Confluent announces Stream Governance Additions

Confluent, Inc., the data streaming pioneer, today announced a new tier of capabilities for Stream Governance, the industry’s only fully managed governance suite for Apache Kafka and data in motion. With Stream Governance Advanced, organizations can resolve issues within complex pipelines easier with point-in-time lineage, discover and understand topics faster with business metadata, and enforce quality controls globally with Schema Registry. With more teams able to safely and confidently access data streams, organizations can build critical applications faster.

“Businesses heavily rely on real-time data to make fast and informed decisions, so it’s paramount that the right teams have quick access to trustworthy data,” said Chad Verbowski, Senior Vice President of Engineering, Confluent. “With Stream Governance, organizations can understand the full scope of streams flowing across their business so they can quickly leverage that data to power endless use cases.”

Stream Governance Advanced: Point-in-Time Lineage Insights, Sophisticated Data Cataloging, and Global Quality Controls

Data streaming use cases are rapidly growing as real-time data powers more of the business. This has caused a proliferation of data that holds endless business value if teams are able to confidently share it across the organization. Building on the suite of features initially introduced with Stream Governance Essentials, Stream Governance Advanced delivers more ways to easily discover, understand, and trust data in motion. With scalable quality controls in place, organizations can democratize access to data streams across teams while achieving always-on data integrity and regulatory compliance.

New capabilities include:

  • Point-in-time playbacks for Stream Lineage: Troubleshooting complex data streams is now faster and easier with the ability to understand where, when, and how data streams have changed over time. Point-in-time lineage provides a look back into a data stream’s history over a 24-hour period or within any one-hour window over a seven-day range. Teams can now see what happened on, for example, Thursday at 5pm, when support tickets started coming in. Paired with the new ability to search across lineage graphs for specific objects such as client IDs or topics, point-in-time lineage makes it easier to identify and resolve issues in order to keep mission-critical services up for customers and new projects on track for deployment.
  • Business metadata for Stream Catalog: Improve data discovery with the ability to build more contextual, detail-rich catalogs of data streams. Alongside previously available tagging of objects, business metadata gives individual users the ability to add custom, open-form details represented as key-value pairs to entities they create such as topics. These details, from users who know the platform best, are critical to enabling self-service access to data for the larger organization. While tagging has allowed users to flag a topic as “sensitive,” business metadata allows that user to add more context, such as which team owns the topic, how it is being used, who to contact with questions about the data, or any other details necessary.

Exploring the catalog is now even easier with GraphQL API, giving users a simple, declarative method to specify and get the exact data they need while enabling a better understanding of data relationships on the platform.

  • Globally available Schema Registry for Stream Quality: By more than doubling the global availability of Schema Registry to 28 regions, teams have more flexibility to manage schemas directly alongside their Kafka clusters in order to maintain strict compliance requirements and data sovereignty. Additionally, Schema Registry is even more resilient with an increased 99.95% uptime SLA, giving businesses the confidence they need that quality controls for Kafka will always be in place as more groups start working with the technology.

To read more news and exclusive features see our latest issue here.

Never miss a story… Follow us on:
LinkedIn Security Buyer
Twitter logo @SecurityBuyer
Facebook @SecbuyerME

Media Contact
Rebecca Morpeth Spayne,
Editor, Security Portfolio
Tel: +44 (0) 1622 823 922
Email: [email protected]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

AppsFlyer

AppsFlyer Collaborates with AWS

AppsFlyer has announced the expansion of its AppsFlyer Data Collaboration Platform (DCP) offering for brands and commerce…
NHS

Are your medical records safe?

Cyberattacks on healthcare demand robust data management, secure disposal practices, and collaborative cybersecurity measures…
BeyondTrust

BeyondTrust solidifies leadership position

BeyondTrust, the leader in intelligent identity and access security, has announced significant recurring growth in 2023…
Hacker

Cybersecurity CEO blasts Microsoft for email breach

Microsoft executives had their emails hacked, with the company saying the attack was carried out by a Russian intelligence group…
Southco

Improving Medical Equipment Security

The increasing mobility of equipment in the medical environment raises new cause for concern, especially when managing access to valuable…
Antoine Harb_Team Leader Middle East_Kingston Technology. (1)

Healthcare entities and employees ‘must overcome cybercrime’

Boasting world-class data protection capabilities has never been more essential for companies across industries. While tremendous…
Veeam

Mediclinic Middle East Partners with Veeam

Veeam Software announced it was selected by Mediclinic Middle East to modernize its business-continuity facilities and enhance…
Microsoft

G42 and Microsoft unlock new opportunities

G42 and Microsoft have embarked on the next phase of their ongoing strategic collaboration and announced a multifaceted…

Android device migration

The exchange of smartphones has a significant complication in transferring data to the new device. To overcome this problem, Cloning applications were introduced to overcome this problem, which will clone the entire device to the new one…
data

On the edge of vulnerability

Security Buyer sits down with industry experts to determine the best approach for organisations to secure their data storage…
Scroll to Top