<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inquiry Regarding Data Encryption in Logstream Data Replication in Qlik Replicate</title>
    <link>https://community.qlik.com/t5/Qlik-Replicate/Inquiry-Regarding-Data-Encryption-in-Logstream-Data-Replication/m-p/2460297#M11434</link>
    <description>&lt;P&gt;Is your replication going thru a VPN? I'd really only worry if replication is going over the public internet (unsure how that'd even happen) or over Telco circuits thru countries you don't trust.&lt;/P&gt;</description>
    <pubDate>Fri, 07 Jun 2024 15:15:32 GMT</pubDate>
    <dc:creator>krunide9</dc:creator>
    <dc:date>2024-06-07T15:15:32Z</dc:date>
    <item>
      <title>Inquiry Regarding Data Encryption in Logstream Data Replication</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Inquiry-Regarding-Data-Encryption-in-Logstream-Data-Replication/m-p/2451917#M11062</link>
      <description>&lt;P&gt;Hi team,&lt;BR /&gt;In a data replication using Logstream, could you indicate if the information is sent encrypted to the Qlik server from OnPremise and if it is also encrypted when it is replicated from the server to the destinations, in this case S3 and Aurora, and if it is only encrypts the channel through which it is sent.&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 00:53:09 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Inquiry-Regarding-Data-Encryption-in-Logstream-Data-Replication/m-p/2451917#M11062</guid>
      <dc:creator>FrancoHR</dc:creator>
      <dc:date>2024-05-14T00:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: Inquiry Regarding Data Encryption in Logstream Data Replication</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Inquiry-Regarding-Data-Encryption-in-Logstream-Data-Replication/m-p/2453064#M11102</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Replicate users guide includes a detailed information about different security aspects when working with Replicate product - following is a link to the documentation:&lt;BR /&gt;&lt;A href="https://help.qlik.com/en-US/replicate/November2023/Content/Replicate/Main/Security/replicate_security.htm#ar_security_122242236_1700512" target="_blank"&gt;https://help.qlik.com/en-US/replicate/November2023/Content/Replicate/Main/Security/replicate_security.htm#ar_security_122242236_1700512&lt;/A&gt;&lt;BR /&gt;As indicated in the&amp;nbsp; subsection (under the chapter of the link above ) 'Securing connections to endpoints' (&lt;A href="https://help.qlik.com/en-US/replicate/November2023/Content/Replicate/Main/Security/Secure_Connections_to_Endpoints.htm#ar_security_122242236_1702277" target="_blank"&gt;https://help.qlik.com/en-US/replicate/November2023/Content/Replicate/Main/Security/Secure_Connections_to_Endpoints.htm#ar_security_122242236_1702277&lt;/A&gt;) :&lt;BR /&gt;"&lt;SPAN class="mc-variable Replicate.Attunity variable"&gt;Qlik&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;does not implement the network protocol (see important exceptions below) and for this reason,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Replicate.Product variable"&gt;Qlik Replicate&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;generally relies on the vendor of the source or target endpoint to offer encryption. When setting up endpoint connections, the user is able to specify any connection properties required for the use of encryption; these properties are, invariably, vendor-specific properties. In some cases, use of encryption requires system-level settings (such as adding a certificate to the machine trust store) which are outside of the scope of&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Replicate.Product variable"&gt;Qlik Replicate&lt;/SPAN&gt;&lt;SPAN&gt;. Users are referred to the operation manual of the source or target endpoint for details on how to set up encrypted client communication with the server."&lt;BR /&gt;For further information please refer to the above sections in the documentation.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Orit&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 07:57:04 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Inquiry-Regarding-Data-Encryption-in-Logstream-Data-Replication/m-p/2453064#M11102</guid>
      <dc:creator>OritA</dc:creator>
      <dc:date>2024-05-16T07:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: Inquiry Regarding Data Encryption in Logstream Data Replication</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Inquiry-Regarding-Data-Encryption-in-Logstream-Data-Replication/m-p/2460297#M11434</link>
      <description>&lt;P&gt;Is your replication going thru a VPN? I'd really only worry if replication is going over the public internet (unsure how that'd even happen) or over Telco circuits thru countries you don't trust.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2024 15:15:32 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Inquiry-Regarding-Data-Encryption-in-Logstream-Data-Replication/m-p/2460297#M11434</guid>
      <dc:creator>krunide9</dc:creator>
      <dc:date>2024-06-07T15:15:32Z</dc:date>
    </item>
    <item>
      <title>Re: Inquiry Regarding Data Encryption in Logstream Data Replication</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Inquiry-Regarding-Data-Encryption-in-Logstream-Data-Replication/m-p/2460459#M11440</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/302012"&gt;@krunide9&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To add more to previous Tse Comments. Most of replication tools extract the changes from source and push them into target endpoints. they do it by their internal engine.&amp;nbsp;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class="mc-variable Replicate.Attunity variable"&gt;Qlik&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;does not implement the network protocol (see important exceptions below) and for this reason,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Replicate.Product variable"&gt;Qlik Replicate&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;generally relies on the vendor of the source or target endpoint to offer encryption&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Sushil Kumar&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jun 2024 01:17:06 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Inquiry-Regarding-Data-Encryption-in-Logstream-Data-Replication/m-p/2460459#M11440</guid>
      <dc:creator>SushilKumar</dc:creator>
      <dc:date>2024-06-09T01:17:06Z</dc:date>
    </item>
  </channel>
</rss>

