4D offers several great avenues for keeping your business application secured. One of these avenues is to secure the data itself using 4D’s built-in encryption. To help you understand how encryption works under the hood, we are pleased to announce the release of the 4D Encryption Guide.
As our VP of Strategy, Thomas Maul said:
“Encryption is worth taking a few moments to understand how it works. And not only how to use it.”
And we couldn’t agree more because if we don’t understand it correctly, we’ll never use it to its fullest potential.
Whether you are:
- trying to gain a business advantage over your competitors
- dealing (you or your customers) with sensitive data or proprietary information, such as in the financial, healthcare, or legal industries
- just curious about the technology behind this feature
We highly recommend looking into the encryption solution offered by 4D.
As you may have noticed some time ago, 4D offers you a simple way to encrypt your data. Now, 4D also allows you to use the same algorithm as the one used for data encryption, but this time for your own needs. So now you can encrypt and decrypt any information you want, be it a single field in a table or external files.
In a previous post, we discussed how to get started with data file encryption. Now we’re going to discuss an additional way to work with encrypted data files: New 4D commands. These commands are designed to support most encryption requirements and allow you to deliver an encrypted solution to your customers.
In a previous blog post, we announced new data encryption tools for your 4D databases. Now it’s time to get our hands dirty and learn more about these tools which were designed to be as automatic as possible.
DATA is everywhere. As our lives increasingly move online, the importance of data security also increases. Customer data must be vigilantly guarded against potential threats and breaches. In many cases, using a disk encryption tool (such as Microsoft’s Bitlocker or Apple’s FileVault) provides a sufficient level of protection, but what if your customer or your CSO (Chief Security Officer) requires encryption at the database level – on a per table basis?
During 4D Summit 2018, you asked for a solution to encrypt your data and we’ve delivered. We’re excited to present new data encryption tools for your 4D databases.