuses on securing network access to a Teradata data warehouse. This is Part 2 of 2.

This course focuses on securing network access to a Teradata data warehouse. This is Part 1 of 2.

Can anyone provide information as to the encrytion strength of BTEQ/Fastload/Multiload etc when DATAENCRYPTION is ON?

My connectivity with TD is almost from third party ETL tool. ETL tool can create encrypted password to logon teradata.