Why Cirata Symphony™
Simplicity
With Cirata Symphony, you can orchestrate operations across all your systems in a consistent way. It replaces the need to integrate separate adapters for each data system with a single, unified approach to access, security, and integration.
Without a data orchestration platform, you will need to create custom, manual connections between systems. This leads to fragile workflows that are hard to scale, maintain, and debug.
With Cirata Symphony, all of this fragile, custom effort is eliminated. Your data systems are coordinated with consistency, security and reliability, giving you full control of them directly from the platforms that you are already using.
Extensibility
Symphony is flexible and easy to extend. You can add new features at any time using extensions, which connect to external systems like storage, compute platforms, language models, or data transfer tools.
Cirata provides a collection of extensions for important data requirements, including:
- The Data Migrator extension for scalable, live data transfer,
- The Ice Flow extension, which monitors and replicates data assets in the interoperable Apache Iceberg table format,
- The Ice Chest extension, with which you can manage the placement and tiering of your interoperable tables in Iceberg catalogs to meet business SLAs or optimize disaster recovery activities, and
- The Cirata Intelligence extension, which integrates Symphony with language models to apply artifical intelligence techniques easily to your data systems.
You can also implement your own extensions to integrate with systems that may be unique to your environment. Cirata provides libraries for doing this easily using Java, Go and Python.
Interoperability
Cirata Symphony gives you full access to your data systems through REST APIs from a single endpoint, secure high-speed messaging, the Symphony user interface, and client libraries for use in notebooks or custom code.
Functionality added by extensions is made available immediately and automatically to all of the interfaces, APIs, and libraries provided by Symphony. There is no extra step after running an extension that is needed to begin using it.
Security
Every Symphony user controls who can access the systems it enables. Access is granted through tokens linked to API keys, each with customizable, fine-grained capabilities. Both clients and extensions need a token to connect to Symphony, and users can update the capabilities of an API Key at any time.
Symphony employs a zero trust security model. Instead of assuming anything inside a security perimeter is safe, zero-trust requires continuous verification of every user, extension, and operation, regardless of location. Zero-trust security protects against internal threats and compromised systems. Even if attackers get past other defenses, their access is limited. This approach is essential for modern data setups across cloud, remote, and multi-platform environments.
For more benefits, functionality, demos, and more visit www.cirata.com/symphony