Select a data source type – enterprises

This article is intended primarly for enterprises who use the features provided by our Team edition.

To assist with selecting the appropriate data source, here is a set of concerns and the list of data sources that can serve in such a context.

When choosing a non-on-premises data source, it is important to account for the security of data both at rest and in transit. It is strongly recommended to further encrypt data using a master key for file-based solutions or a security providerfor advanced data sources, ensuring that only authorized parties can access the data.

CONCERN Devolutions Server Devolutions Hub Business
Self-hosted data
Cloud-hosted data
Unaccessible database to end users
Encryption at rest and in transit
Zero-knowledge on sensitive data
Privileged Access Management (PAM) module Note 1
AD accounts used for authentication
AD group membership used to assign permissions
Activity logs
Data accessible globally Note 2
Just-in-time (JIT) connections via Devolutions Gateway

Notes

Note 1

The Privileged Access Management module in Devolutions Hub Business is currently in beta development. For further details, please contact our sales department.

Note 2

Exposing a Devolutions Server instance to the Internet without protection from DDoS attacks is not recommended. It is essential to use strong passwords and obscure account names that cannot be easily deduced through social data mining techniques.

Devolutions Forum logo Give us Feedback