A New Distributed Database Adds GDPR Controls

The European Union’s General Data Protection Regulation (GDPR) will force very strict new privacy compliance rules on firms doing business in the EU, but the startup with an unfortunate company and product name has what it says is the solution to maintaining compliance.

Cockroach Labs has introduced version 2.0 of its CockroachDB distributed database, which can be run in a data center or cloud. 

The company bills the product as “the SQL database for global cloud services.” It automatically scales, rebalances and repairs databases spread over multiple locations. Version 2.0 is aimed at companies moving to the cloud, which is increasingly constrained by laws governing the countries in which cloud data centers are located. 

One of CockroachDB's new features is something the company calls “geo-partitioning of data” for automating the process of storing data close to the customer. So, the data of German customers would reside in a German data center, and so on.
While it’s meant to help keep latency down - so a person in Asia doesn’t have to wait for data from an Amazon data center in the U.S., for instance - it also helps comply with GDPR. GDPR gives European consumers the power to control how their individual data is gathered and used. More importantly, it gives them the right to demand changes to their data, including its removal.

CockroachDB 2.0 allows companies to move data across servers at the database, table, and individual row level, so it is possible to split a massive database by country of origin and create individual databases for each country, which would help comply with GDPR.

Version 2.0 also adds native support for storing, indexing, and querying JSON data types. CockroachDB 2.0 uses a Postgres-compatible JSON implementation that it claims offers 10 times the throughput of the Amazon Web Services (AWS) Aurora database, with operators for doing in-place transformations and inverted indices to speed up queries on giant volumes of data. 

This eliminates having to map out the types of requests you want to process ahead of time. It also means zero downtime for making schema changes.

NetworkWorld

You Might Also Read: 

GDPR Countdown:

What Does GDPR Mean For the Retail Industry?:
 

« The Cambridge Analytica Scandal 'highlights need for AI regulation'
The Apps That Map Violence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cipher Security

Cipher Security

Cipher Security provides unique robustness tests and penetration tests, as well as customizable development services for vendors and providers.

ISGroup (Information Security Group)

ISGroup (Information Security Group)

ISGroup services include network penetration testing, Web application penetration testing, ethical hacking, vulnerability assessments, code review and associated training.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Odyssey

Odyssey

Odyssey is an ISO 27001 certified, Cyber -Security, Infrastructure and Risk Management Solutions integrator and a Managed Security Services Provider.

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

SWEDAC is the national accreditation body for Sweden. The directory of members provides details of organisations offering certification services for ISO 27001.

Inavate Consulting

Inavate Consulting

Inavate Consulting are experts in defining and implementing information assurance solutions and governance frameworks. Our ISO27001 consultants are the most experienced in the industry.

WiSecure Technologies

WiSecure Technologies

WiSecure Technologies aims to develop cryptographic products meeting requirements in the new economic era.

Ascend Technologies

Ascend Technologies

Ascend Technologies offers a full suite of managed IT services including: Cloud & Infrastructure Management, Cybersecurity Management, Service Desk Management, Application Management , Data Management

Spin Technology

Spin Technology

SpinOne is a SaaS data protection platform designed to monitor, secure, and back up your G Suite and O365 data, improve compliance, and reduce IT costs.

TwoThreeFour

TwoThreeFour

ThreeTwoFour provide tailored cyber security solutions, delivered by highly-skilled, experienced consultants who respond to the real needs of you and your business.

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.

Oman Technology Fund (OTF)

Oman Technology Fund (OTF)

Oman Technology Fund aims to make Oman the preferred destination for emerging tech companies in the region, and an attractive and stimulating destination for venture capital.

Cornami

Cornami

Cornami delivers real-time computing on encrypted data sets, which is vital for data privacy and cloud security.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

Seal Security

Seal Security

Seal Security revolutionizes software supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management.