This short video explains why companies use Hazelcast for business-critical applications based on ultra-fast in-memory and/or stream processing technologies.
Stream processing is a hot topic right now, especially for any organization looking to provide insights faster. But what does it mean for users of Java applications, microservices, and in-memory computing?
In this webinar, we will cover the evolution of stream processing and in-memory related to big data technologies and why it is the logical next step for in-memory processing projects.
Now, deploying Hazelcast-powered applications in a cloud-native way becomes even easier with the introduction of Hazelcast Cloud Enterprise, a fully-managed service built on the Enterprise edition of Hazelcast IMDG. Can't attend the live times? You should still register! We'll be sending out the recording after the webinar to all registrants.
Hazelcast's dedication to maintaining a robust and stalwart security profile for customers, partners, and the open source community.
At Hazelcast, security is a cornerstone of our values and a consideration that underpins everything we do, from the hiring and training of our own personnel to the way we build our products, select and utilize vendor offerings, and respond quickly to reported vulnerabilities. We are committed to providing a safe and quality user experience for our customers, partners, and open source community members.
For us, security begins in our own backyard, with our staff and general operations.
Hazelcast Enterprise IMDG and Hazelcast Enterprise HD IMDG include a number of features to enhance the security of your application. Both offer a rich set of JAAS-based (Java Authentication and Authorization Service) security features that you can use to authenticate cluster members and clients, in order to perform authorization checks on client operations.
For more information see:
Hazelcast Security Features
How to Implement Security Features of Hazelcast Enterprise Webinar
See the section on Security and Hardening in the Deployment and Operations Guide
Hazelcast makes use of cloud-based business services from reputable vendors. Below you will find easy access to additional information about their security practices and policies.
Hazelcast uses G Suite for email, calendaring, and document collaboration. + G Suite Security
Hazelcast uses Zendesk for customer support tickets.
+ Zendesk Security
Hazelcast uses Salesforce.com for CRM.
+ Salesforce Security
Hazelcast uses Github for distributed sourcecode version control.
+ GitHub Security
Hazelcast is committed to providing our users with secure software they can rely on. We promptly investigate all reports of security vulnerabilities affecting Hazelcast products. If you believe you have found a security vulnerability, we strongly encourage you to report it to us immediately, and we ask your help in working with our team before disclosure in a public forum. This allows us to address the issue most effectively for the benefit and protection of all users.
Using either method, your report will be received promptly by Hazelcast staff.
Our standard process is:
We greatly appreciate your partnership in helping us provide the strongest security posture for all users. Thank you.