Security that Surpasses Traditional Platforms
StarfishETL is an iPaaS (integration Platform as a Service). Unlike traditional integration platforms, an iPaaS is managed by the cloud provider. The provider keeps security protocols current via timely maintenance and updates. They can also enable advanced security controls like data encryption, threat detection, and access controls while offering more compliance certifications than a traditional platform. StarfishETL security features meet regulatory requirements, help avoid threats, and ensure compliance. Read on for additional information.
GDPR Compliance
GDPR is a data protection and privacy regulation that governs how the personal data of individuals in the EU and EEA is processed. StarfishETL is GDPR compliant, allowing customers to easily request their personal data related to StarfishETL processes.
Learn More About StarfishETL GDPR
StarfishETL's Additional Safeguards
Threat Detection
StarfishETL hosts its servers on AWS, which continuously monitors to identify threats within the cloud environment. StarfishETL’s Cartographer Operations team also monitors activities using documented procedures.
Access Controls
Access control methods ensure only authorized users can access sensitive data. StarfishETL provides multi-factor authentication and role-based access control.
Encryption
StarfishETL does not store any data. The platform uses industry-standard SSL encryption algorithms and secure AES 224-bit encryption to protect data at rest and in-transit. Passwords and maps are stored in an encrypted database.
Safe Local Connections
The StarfishETL Ray tool allows clients with on-premises or in-house solutions to access data without disabling their firewall protections, thereby eliminating the risk of exposing data during a project.
Infrastructure Protection
StarfishETL iPaaS servers are hosted on AWS in the Eastern US. AWS data centers and networks are architected to protect information, identities, applications, and devices. The StarfishETL Cartographer Operations team follows documented procedures when accessing these servers to ensure secure access.
Audit Trails
StarfishETL maintains an audit trail of all data activities to identify risks and mitigate security concerns. These activities include information about who accessed data, when data was accessed, and the changes that were made.
Checksums
StarfishETL uses checksums to prevent man-in-the-middle attacks. Checksums are used to verify that data hasn't been altered or corrupted by comparing the generated checksum with the original one.