Filter access to data is a must-have feature to prevent malicious access to your application.
So far, you could expose or not expose as a REST resource a dataclass and some of its attributes. It was already a convenient means to restrict access to your data. Still, we’re thrilled to deliver in the v19R8 a powerful and fully customizable system to protect your data from unauthorized users. A system to protect your data depends on who is accessing it and which data is accessed.
4D offers several great avenues for keeping your business application secured. One of these avenues is to secure the data itself using 4D’s built-in encryption. To help you understand how encryption works under the hood, we are pleased to announce the release of the 4D Encryption Guide.
As our VP of Strategy, Thomas Maul said:
“Encryption is worth taking a few moments to understand how it works. And not only how to use it.”
And we couldn’t agree more because if we don’t understand it correctly, we’ll never use it to its fullest potential.
Whether you are:
- trying to gain a business advantage over your competitors
- dealing (you or your customers) with sensitive data or proprietary information, such as in the financial, healthcare, or legal industries
- just curious about the technology behind this feature
We highly recommend looking into the encryption solution offered by 4D.
Security is a fundamental topic for today’s business solution systems. At 4D, we understand its importance; that’s why we keep delivering features that tackle this topic.
And with 4D v19 R3, 4D now uses a stronger hashing algorithm for user passwords. Let’s find out more!
4D solutions have always been safe and stable. This is because 4D invests heavily in developing and updating security features. 4D continues this focus in 4D v18 R4 with a new feature to further enhance its security toolkit. A new class providing a set of methods to perform common cryptographic operations is now available: CryptoKey class.
Monitoring access to your mobile app is a very important capability that deserves further consideration. Email validation is one of the simplest and most secure ways to determine the authenticity and legitimacy of the person trying to log into your app. 4D for iOS enables you to easily handle this validation process by verifying that an email comes from whom it claims to be sent from, and by allowing you to block harmful uses of the email.
In a previous post, we discussed how to get started with data file encryption. Now we’re going to discuss an additional way to work with encrypted data files: New 4D commands. These commands are designed to support most encryption requirements and allow you to deliver an encrypted solution to your customers.
In a previous blog post, we announced new data encryption tools for your 4D databases. Now it’s time to get our hands dirty and learn more about these tools which were designed to be as automatic as possible.
DATA is everywhere. As our lives increasingly move online, the importance of data security also increases. Customer data must be vigilantly guarded against potential threats and breaches. In many cases, using a disk encryption tool (such as Microsoft’s Bitlocker or Apple’s FileVault) provides a sufficient level of protection, but what if your customer or your CSO (Chief Security Officer) requires encryption at the database level – on a per table basis?
During 4D Summit 2018, you asked for a solution to encrypt your data and we’ve delivered. We’re excited to present new data encryption tools for your 4D databases.
Security and Data Protection is an incredibly important topic and yet it’s often overlooked until something goes wrong!
4D is secure, straight out of the box, thanks to the integration of the latest technologies and practices such as:
In this dedicated GDPR guide of best practices, 4D helps you to build your GDPR compliance and get you started with your General Data Protection Regulation journey.
In this blog post, we’ll focus on a specific key step of this journey: discovery and how 4D can help you create an overview of existing personal data, via a built-in functionality. We’ll even provide you a code example!