Confluent Developer ft. Tim Berglund, Adi Polak & Viktor Gamov cover image

Security for Real-Time Data Stream Processing with Confluent Cloud

Confluent Developer ft. Tim Berglund, Adi Polak & Viktor Gamov

00:00

Is There a Governance Issue for This Data?

Confluent uses data breach records to build a kill chain of how an attacker could get into your system. The company also works with security vendors like CrowdStrike, Tenable and Scanning. Confluent keeps customer data separate from another customers when it's there to all data.

Play episode from 36:58
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app