
CData launches accelerator to simplify Databricks integration
CData Software has introduced a new integration accelerator designed to simplify and speed up enterprise data integration for organisations utilising Databricks environments.
The CData Databricks Integration Accelerator aims to eliminate traditional data pipeline bottlenecks and shorten integration timelines, enabling companies to make more efficient use of their Databricks Lakehouse investments. Databricks Lakehouse Platform combines data warehousing and artificial intelligence with a unified system for real-time analytics and machine learning. However, integrating data from varied systems can be problematic for enterprises, particularly due to fragmented legacy ETL tools and hybrid environments spanning on-premises and multi-cloud infrastructure.
The new accelerator addresses these issues by providing a no-code framework for building scalable ingestion pipelines. It is also designed to simplify transformation tasks and support compliance with data governance frameworks such as Unity Catalogue. "Integrating enterprise data into Databricks often requires extensive custom code and manual configuration, which can introduce delays and increase maintenance overhead," said Manish Patel, Chief Product Officer at CData. "Our Integration Accelerator eliminates those inefficiencies by providing prebuilt connectors, automated pipeline orchestration, and real-time data availability, enabling teams to operationalise data faster and focus on driving value through analytics and AI."
The CData Databricks Integration Accelerator is built around four toolkits, each designed to address specific integration challenges.
Delta Lake integration
The Delta Lake Integration Toolkit allows organisations to ingest data using a no-code approach and supports Change Data Capture (CDC) from over 270 sources. The toolkit provides live data access to business systems — including sales, marketing and finance — using Databricks Lakehouse Federation, while supporting governance through Unity Catalogue.
Delta Live Tables
The Delta Live Tables (DLT) Extension Toolkit expands connectivity to a broader range of business applications, creating a unified SQL data model via Databricks Spark for straightforward data integration. This toolkit also offers authentication and pagination support for any application programming interface (API), as well as server-side pushdown to improve speed and efficiency.
Databricks-Microsoft connectivity
With the Databricks-Microsoft Connectivity Toolkit, users can establish standards-based connections between Databricks and the Microsoft software ecosystem. This supports direct integration with products such as SSAS, SSRS and SSIS, maintaining live data connections and Unity Catalogue compatibility.
Agentic data pipelines
The Agentic Data Pipelines Toolkit focuses on automating data ingestion for agentic workloads, offering programmatic access to serverless PostgreSQL compatible with Databricks serverless deployments. The toolkit enables the instant availability of enterprise data for use by AI agents, provides programmatic orchestration of data pipelines, and processes real-time data from any source using Change Data Capture (CDC). "Everyone needs a good way to load data into their data lake," said Eric Newcomer, CTO and Principal Analyst, Intellyx. "CData has been developing and delivering a broad and deep set of data connectors for more than a decade. Now, Databricks users can leverage not only the proven CData suite of connectors, but also the integration toolkits built on top of them, including SQL data models, Microsoft-specific connections, and MCP servers for AI agent automations."
Customer deployment and outcomes
NJM Insurance, a provider of personal and commercial insurance policies, has deployed CData's Databricks Integration Accelerator to overhaul its marketing analytics operations. The company reported a 90% reduction in integration build time and saved 66% in project costs by replacing traditional, code-heavy ETL processes with CData's no-code solution. This allowed for quicker insight generation on customer acquisition and lifetime value. "With CData, we were able to ingest our marketing data into Databricks 10 times faster, allowing us to make data-driven decisions more quickly," said Ameya Narvekar, Data Insights Supervisor at NJM Insurance.
The CData Databricks Integration Accelerator is now available for organisations seeking to reduce the time and complexity associated with enterprise data integration projects.
