Benefits of Enterprise-Level Security
Comply with security requirements.
Optimize workflows while ensuring data security.
Ensure data can be analyzed but not compromised.
Feature Building Blocks
Secure your knowledge graphs, Orchestra workflows, and machine learning pipelines using Hume's role-based access control (RBAC).
Leverage existing users and roles from your Active Directory (AD), LDAP or Kerberos instances.
Reduce the user and access management overhead by enrolling Hume and Neo4j into your organisation's single sign-on (SSO).
Every user action/operation in Hume is logged for auditing purposes.
Protect your data processing workflows and quickly recover from errors by using Hume failure handlers.
Expose only what users need to perform their analysis by splitting large knowledge graph schemas into multiple dedicated subgraphs (Perspectives).
All of Hume's communications are encrypted using TLS to provide security over the network.
Hume is regularly penetration tested by customers, as well as independent security scanning providers.
A white paper is available, evaluating security controls relevant to the acquisition and integration of Hume into an existing FedRAMP High environment.
GraphAware operates a Secure Software Development Lifecycle for Hume.
GraphAware has an up-to-date Incident Response Plan in order to support customers in case of a security breach.
Get a Live Demo
Seeing is believing! Schedule a live demo with one of our specialists at your convenience.
What can I expect?
- A brief conversation to discuss your organisation's needs and requirements
- Live demonstration of Hume tailored to the way you work
- All your questions answered to make sure you have all the information you need
- No commitment whatsoever
See for yourself! Fill out the form to schedule a free demo customised for your needs, or give us a call.