
CData launches accelerator to simplify Databricks integration
CData Software has introduced a new integration accelerator designed to simplify and speed up enterprise data integration for organisations utilising Databricks environments.
The CData Databricks Integration Accelerator aims to eliminate traditional data pipeline bottlenecks and shorten integration timelines, enabling companies to make more efficient use of their Databricks Lakehouse investments. Databricks Lakehouse Platform combines data warehousing and artificial intelligence with a unified system for real-time analytics and machine learning. However, integrating data from varied systems can be problematic for enterprises, particularly due to fragmented legacy ETL tools and hybrid environments spanning on-premises and multi-cloud infrastructure.
The new accelerator addresses these issues by providing a no-code framework for building scalable ingestion pipelines. It is also designed to simplify transformation tasks and support compliance with data governance frameworks such as Unity Catalogue. "Integrating enterprise data into Databricks often requires extensive custom code and manual configuration, which can introduce delays and increase maintenance overhead," said Manish Patel, Chief Product Officer at CData. "Our Integration Accelerator eliminates those inefficiencies by providing prebuilt connectors, automated pipeline orchestration, and real-time data availability, enabling teams to operationalise data faster and focus on driving value through analytics and AI."
The CData Databricks Integration Accelerator is built around four toolkits, each designed to address specific integration challenges.
Delta Lake integration
The Delta Lake Integration Toolkit allows organisations to ingest data using a no-code approach and supports Change Data Capture (CDC) from over 270 sources. The toolkit provides live data access to business systems — including sales, marketing and finance — using Databricks Lakehouse Federation, while supporting governance through Unity Catalogue.
Delta Live Tables
The Delta Live Tables (DLT) Extension Toolkit expands connectivity to a broader range of business applications, creating a unified SQL data model via Databricks Spark for straightforward data integration. This toolkit also offers authentication and pagination support for any application programming interface (API), as well as server-side pushdown to improve speed and efficiency.
Databricks-Microsoft connectivity
With the Databricks-Microsoft Connectivity Toolkit, users can establish standards-based connections between Databricks and the Microsoft software ecosystem. This supports direct integration with products such as SSAS, SSRS and SSIS, maintaining live data connections and Unity Catalogue compatibility.
Agentic data pipelines
The Agentic Data Pipelines Toolkit focuses on automating data ingestion for agentic workloads, offering programmatic access to serverless PostgreSQL compatible with Databricks serverless deployments. The toolkit enables the instant availability of enterprise data for use by AI agents, provides programmatic orchestration of data pipelines, and processes real-time data from any source using Change Data Capture (CDC). "Everyone needs a good way to load data into their data lake," said Eric Newcomer, CTO and Principal Analyst, Intellyx. "CData has been developing and delivering a broad and deep set of data connectors for more than a decade. Now, Databricks users can leverage not only the proven CData suite of connectors, but also the integration toolkits built on top of them, including SQL data models, Microsoft-specific connections, and MCP servers for AI agent automations."
Customer deployment and outcomes
NJM Insurance, a provider of personal and commercial insurance policies, has deployed CData's Databricks Integration Accelerator to overhaul its marketing analytics operations. The company reported a 90% reduction in integration build time and saved 66% in project costs by replacing traditional, code-heavy ETL processes with CData's no-code solution. This allowed for quicker insight generation on customer acquisition and lifetime value. "With CData, we were able to ingest our marketing data into Databricks 10 times faster, allowing us to make data-driven decisions more quickly," said Ameya Narvekar, Data Insights Supervisor at NJM Insurance.
The CData Databricks Integration Accelerator is now available for organisations seeking to reduce the time and complexity associated with enterprise data integration projects.
