Data security
Comprehensive, multilayered protection guards your data against evolving threats.
Safeguard your environment with confidence
End-to-end protection
Teradata’s robust, multilayered security features help you ensure powerful protection for your environments and sensitive data.
Identity protection
Identity and access management is your first line of defense. Ensure that only verified identities can access sensitive data, with no single points of failure across your security domain—all in support of a zero trust security model.
Data protection
Create the foundation for trusted data with seamless integration and harmonization. Secure data at rest and in transit with optional, customer-managed encryption keys (CMEK) for better control and TLS 1.2 for client sessions. Additional security like column-level encryption, tokenization, and anonymization is available through our partners.
Network protection
Safeguard data as it moves across host-, network-, and application-level boundaries. Layers of network protection combine to create a strong defense that shields operations from outside threats.
Secure by design
Built on a secure, reliable foundation, Teradata’s platform complies with industry standards through a comprehensive, secure-by-design approach.
Secure development
Our secure development lifecycle (SDL) practices incorporate security and integrity into every phase of development:
- Secure coding practices
- Regular review of information security policies
- Procedures for quick, effective responses to security incidents
Secure operations
Teradata’s operations team follows strict access control policies and procedures:
- Background checks, agreements, and training for employees
- Enforcement of password complexity, encryption, and restrictions
- Encryption of remote access with FIPS 140-2 and required multifactor authentication (MFA)
Secure measures
Teradata regularly tests, assesses, and monitors for threats to ensure prompt response:
- Proactive threat modeling and penetration testing
- Collection and analysis of security events in near real time with security information and event monitoring (SIEM) system
- To report a security vulnerability with Teradata, visit our Responsible Vulnerability Disclosure (RVD) Policy