Is the Senate network segregated for security?

At Data Republic we have segmented our systems into security zones based upon trust models so that in the unlikely event of a system compromise, any compromise will only affect a single system.

For example, if the portal is compromised, the portal does not have access to any data in the data lake, as this is processed in a different network zone. Communications between zones is conducted via defined web services, which are robust against malicious use.

Does Data Republic deploy isolated dynamic environments?

Data Republic has software-defined isolated dynamic environments.

Data analysts are free to write scripts to process mass data efficiently. Scripts have full access to the data imported into each dynamic environment, so the isolation we have put in place between each dynamic environment is critical to the overall security of the system.

Did this answer your question?