Every day, large, multinational brands rely on Lore IO to accelerate their pace of innovation. Customers are transporting sensitive, mission-critical data to their business users and applications using Lore IO’s no-ETL, data lake virtualization platform. We invite you to examine the information security safeguards and internal controls we’ve put in place, to ensure that your data remains yours.
Lore IO supports LDAP and IAM integrations and requires users to sign into the Lore IO web interface with their LDAP/IAM credentials. Only approved users can access the interface.
Lore IO integrates with any encrypted storage, such as encrypted HDFS or S3 system. All data connections and transmissions are secured via TLS.
Logs are kept at all account levels for changes made to user accounts for both Lore IO administrators and end users, including web platform login credentials and events.
Lore IO implements data replication in Hadoop clusters and database backups, to mitigate data loss for mission critical applications.
Lore IO supports Kerberos authentication when interacting with the Hadoop cluster.
Lore IO supports impersonation so that all system access is logged against the user accessing it, including in downstream systems.
Lore IO supports data masking, and column- and row-level access permissions for all users.
Access to Lore IO’s data centers is restricted to authorized administrators, and monitored by video surveillance and security personnel 24/7 onsite.
Lore IO’s data centers are certified ISO 27001::2005 for providing and operating dedicated cloud computing infrastructures. Lore IO’s data centers are based on ISO 27002 and ISO 27005 security management and risk assessment norms and associated processes.
Contact us to hear about the security investments we are making and the safeguards we are putting in place.