Security & Confidentiality
As a pure-play cloud offering, security, confidentiality, availability and the privacy of data are fundamental to Qubole. Not only do we leverage the inherent capabilities of public clouds in these four areas, but we provide additional capacities on top of that.
- Stronger compliance
- All data resides in user cloud accounts
- Strong encryption throughout QDS
- Flexible and granular user access roles
- Transparent availability and performance reporting
Ethical Disclosure of Security Issues
We take security very seriously at Qubole. If you believe that you have discovered a vulnerability or an exposure of sensitive data, please report it to [email protected]. We will investigate your issue immediately and respond in a timely manner.
We ask that you give us sufficient time to address the matter and that you do not disclose our sensitive data, violate our privacy issues, or disrupt our service, in the meantime.
Steps to report your issue:
- Send an email to [email protected]
- Include in the subject line: Security Report
- Clearly state the steps to reproduce the issue or identify the specific location of the issue (sending screenshots and video are much appreciated!)
- State the result of the vulnerable issue
Thank you so much for taking the time to bring this issue to our attention!
More information on how QDS is secure
Qubole on Amazon AWS: Security and Compliance
Five Ways to Optimize Big Data Processing Costs in the Cloud
3 Steps to Justify & Reduce The Cost of Your Data Lake
Qubole is committed to ensuring that the Qubole Data Service will be available 99.9% of the time, not including scheduled, communicated maintenance windows. Qubole continuously monitors our commitment to availability and provides transparent status updates.
|QDS on AWS | Global
|QDS on AWS | SOC2 compliant | Global
|QDS on Azure | Global
|QDS on Oracle Bare Metal Cloud | Global
|QDS on AWS | Central Europe
|QDS on AWS | India (Mumbai)
Legal & Compliance
Qubole understands that the confidentiality, integrity, and availability of our customers’ information are vital to their business operations, as well as to our own success. We use a multi-layered approach to protect that key information, constantly monitoring and improving our application, systems, and processes to meet the growing demands and challenges of security for cloud-based products.
Global Audit Compliance
Data Residency Compliance
(EU Directive 94/46/EC on Data Protection)
(Information Technology Act 2000 (21 of 2000) section 43A subsection 6 and 7)