Redis 6.0

Redis Enterprise 6.0 with Redis 6 Is Available Now!

The most secure Redis experience

Redis Enterprise 6.0 helps developers and operations teams secure their Redis deployments and build stream-based architectures spanning the globe.

Redis Enterprise 6.0 improves data security using Redis access control lists (ACLs). You can reduce operational complexity in your Redis deployments by combining Redis ACLs with role-based access control (RBAC).

Redis Enterprise 6.0 builds on the many new security capabilities introduced in Redis 6.0. With ACLs, you can create “users” and limit those users’ access to only specified commands and keys. This prevents purposeful or accidental actions that could damage your data. Redis Enterprise extends ACLs by applying role-based access control on the data path alongside the existing RBAC for the management path. RBAC also lets you templatize permissions into roles, simplifying the burden of repeatedly configuring permissions.

Redis Enterprise 6.0 is available as a software download or as a managed service in Redis Enterprise Cloud.

Benefits

Need-based access

Leverage access control lists (ACLs) to enable specific levels of access for different users, roles, and services based on their particular requirements.

Reduced attack surface

ACLs improve operational security by limiting access to the keyspace and the operations that can be performed.

Easy secure scaling

Role-based access control (RBAC) reduces administrative overhead and allows easy and consistent scaling.

Use cases

Operational security

Role-based access control lets customers reduce the impact of users’ careless actions, making operational security easier to manage. It’s now easier than ever to ensure your data is not viewed or modified without the proper user authentication.

Reduce attack surface

RBAC can restrict the commands and keys available to a given user, thereby reducing the possible attack surface, making it harder for bad actors to get access to your systems.

Compliance

Meet enhanced security standards and compliance requirements by applying custom RBAC privileges.

Scaling large deployments

Role-based access control lowers scaling and administrative complexity and overhead. When provisioning new databases and users, predesignated roles make security settings a one-time task.

Redis Streams now with Active-Active
globe-spanning streams

Redis Streams for Active-Active lets developers build and deploy applications across the globe by seamlessly synchronizing data and reconciling changes among databases spread across multiple geographic regions—for geo-distribution or as a part of a disaster recovery architecture.

Redis Streams’ CRDT (conflict-free replicated data types) guarantee your stream sequence and entry uniqueness, while assuring that all entries will be processed while concurrently reading and writing to and from your streams in multiple replicas.

Use cases

Inventory and pricing management

Use Redis Streams in Active-Active geo-replicated deployments for sharing real-time inventory and pricing modifications across multiple replicas in multiple regions. Redis Enterprise 6 enables teams to stream data from headquarters to remote locations, for example, to make updates at the speed of Redis while making sure data will resolve in a predictable manner even in the event of network problems.

Data sharing among multiple call centers

Customer calls can be handled by centers in different regions and related data can be seamlessly shared whatever the location when using Redis Streams in an Active-Active deployment. No matter the distance or concurrent writes, sequences of events are maintained and will resolve in a predictable manner, leading to improved availability of information and ensuring that each call is handled appropriately.