A New Distributed Database Adds GDPR Controls

The European Union’s General Data Protection Regulation (GDPR) will force very strict new privacy compliance rules on firms doing business in the EU, but the startup with an unfortunate company and product name has what it says is the solution to maintaining compliance.

Cockroach Labs has introduced version 2.0 of its CockroachDB distributed database, which can be run in a data center or cloud. 

The company bills the product as “the SQL database for global cloud services.” It automatically scales, rebalances and repairs databases spread over multiple locations. Version 2.0 is aimed at companies moving to the cloud, which is increasingly constrained by laws governing the countries in which cloud data centers are located. 

One of CockroachDB's new features is something the company calls “geo-partitioning of data” for automating the process of storing data close to the customer. So, the data of German customers would reside in a German data center, and so on.
While it’s meant to help keep latency down - so a person in Asia doesn’t have to wait for data from an Amazon data center in the U.S., for instance - it also helps comply with GDPR. GDPR gives European consumers the power to control how their individual data is gathered and used. More importantly, it gives them the right to demand changes to their data, including its removal.

CockroachDB 2.0 allows companies to move data across servers at the database, table, and individual row level, so it is possible to split a massive database by country of origin and create individual databases for each country, which would help comply with GDPR.

Version 2.0 also adds native support for storing, indexing, and querying JSON data types. CockroachDB 2.0 uses a Postgres-compatible JSON implementation that it claims offers 10 times the throughput of the Amazon Web Services (AWS) Aurora database, with operators for doing in-place transformations and inverted indices to speed up queries on giant volumes of data. 

This eliminates having to map out the types of requests you want to process ahead of time. It also means zero downtime for making schema changes.

NetworkWorld

You Might Also Read: 

GDPR Countdown:

What Does GDPR Mean For the Retail Industry?:
 

« The Cambridge Analytica Scandal 'highlights need for AI regulation'
The Apps That Map Violence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Bishop Fox

Bishop Fox

Bishop Fox is a leading authority in offensive security, providing solutions ranging from continuous penetration testing and attack surface management to product and application security assessments.

CyTech Services

CyTech Services

CyTech provides unique services and solutions complemented with professional subject matter experts to both the Federal and Commercial sectors.

Titania

Titania

Titania provide network security and compliance software. Find your Network Security gaps before hackers do with our security & compliance tools.

CERT-UG/CC

CERT-UG/CC

CERT-UG/CC is the national Computer Emergency Response Team for Uganda, operating under the National Information Technology Authority (NITA-U)

PrimaTech

PrimaTech

PrimaTech provide process safety, cyber and process security, and risk management consulting, training and software for the process industries.

AdaptiveMobile Security

AdaptiveMobile Security

AdaptiveMobile Security, a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide.

SMiD Cloud

SMiD Cloud

SMiD encryption technology has been developed following the highest security practices to allow the data availability, integrity and confidentiality.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

Lifetech

Lifetech

Lifetech is a software development, product engineering and system integration company. Cybersecurity services include SIEM deployment and training.

National Cyber Safety and Security Standards (NCSSS) - India

National Cyber Safety and Security Standards (NCSSS) - India

National Cyber Safety and Security Standards has been started with a great vision to safeguard India from the current threats in the cyber space.

Fusion Risk Management

Fusion Risk Management

Fusion Risk Management focuses on operational resilience encompassing business continuity, risk management, IT risk, and crisis and incident management.

Appsian Security

Appsian Security

Appsian provides powerful solutions that help organizations take control of their business critical data and financial transactions.

Nitel

Nitel

Nitel is a leading next-generation technology services provider. We simplify the complex technology challenges of today’s enterprises to create seamless and integrated managed network solutions.

FusionAuth

FusionAuth

FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome.

Defence Logic

Defence Logic

Defence Logic is a cyber security company serving clients in many business sectors. Our consultancy services include Penetration Testing, Security Reviews and Monitoring.