![]() |
Defense in depth is the practice of implementing multiple layers of security to protect business-critical information.
20 Oct 2015
,
|
![]() |
Hi,
07 Aug 2015
| 1 comment
,
|
![]() |
Many industry regulations, standards, and policies mandate the use of strong encryption to meet various security requirements.
23 Jan 2015
,
|
![]() |
Hi All,
21 Jan 2015
| 5 comments
,
|
![]() |
Can a column that will be encrypted be used as part of an index?
06 Nov 2014
| 4 comments
,
|
![]() |
I am connecting to Teradata via JDBC and LDAP using the following URL format:
17 Sep 2014
| 1 comment
,
|
![]() |
We have the scenario where we need to encrypt certain sensitive information. Can you please clarify / confirm encryption of specific columns in Teradata? Can we control access to who can decrypt this column?
01 May 2014
| 1 comment
,
|
![]() |
I have a couple application are are using ENCRYPTION=ON in their connection strings. Is there any way to tell on the database side (DBQL, etc) so that I may verify that the encryption parameters are being accepted?
19 Mar 2012
| 3 comments
,
|
![]() |
Security of data warehouse assets is a primary concern for most enterprises. This course focuses on securing network access to a Teradata data warehouse. This is Part 2 of 2.
01 Mar 2012
,
|
![]() |
This course focuses on securing network access to a Teradata data warehouse. This is Part 1 of 2.
01 Mar 2012
,
|
![]() |
Can anyone provide information as to the encrytion strength of BTEQ/Fastload/Multiload etc when DATAENCRYPTION is ON?
30 Jan 2012
| 2 comments
,
|
![]() |
My connectivity with TD is almost from third party ETL tool. ETL tool can create encrypted password to logon teradata.
05 Feb 2010
| 7 comments
,
|