Follow us on:
Share on:
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Techday NZ
3 hours ago
- Techday NZ
AI agents revolutionise business & cybersecurity with automation
The integration of artificial intelligence (AI) agents into business and cybersecurity operations is rapidly shifting from experimental trials to real-world deployment, as organisations across sectors seek to harness the power of automation, efficiency, and data-driven decision-making. Recent commentary from senior technology leaders underscores both the gains and the challenges facing enterprises as they embed AI agents into core processes. In the realm of cybersecurity, the accelerating sophistication of threats driven by AI is a growing concern. Fabio Fratucello, Field Chief Technology Officer World Wide for CrowdStrike, highlights that malicious actors are increasingly using AI, including large language models (LLMs), to launch more convincing phishing scams, business email compromise, and social engineering attacks. "AI is lowering the barrier to entry for adversaries, allowing them to automate social engineering, misinformation campaigns, and credential harvesting at unprecedented speed and scale," Fratucello notes, citing findings from CrowdStrike's 2025 Global Threat Report. This surge in AI-powered attacks is amplifying the pressure on security teams, already hampered by overwhelming alert volumes and a shortage of skilled analysts. According to Fratucello, the key to regaining the upper hand lies in deploying AI-enabled tools that automate detection and triage of threats. CrowdStrike's Charlotte AI, for instance, uses machine learning to validate and prioritise security alerts with more than 98% accuracy. By automating repetitive tasks, Charlotte AI reportedly saves security teams up to 40 hours per week, enabling them to concentrate on proactively hunting advanced threats and halting breaches before escalation. Importantly, Charlotte AI operates within a "bounded autonomy framework," allowing organisations to set specific parameters for automated decision-making. Analysts retain control by defining thresholds and determining when human review is required, ensuring that the balance between automation and human oversight is maintained. Fratucello stresses, "This combination of machine speed and human-defined guardrails returns the AI advantage to defenders and ensures organisations can operate at the speed of threats." Elsewhere in the enterprise technology space, companies are contending with the challenge of bringing AI agents out of the prototype lab and into large-scale, reliable production. Nick Eayrs, Vice President, Field Engineering, APJ, at Databricks, observes that while enthusiasm for AI agents is high, moving beyond proof-of-concept still eludes many organisations. "The challenge is not just building them – it is making them scalable, efficient and reliable enough to stand up in the real world," Eayrs explains. Too often, businesses rely on trial-and-error approaches and are forced into trade-offs between operating costs and performance, which undermines the requirements of enterprise-grade use cases. In response, Databricks has launched Agent Bricks, a system designed to streamline AI agent creation using real enterprise data. Agent Bricks deploys automated evaluation benches, generates synthetic data, and leverages custom judges to test agent quality and efficiency. This reduces the manual, repetitive work typically involved in agent development, freeing AI engineers to focus on higher-value tasks. Eayrs says that common industry uses of such AI agents already include structured information extraction, knowledge assistance, customised data transformation, and multi-agent orchestration. "Ultimately, it is about building production-grade AI agents that are useful, reliable and ready for deployment — that is what we are focused on," he adds. The potential benefits of AI agents are also being demonstrated at the customer coalface. At the property services company hipages Group, AI agents have transformed backend operations. Jeremy Burton, Chief Technology Officer, reports that the introduction of Agentforce has reduced lead response time by 60% and automated verification processes, dramatically speeding up license and registration checks for tradespeople. "Agentforce and Data Cloud are now a core part of our ecosystem, helping us connect better with our customers and tradies," he states. By bringing disparate data and customer touchpoints onto a unified platform, hipages has streamlined work for staff and improved satisfaction levels for both customers and end users. Hospitality firm Urban Rest has leveraged Agentforce to scale up its service operations in step with rapid growth. Jeff Baars, Chief Commercial Officer, explains that Agentforce's centralised knowledge base provides round-the-clock self-serve support for guests, enabling the business to operate without on-site staff across 800 properties in four countries. This has increased productivity by 50% for the operations team, while anticipated field service visits have dropped by up to 40%. Baars notes, "Agentforce empowers our guests with instant, self-serve access to everything they need to know about their apartment, freeing up our guest relations team to focus on support that requires a human touch." At Kudosity, an AI agent named 'Emily' now handles up to 40% of general customer support queries, ensuring prompt responses and reducing the workload for support staff. When a query is too complex, Emily refers it to a human agent, preserving personalised service where it matters most. The evolving landscape of AI agents in the real world demonstrates the transformative potential of the technology, balanced by the need for systematic deployment, human oversight, and ongoing adaptation to rapid changes in both business and cybersecurity domains. As enterprise adoption accelerates, the focus is squarely on building reliable, scalable, and human-aligned AI agents that deliver tangible benefits across sectors.


