Datalog QL

Secure by Design

Book a QL Demo

Datalog QL

Integrated Software Management - High Security, Fire, Safety & Building Technologies

Book a QL Demo

DATALOG QL

Secure by Design

In today’s rapidly developing digital landscape, the concept of ‘Secure by Design’ has never been more critical.

As technology advances, so do the sophistication and pervasiveness of security threats. To address this, adopting a proactive approach that integrates security measures from the initial design phase of software development is essential. ‘Secure by Design’ ensures that systems are inherently secure, minimising vulnerabilities and handling risks right from the outset. Read on to learn more about the specifics of how Datalog QL, our latest sixth-generation software management solution, embodies this principle.

Why is Secure by Design Important for Security Integrity?

Holistic Security: ‘Secure by Design’ principles make security an integral part of the entire system lifecycle. Systems designed without security considerations from the outset may have inherent weaknesses that are difficult, if not impossible, to rectify post-deployment.

Risk Mitigation: Prioritising security at every development phase significantly reduces the risk of threats and data breaches. By anticipating potential attack vectors, we proactively safeguard sensitive data and maintain user trust.

DATALOG QL

A Paradigm of Security

Datalog QL’s architecture exemplifies the ‘Secure by Design’ principle, incorporating advanced cyber security measures across its operation. Here are some key features:
Cyber-Shield
  • Purpose: Securing all endpoint connections.
  • Functionality: Cyber-Shield is a key security component in QL that has been built with the increasingly hostile cyber-environment in mind. It follows NcSC (National Cyber Security Centre) Framework guidance: Positioned at the boundary of the higher security zone where it is necessary to import and trust data from lower, potentially compromised, security zones (integrated devices). Every message received from the lower security zones is scanned by Cyber-Shield to validate that its content is both safe, correctly formatted, and that it originates from a trusted source. Each message is then converted into the simplest appropriate alternate protocol, to create an ‘air gap’ which makes protocol-based attacks and fuzzing more difficult.
SSL Security
  • Purpose: Safeguarding data in transit.
  • Implementation: QL employs SSL (Secure Sockets Layer) technology to encrypt network communication. This protocol ensures that sensitive information remains secure, preventing interception or tampering by cyber adversaries.
SQL Database Encryption
  • Enhanced Performance and Scalability: QL’s ‘Broswer Workstations’ feature harnesses the robust security of the SQL database, ensuring data integrity and protection.
  • Secure Encryption: Data retrieval, filtering, and analyses are secured through robust encryption methods.
Traceable Data and Configuration
  • Real-time Accountability: Datalog QL ensures that all new and modified configuration changes are recorded, providing transparency and auditability.
  • Quick Identification and Response: Real-time operational status allows prompt responses to potential security incidents. An audit trail records who did what and when.

Datalog QL

The emphasis on Secure by Design within Datalog QL transcends mere best practices.

It establishes a formidable higher standard for security integrity in integrated software management solutions. By placing security at the core of QL, we have strived to ensure that QL is resilient, reliable, and ready to navigate the complexities of a potentially compromised environment.

Book a QL Demo