Skip to content
English - United States
  • There are no suggestions because the search field is empty.

Database Bridge: Accessing Firewall-Protected Data

The Database Bridge provides secure access to databases behind firewalls without requiring a full VPN setup. It acts as a lightweight tunnel between your protected data sources and your BEEM environment.

Availability

Database Bridge is available on all pricing tiers (Essentials, Pro, Enterprise).

Step 1: Determine If You Need a Database Bridge

Use a Database Bridge when:

  • Your database is behind a corporate firewall
  • You cannot or prefer not to set up a full VPN
  • You need to connect to a single database or small number of sources
  • Your IT policy allows outbound connections but blocks inbound ones

Step 2: Contact BEEM for Setup

  1. Contact support@beemdata.com or your BEEM account manager
  2. Provide:
    • Database type (SQL Server, PostgreSQL, MySQL, Oracle, etc.)
    • Database host, port, and credentials
    • Network restrictions and firewall rules
  3. The BEEM team provides a lightweight bridge agent and configuration

Step 3: Install the Bridge Agent

  1. Deploy the bridge agent on a machine inside your network that can access the database
  2. The agent establishes an outbound connection to your BEEM environment
  3. No inbound firewall rules are required — the agent initiates the connection
  4. Verify the agent is running and connected

Step 4: Verify Data Flow

  1. The database now appears as an available source in BEEM
  2. Go to the Datalake to confirm tables are syncing
  3. Preview the data to verify accuracy
  4. Monitor sync status in the Monitor section

How It Works

  • The bridge agent runs inside your network and opens a secure outbound tunnel
  • BEEM sends queries through the tunnel to your database
  • Results flow back through the same secure channel
  • No inbound firewall ports need to be opened

Database Bridge vs VPN

Feature Database Bridge VPN
Setup complexity Low Higher
Scope Single database or small number of sources Full network access
Firewall changes None (outbound only) Requires configuration
Best for Quick, targeted access Broad network connectivity