dot Stop testing, start deploying your AI apps. See how with MIT Technology Review’s latest research.

Download now

Access control lists (ACLs) allow for control over commands and key access.

Benefits

Access control

Enforce least-privilege access using access control lists (ACLs) for keys and commands.

Built-in encryption

Redis Enterprise can help protect your data through its entire lifecycle.

Accountability

Ensure compliance and accountability with Redis Enterprise’s full audit log of administrative actions.

Enhanced disaster recovery

Redis Enterprise comes with enhanced disaster-recovery features, including resource limits and advanced clustering and sharding.

Up to 5-nines availability

Implement geographically distributed disaster recovery and high availability (99.999%) strategies with Redis Cloud.

Use external identity providers

Redis Enterprise can integrate with your external identity provider for its control plane access so you can enforce your security policies.

Use cases

Securing Redis

Redis Enterprise removes the configuration complexity of securing Redis. Using role-based access control (RBAC), you never have to provision a persona twice. Simplify Redis security using built-in and customizable access controls assigned based on a user’s role—even across multiple databases.

Security hardening

Redis Enterprise hardens Redis by blocking commands and is designed to help protect against out-of-memory events and Lua scripts from accessing the host operating system. The result? Spend less time worrying about preventing attacks and more time developing innovative applications.

Failure resistance

Redis Enterprise helps you sleep at night. With sharding and failover strategies, built-in capabilities to migrate shards between nodes, and protection from out-of-memory events, Redis Enterprise has got your back.

Operational security

Reduce the cost of mistakes by implementing the principle of least privilege. Robust role-based access control helps ensure that developers and admins don’t accidentally—or on purpose—drop your database.

Want to learn more?

Watch our recent Tech Talk — Buy vs Build: Security & access management in Redis Open Source vs. Redis Enterprise

Related resources