Meet Us at ODSC West in San Francisco from Oct 31-Nov 1
The Iguazio MLOps Platform is designed with enterprise security, resiliency and functionality in mind. To support both an agile and secure environment, the Platform offers a centralized and integrated pane for IT security administrators to manage users and policies, allowing data scientists and engineers to work in a flexible ecosystem without worrying about security.
Enterprise-level security is an integral part of the Iguazio MLOps Platform. The most secure way to support enterprise privacy policies is to run in the customer’s account, giving them full control of security rules and policies.
The Iguazio MLOps platform is deployed on the customer’s network (on any cloud VPC or on-prem in a data center), and not as a SaaS solution. To ensure data privacy, Iguazio does not store customer data on its servers: customer data is stored in customer accounts only.
With Iguazio, data scientists and engineers work in a secure but flexible ecosystem. The Iguazio MLOps Platform offers:
The Iguazio MLOps Platform offers a highly secured environment without a loss in performance. The Iguazio MLOps Platform offers a multi-layered data-authorization scheme, where each data-service operation—read, write, update, delete, and so on—is processed and examined in three layers, to ensure that the environment is protected and secured. Each layer can add to the restrictions of the previous layer:
As a preliminary step to accessing data in the platform, a user must have the Data Management Policy. This policy enables the implicit creation of data sessions, which are used for securing access to data.
Used to define fine-grained priority-based policies for restricting access to determine whether to grant or restrict access to a specific data resource and to what extent.
POSIX file-system authorization on all types of objects: objects, files, NoSQL, and streams.
The Platform implements multiple mechanisms to keep your data safe:
Iguazio takes a rigorous and proactive approach to platform security on an ongoing basis, to address new vulnerabilities.