Big data presents a tremendous opportunity for enterprises across industries. By tapping into new volumes and varieties of data, scientists, executives, product managers, marketers, and a range of others can start making more informed plans and decisions, discover new opportunities for optimization, and deliver breakthrough innovations.
Without the right security and encryption solution in place, however, big data can mean big problems.
To establish comprehensive big data security, executives and administrators have to address the following areas:
It is important to recognize that the attributes that make big data valuable to the business also make it valuable to others—whether they’re hardened cyber criminals or a disgruntled system administrator looking to make a quick, illicit buck. Establishing effective security across the categories above—and the massive number of specific outputs, systems, and services that fall into each category—is both critical and challenging.
Further, given the massive, widely fluctuating processing demands associated with big data environments, many organizations are leveraging cloud-based services and platforms to support their big data initiatives. For those organizations running big data environments in the cloud, the task of managing big data security grows even more difficult. In the cloud, security teams have to contend with the threats of vendor’s infrastructure administrators, potential exposure to other tenants, and a number of other additional risks.
The challenge of big data encryption is that, while there are plenty of encryption offerings around, most tackle one specific aspect. For example, you could use transparent data encryption capabilities from your database vendor, but what happens when that data gets exported from the database and into big data environments? Plus, what about all the other data sources and systems in play? You also have to ask where does the vendor store the keys? Is it with the data?
While some vendors offer big data encryption capabilities, these offerings only secure specific big data nodes, not the original data sources that are fed into the big data environment or the analytics that come out of the environment. Further, these big data encryption offerings don’t even secure all the log files and configuration information associated with the big data environment itself.
Ultimately, with these disparate approaches to big data security, IT teams have to contend with fragmented key and policy management, which adds administrative effort, while making it difficult to apply standards consistently. Further, these point approaches also tend to introduce a significant performance hit, which can present significant issues in processing-intensive big data environments.
Vormetric solutions for big data security enable organizations to maximize the benefits of big data analytics—while maximizing the security of their sensitive data and addressing the requirements of their compliance office. The Vormetric Data Security Platform offers the granular controls, robust encryption, and comprehensive coverage that organizations need to secure sensitive data across their big data environments—including big data sources, big data infrastructure, and big data analytic results. By delivering a single security solution that offers coverage of these areas, Vormetric enables security teams to leverage centralized controls that optimize efficiency and compliance adherence.
The Vormetric Data Security Platform offers capabilities for big data encryption, key management, and access control—featuring several product offerings that share a common, extensible infrastructure. Further, the solution generates security intelligence on data access by users, processes, and applications.
As outlined earlier, organizations can leverage data from a broad array of sources, both structured and unstructured, for their big data initiatives. Data from databases, data warehouses, system logs, spreadsheets, and many other diverse systems may be fed into a big data environment.
To establish data security for these diverse data sources, organizations can use the following Vormetric solutions:
In big data environments, data is routinely replicated and migrated among a large number of nodes. In addition, sensitive information can be stored in system logs, configuration files, disk caches, error logs, and so on. Vormetric Transparent Encryption efficiently protects data across all these areas, delivering encryption, privileged user access control, and security intelligence. In addition, with Vormetric Protection for Teradata Database, your organization can gain the comprehensive, granular controls required to secure the most sensitive assets across your Teradata environments, while enabling you to maximize the business benefits of your big data investments.
Big data output comes in many forms, including on-demand dashboards, automated reports, and ad hoc queries. Very often, these outputs contain intellectual property that is very valuable to an organization—and a potential target of attack. To provide big data analytics security for these confidential assets, security teams can use the following solutions:
To learn more about companies Vormetric has partnered with in the big data market, visit our technology partner page.
This technical white paper explores Hadoop deployments, security options, and delves deeply into how to apply encryption and access control...Download >>
Vormetric Protection for Teradata Database
MongoDB Encryption Performance
Security Controls for DataStax Enterprise
Securing Hortonworks Big Data Environments
Big Data is no longer a Big Security Challenge
Cisco UCS and Vormetric
Securosis: Securing Hadoop