Follow us on:
Share on:
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


NZ Herald
4 hours ago
- NZ Herald
German state ditches Microsoft for open-source software
At a time of growing concern over the power of the world's mighty tech companies, one German state is turning its back on US giant Microsoft. In less than three months' time, almost no civil servant, police officer or judge in Schleswig-Holstein will be using any of Microsoft's ubiquitous programs


Techday NZ
6 hours ago
- Techday NZ
Aiden Technologies now available in Azure Marketplace via MACC
Aiden Technologies is now available as a fully transactable solution within the Microsoft Azure Marketplace and can be acquired through the Microsoft Azure Consumption Commitment (MACC) programme. This development enables organisations using Microsoft Azure to purchase Aiden's Windows endpoint management platform with their existing MACC funds, removing the need for additional budget approvals and accelerating procurement. Procurement streamlined The inclusion of Aiden in the Azure Marketplace and its eligibility for MACC aims to address a significant challenge faced by enterprise IT teams - procurement delays caused by complex budget cycles and approval processes. By transacting through existing Azure agreements, organisations can implement Aiden without having to wait for internal budget cycles or undergo additional vendor onboarding processes. "Getting started with Aiden just got even easier," said Joshua Aaron, CEO of Aiden Technologies. "By becoming MACC-eligible in the Azure Marketplace, we're removing procurement roadblocks and helping IT teams take immediate action to improve endpoint management - without waiting on budget cycles or approval chains." Under the MACC programme, enterprise customers commit to a specific budget for Azure services and approved third-party tools. This budget, often allocated at the start of a fiscal period and subject to 'use it or lose it' rules, can now be used to deploy Aiden directly. Many organisations face challenges in spending all their MACC funds before expiration, sometimes resulting in wasted budget. The ability to acquire Aiden through the Azure Marketplace provides an immediate use for these funds, supporting IT operations and enhancing endpoint security. Features of the Aiden platform Aiden Technologies describes its platform as an 'Intelligent Automation' solution for Windows environments, positioned as a managed service from initial provisioning to ongoing patch management, security, and compliance. The solution integrates with deployment tools such as ConfigMgr and Intune and includes several key features designed to automate and simplify endpoint management. The Full-ProvisioningTM feature extends Microsoft Autopilot by automating the deployment of the operating system, applications, policies, tools, and security agents before a user ever logs in. According to the company, this process ensures that each machine is fully configured and validated before first use, eliminating delays and the need for support tickets at login. The Continue Before Logon (CBL) function enables updates to critical software without requiring user interruption. Updates are staged and installed in the background during any reboot, without the need for forced closures, user prompts, or custom scripts. This approach is intended to keep systems secure, reduce non-compliance due to always-on applications, and minimise disruption to workflow. The Aiden platform also provides automated application deployment, maintaining a dynamic catalogue of both commercial and custom software packages. IT teams can define specific requirements for different user or device types, and Aiden manages the delivery, maintenance, and patching processes automatically. Patch management and vulnerability remediation are carried out continuously, removing the need for scheduled patch windows and improving security posture. Aiden also includes drift control and configuration enforcement, where devices are monitored and reset to a prescribed state if deviations occur. For compliance and operational transparency, the solution offers AidenVision, which supplies real-time insights into patching status, software deployment health, and policy compliance, aimed at reducing reliance on manual tracking or ticketing systems. Impact for enterprise IT The availability of Aiden via the Azure Marketplace and MACC is presented as a way to bypass traditional procurement hurdles for enterprise IT teams by allowing solutions to be purchased with existing cloud commitments. This method aims to deliver benefits such as improved endpoint security, reduction in manual operational work, and greater speed in adopting new IT tools. The announcement also notes that Aiden offers its full suite of services – from OS and application deployment to patching and compliance, as well as features to maintain configuration consistency and reduce risks associated with endpoint drift and unpatched software. Organisations using Microsoft Azure can now choose to direct their existing committed spend towards Aiden Technologies' endpoint management and automation platform, integrating it within their IT operations with the aim of reducing procurement time and improving operational outcomes.