NZ Herald
4 hours ago
- NZ Herald
Warning for NZ Windows users
Windows 10 support is ending – and nearly half of all PCs in New Zealand could be affected. From October 14, Microsoft will stop providing free security updates for Windows 10, leaving many devices more vulnerable to viruses and scams. But what does 'End of Service' actually mean? Will your computer still work? And what are your options if you're time-poor or not very tech-savvy? Jason Bell, Chief Operating Officer at Noel Leeming, joined Ryan Bridge on Herald NOW to explain the simple steps Kiwis can take to stay safe and up to date.


Techday NZ
4 days ago
- Techday NZ
Semperis warns nOAuth flaw in Entra ID risks SaaS accounts
Semperis has published new research highlighting the ongoing risk posed by the nOAuth vulnerability in Microsoft's Entra ID, which may allow attackers to take over SaaS application accounts with minimal effort. According to the research, nOAuth remains undetected by many SaaS vendors and is very difficult for enterprise customers to defend against. The vulnerability, originally disclosed in 2023 by Omer Cohen of Descope, arises due to a flaw in how certain SaaS applications implement OpenID Connect, particularly when unverified email claims can be used as user identifiers in Entra ID app configurations. This practice contrasts with recommended OpenID Connect standards. Semperis' follow-up investigation examined applications listed in Microsoft's Entra Application Gallery, finding that over a year after its initial disclosure, a substantial portion of applications remain vulnerable to nOAuth abuse. Risk to enterprises The core issue with nOAuth is that attackers require only their own Entra tenant and the email address of a target user to potentially gain full access to that person's account in a vulnerable SaaS application. Traditional defences, including Multi-Factor Authentication (MFA), conditional access, and Zero Trust policies, do not mitigate this risk. This presents a challenge for both developers and end-users. As Eric Woodruff, Chief Identity Architect at Semperis, explained, "It's easy for well-meaning developers to follow insecure patterns without realising it and in many cases, they don't even know what to look for. Meanwhile, customers are left with no way to detect or stop the attack, making this an especially dangerous and persistent threat." Through comprehensive testing of more than 100 Entra-integrated SaaS applications, Semperis identified that nearly 10% were susceptible to nOAuth exploitation. Once access is obtained via this vulnerability, attackers may exfiltrate data, maintain persistence, and potentially move laterally within the victim organisation's environment. Detection and mitigation challenges Detection of nOAuth abuse is exceptionally difficult, as successful attacks leave minimal traces within standard user activity logs. Deep correlation across both Entra ID and individual SaaS platform logs is required to identify potential breaches. Semperis' research indicates that exploitation continues to be possible, despite the initial public disclosure and vendor recommendations. Highlighting the severity of the nOAuth issue, Woodruff added, "nOAuth abuse is a serious threat that many organisations may be exposed to. It's low effort, leaves almost no trace and bypasses end-user protections. We've confirmed exploitation is still possible in many SaaS apps, which makes this an urgent call to action. We encourage developers to implement the necessary fixes and help protect their customers before this flaw is exploited further." Semperis has communicated its findings to both affected SaaS vendors and Microsoft, beginning in December 2024. Some vendors have taken steps to address the issue, while others reportedly remain vulnerable. Industry response and recommendations The Microsoft Security Response Centre (MSRC) advises SaaS application vendors to implement its security recommendations regarding user identification and OpenID Connect integration. Firms failing to comply may risk removal from the Entra Application Gallery. Semperis continues to focus on identity threat detection, with recent announcements regarding new detection features addressing other critical vulnerabilities such as BadSuccessor and Silver SAML. These findings exemplify ongoing risks within enterprise identity services, where configuration weaknesses in authentication protocols can present significant challenges for both software providers and their customers. The nOAuth vulnerability underlines the importance of not only secure development practices but also continuous monitoring as enterprise reliance on SaaS and identity federation increases. Semperis' report calls for prompt action from SaaS vendors to update their authentication implementations to address this persistent risk.