Data Security

Introduction

Database security is critical for protecting sensitive information such as customer records, financial data, and other confidential information from unauthorized access, alteration, or loss. This page outlines the security measures implemented in Visual DB and provides technical guidance for securing your data.

Deploy on your own infrastructure

Visual DB is available as a Software-as-a-Service (SaaS) solution, but can also be self-hosted on your own infrastructure. When you self-host, your data stays within your infrastructure—whether on your intranet, private cloud, or local servers. This deployment model is particularly valuable for organizations with strict data residency requirements, regulatory compliance needs (such as HIPAA), or internal security policies that require on-premises data storage. Self-hosting also eliminates the need to expose your database to the internet, allowing you to connect to internal databases while keeping all data traffic within your controlled network perimeter.

Defense in depth

Visual DB implements a layered security approach where multiple independent security controls work together to protect your data. Database credentials are encrypted before storage and never displayed to users, even authorized ones. When self-hosted, encryption keys remain exclusively on your server. Data retrieved from databases is not cached and passes directly through to the client without persistent storage.

When self-hosting, ensure all traffic uses SSL/TLS encryption to protect data in transit between users and your Visual DB instance. Scripts for configuring SSL/TLS in intranet deployments are available here. If your database is hosted in the cloud, we recommend implementing IP address restrictions to limit connections to trusted sources only. You should also periodically rotate database passwords and encryption keys—code to generate your own encryption key is available here.

This multi-layered strategy ensures that if one security control fails, others remain in place to protect your data.