Techday NZ
8 hours ago
- Techday NZ
Phishing-as-a-Service drives surge in cybercrime for 2025
Barracuda Networks has released new details on the rising prevalence of Phishing-as-a-Service (PhaaS) attacks, the technologies underpinning them, and trends shaping cybercrime in 2025. The company's analysis found that an estimated 60% to 70% of all phishing attacks observed since the beginning of 2025 have been delivered using PhaaS models. Of these, the Tycoon 2FA phishing kit emerged as the most popular, responsible for 76% of the detected incidents. EvilProxy accounted for 8%, while Mamba 2FA and Sneaky 2FA together made up 6%. The remaining 10% consisted of other kits such as LogoKit, CoGUI and FlowerStorm. Understanding PhaaS Phishing-as-a-Service is a model in which individuals or groups provide ready-made phishing tools, infrastructure and support to customers for a fee, often via subscription services or one-off payments. This business-like approach means non-technical users can easily launch phishing campaigns without building infrastructure or writing code. According to the explainer released by Barracuda, "Phishing-as-a-Service, or PhaaS, is a cybercrime model where threat actors offer phishing tools, kits and services to other attackers, often via subscription or one-time payment. It lowers the barrier to entry for phishing attacks by providing ready-made templates, hosting, automation and even customer support. PhaaS enables non-technical users to launch sophisticated phishing campaigns, contributing to the rise in phishing incidents globally." Attackers typically access these services through forums, darknet markets, or messaging channels such as Telegram. The platforms provide templates for impersonating well-known brands and offer means to collect sensitive information entered by victims, which attackers can then use for financial gain or identity theft. The explainer notes, "Attackers sign up for this service — often through Darknet or Telegram channels — and obtain access to their PhaaS infrastructure. The service provides ready-made fake emails and websites that look just like real companies. The scammer can customise messages to make them convincing. Then, these fake emails or websites are sent out to lots of people. When someone falls for the trick and enters their private info, the scammer collects it and can steal money or identities." Barriers lowered PhaaS is popular with users seeking to commit credential theft but lacking the skills to develop phishing infrastructure from scratch. The systems are marketed not only at experienced cybercriminals, but also at individuals with limited technical knowledge, as the ease of use and available support bring phishing within reach of a broader group of criminal actors. "Attackers who want to do credential theft but don't know how to build the phishing emails, infrastructure to host fake Microsoft/Google login pages, steal multifactor-authentication (MFA) tokens and send them to a command-and-control server. Sometimes even people who aren't very tech-savvy can use PhaaS because it makes it easy for anyone to launch scams," the explainer says. PhaaS allows for rapid deployment of attacks, high levels of automation and large-scale targeting, including of small businesses and individual consumers. Typical victims range from employees at companies targeted for access to internal systems, to consumers receiving emails purporting to be from banks or popular online services. "It saves time and effort — they don't have to create complicated scam setups from scratch. It's often cheap or subscription-based, so it's easy to access. It's much easier now to launch a sophisticated phishing campaign targeting thousands of people with just a few clicks or minimal effort, compared to traditional phishing attacks. These modern attacks are highly advanced — they use clever methods to avoid detection and often rely on legitimate but compromised websites and platforms." Market forces PhaaS providers continually update their kits to bypass security measures, and competition between providers is fierce. Kits compete on factors such as price, accessibility, customer support, regular updates, and their ability to avoid detection. Subscription models and customer service functions have become normal, mirroring the software industry. "Kits that are cheaper or easier to get tend to attract more users. Some offer subscriptions, while others sell one-time licenses. The price and payment options matter a lot. Updates: Some PhaaS providers offer customer support and regularly update their kits to bypass new security measures. Kits that stay updated and provide help keep their users loyal. Success rates: If a kit is known for helping scammers avoid detection and successfully steal information, it gains popularity over others." Emerging kits and techniques Barracuda identified several new PhaaS kits, such as Darcula, which merges phishing with malware delivery and tends to target mobile users, and Morphing Meerkat, noted for altering its appearance to bypass email controllers. Other kits like CoGUI have been regionally tailored, such as those targeting Japanese organisations, and Sniper Dz is highlighted for mimicking the login pages of popular services. According to the explainer, "What makes these kits particularly dangerous is that they constantly evolve — updating their methods to avoid being detected by security systems. This ongoing development helps scammers stay one step ahead and makes it harder to shut them down." Detection strategies avoided PhaaS operators and their customers deploy techniques including encrypting malicious code, using code obfuscation, leveraging legitimate but compromised websites, and actively detecting when they are being monitored by security software or research sandboxes. In such cases, the kits will direct users to bona fide websites to avoid raising suspicion. The use of encryption and the adoption of real, trusted sites for hosting phishing content make detecting such threats more challenging for security tools, which traditionally focus on signature-based or heuristic detections of uncommon domains or content. Despite ongoing efforts by security professionals and law enforcement, the widespread distribution of PhaaS services and kits, international hosting, and frequent method changes continue to pose challenges for effective mitigation and takedown of phishing operations.