A Data Mesh creates a layer of connectivity that abstracts away the complexities of connecting, managing and supporting an application’s access to remote data. It is used to stitch together data held across multiple environments. The premise of a data mesh is that it uses software to connect environments no matter where it lives, or who controls each environment.
So a Data Mesh can be used to connect centralized applications to a variety of distributed data sources. But as these resources become more diversified and distributed the natural question that arises is….how is all of this secured? And is that security as strong as legacy technologies such as VPN.
First, because Data Meshes are purpose-built for connecting applications and data between multiple organizations, they inherently solve different (and more complex) problems than a run of the mill VPN.
Securing the transit of data between different organizations presents challenges that don’t exist when one organization owns both sides of a networked connection (ie. branch-to-branch networking). This is a unique challenge that differentiates a Data Mesh.
It is for this use case that Trustgrid’s Data Mesh Platform built many of its security features.
What does this mean? It means that every element of the platform has been built around securing sensitive data, from least privileged access to encryption to the maintenance of the system.
Security Features of a Properly Built Data Mesh
- Zero Trust authorization of all traffic
- Private point-to-point traffic, with global visibility
- Global policy enforcement
- TLS Mutual Authentication
- Certificate-based authentication
- Remote updates and patching
- Access control and logging with ability to push to other security applications
The beauty of this is that ALL of these security features are baked into our Data Mesh platform. In other words, every Data Mesh that our customers build has these tools available without requiring security experts to implement third-party tools.
And better yet, all of these security features are designed for speed and scale of deployment. Compared with legacy technologies such as VPN the time spent configuring and maintaining connections with advanced security is only a fraction with a Data Mesh.
New Data Mesh connections can be configured in hours (not weeks). Hundreds of connections can be simultaneously patched at once (not one by one) and Zero Trust networking is designed into the solution as a default configuration.
Combining all of this with plug-and-play deployments that easily traverse firewalls means that not only is a Data Mesh more secure than what many organizations are using for connectivity today, but it also makes the life of an application provider easier while doing it.
Read our white paper: Data Mesh Platform Security