View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Networks
July 30, 2013

MongoDB secured with a little help from Red Hat

Partnership pays off

By Jason Stamper

10gen – the company behind the open source document-oriented MongoDB database – and Red Hat announced an integrated offering that they say extends its security.

MongoDB has had more than 4 million downloads, 50,000 Online Education registrations, 15,000 MongoDB User Group (MUG) members and 10,000 attendees at MongoDB global events in 2012.

10gen and Red Hat have integrated MongoDB’s security management capabilities with the Identity Management features included in Red Hat Enterprise Linux. As a result, IT departments now have access to centralised user, password and certificate management, the companies said, and are empowered to provide secure MongoDB deployments that are integrated into their back office infrastructure.

"By integrating MongoDB with Red Hat’s proven security infrastructure, we are adding an additional layer of protection on top of MongoDB, which is important to many of our customers, particularly within financial services and federal government," said Max Schireson, CEO at 10gen. "10gen’s collaboration with Red Hat is a nice step forward for our company, customers and the overall NoSQL community."

Red Hat includes standards-based identity management in Red Hat Enterprise Linux to centrally manage individual identities and their authentication, authorisation and privileges/permissions to increase the security of customer systems and help to ensure that the right people have access to the right information when they need it.

"Identity and authentication are complex problems, and we’re pleased to collaborate with 10gen to bring the Identity Management capabilities within Red Hat Enterprise Linux to MongoDB," said Jim Totton, vice president and general manager, platform, Red Hat. "With our Identity Management capabilities, MongoDB users are offered additional assurance that the right users get access to systems, data, and applications quickly and securely."

Content from our partners
How to turn the evidence hackers leave behind against them
Why food manufacturers must pursue greater visibility and agility
How to define an empowered chief data officer

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU