A New Distributed Database Adds GDPR Controls

The European Union’s General Data Protection Regulation (GDPR) will force very strict new privacy compliance rules on firms doing business in the EU, but the startup with an unfortunate company and product name has what it says is the solution to maintaining compliance.

Cockroach Labs has introduced version 2.0 of its CockroachDB distributed database, which can be run in a data center or cloud. 

The company bills the product as “the SQL database for global cloud services.” It automatically scales, rebalances and repairs databases spread over multiple locations. Version 2.0 is aimed at companies moving to the cloud, which is increasingly constrained by laws governing the countries in which cloud data centers are located. 

One of CockroachDB's new features is something the company calls “geo-partitioning of data” for automating the process of storing data close to the customer. So, the data of German customers would reside in a German data center, and so on.
While it’s meant to help keep latency down - so a person in Asia doesn’t have to wait for data from an Amazon data center in the U.S., for instance - it also helps comply with GDPR. GDPR gives European consumers the power to control how their individual data is gathered and used. More importantly, it gives them the right to demand changes to their data, including its removal.

CockroachDB 2.0 allows companies to move data across servers at the database, table, and individual row level, so it is possible to split a massive database by country of origin and create individual databases for each country, which would help comply with GDPR.

Version 2.0 also adds native support for storing, indexing, and querying JSON data types. CockroachDB 2.0 uses a Postgres-compatible JSON implementation that it claims offers 10 times the throughput of the Amazon Web Services (AWS) Aurora database, with operators for doing in-place transformations and inverted indices to speed up queries on giant volumes of data. 

This eliminates having to map out the types of requests you want to process ahead of time. It also means zero downtime for making schema changes.

NetworkWorld

You Might Also Read: 

GDPR Countdown:

What Does GDPR Mean For the Retail Industry?:
 

« The Cambridge Analytica Scandal 'highlights need for AI regulation'
The Apps That Map Violence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Lantronix

Lantronix

Lantronix is a global provider of secure data access and management solutions for Internet of Things (IoT) and information technology assets.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

Astra Security

Astra Security

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

Jiran Security

Jiran Security

Jiran Security provides data and application security solution over email, mobile device and endpoints.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

TCPWave

TCPWave

TCPWave IPAM is the world’s first acclaimed DNS/DHCP management software to pass the most stringent Information security tests.

Bio-Morphis

Bio-Morphis

Bio-Morphis Reflex solution is a paradigm shift in the approach to information systems security.

AaDya

AaDya

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses.

KT Secure

KT Secure

KTSecure’s mission is to provide proven and productive cyber security solutions and managed services, backed by our highly qualified and passionate team of experts.

OSI Security

OSI Security

OSI Security's primary services include penetration testing, security auditing, web application security testing and risk management.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

Quatrro Business Support Services (QBSS)

Quatrro Business Support Services (QBSS)

QBSS is a tech-enabled outsourcing firm that’s changing the way companies think about finance, accounting, human resources and technology services.

Corona IT Solutions

Corona IT Solutions

At Corona IT Solutions, our team of specialists in networking, wireless and VoIP are dedicated to providing proactive monitoring and management of your IT systems.

ADNET Technologies

ADNET Technologies

ADNET Technologies is a SOC 2, Type II Compliant IT management and cybersecurity firm.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

Defence Logic

Defence Logic

Defence Logic is a cyber security company serving clients in many business sectors. Our consultancy services include Penetration Testing, Security Reviews and Monitoring.