Securing embedded applications
Data security is most effective when it is built-in to applications, rather than relying on system-level security measures alone. An application can protect data by storing it in an encrypted database file, which can either be opened directly or accessed through a separate database server process. If data is replicated or accessed remotely, network communications must also be encrypted with a secure protocol that prevents eavesdropping and session hijacking. ITTIA DB SQL provides these important security features in an embedded database library.