Big Data: Controlling the Perfect Storm September 24, 2013

Size: px
Start display at page:

Download "Big Data: Controlling the Perfect Storm September 24, 2013"

Transcription

1 Big Data: Controlling the Perfect Storm September 24, 2013 Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London 1

2 2 Generously sponsored by:

3 Welcome Conference Moderator Matt Mosley Northern Virginia, USA Chapter ISSA Web Conference Committee 3

4 Agenda Speakers Chris Diehl Principal and Co-Founder, The Data Guild Kathy Zeidenstein Technology Evangelist, IBM InfoSphere Guardium Open Panel with Audience Q&A Closing Remarks 4

5 Organizational Resilience in an Uncertain World Chris Diehl Principal and Co-Founder The Data Guild 5

6 6

7 7

8 8

9 9

10 10

11 11

12 12

13 13

14 14

15 15

16 16

17 17

18 18

19 19

20 20

21 21

22 22

23 23

24 24

25 25

26 26

27 27

28 Question and Answer Chris Diehl Principal and Co-Founder The Data Guild 27 28

29 Data protection for the new world of Hadoop and NoSQL system Kathy Zeidenstein Technology Evangelist IBM InfoSphere Guardium 5

30 Agenda Overview of NoSQL and Hadoop Protecting data at rest (file encryption) Protecting data in use (monitoring) Integrating with SIEM

31 Information protection in the new era of computing Sensitive data is everywhere; Traditional boundaries don t exist Business Application Systems Unstructured Data File Systems (SAP, PeopleSoft, Oracle Financials, In-house, CRM, etc.) Application Server v Office documents, PDF, Vision, Audio & other Fax/Print Servers File Servers Remote locations & Systems Storage & Backup Systems SAN/NAS Backup Systems Security & Other Systems (Event logs, Error logs Cache, Encryption keys, & other secrets) Security Systems Structured Data Database Systems (SQL, Oracle, DB2, Informix, MySQL) Database Server NoSQL and Hadoop Data Communications VoIP Systems FTP/Dropbox Server Servers (MongoDB, CouchDB, Hbase, Cassandra, HDFS)

32 NoSQL and Hadoop 101 NoSQL is a generic term for a very nongeneric landscape of data stores Hadoop is a framework for processing large and varied data sets with low cost at a high degree of fault tolerance. Components include (among others): A file system (Hadoop File System HDFS) A framework for processing data (Map- Reduce) May include a NoSQL Database HBase SQL Not Only SQL Hive Application MapReduce MapReduce Oozie HBase Storage HDFS

33 Categories of NoSQL Source: Akmal Chaudhri s NoSQLpresentation:

34 Market is growing and fragmented Hadoop-NoSQL Software and Services Market Forecast

35 FUD (for a good reason). more than half (56%) [senior-lever IT and security respondents admitted that these security concerns have kept them from starting or finishing cloud or big data projects. 1 Big Data may well present a rich target of opportunity for cybercriminals. 2 1Study conducted by Voltage at InfoSecurity Europe in April 2013 with over 300 IT professionals Reported in Dark Reading: 2 Rob Livingstone in CFO.com "Security and access control are part of the reason why Hadoop is not ready to replace relational databases" 3 3David Menninger, an analyst with Ventana Research. Quoted in

36 Perimeter Security is Not Enough Dynamic Data (in use) Static Data (at rest)

37 Protecting data at rest (encryption) WHO is attempting to access protected data? Configure groups, or applications who can access protected data WHAT data is being accessed? Configure appropriate file and directory access WHEN is the data being accessed? Configure a range of hours and days of the week for authorized access HOW is the data being accessed? Configure allowable file system operations allowed to access the data e.g. read, write, delete, rename, application or process, etc. EFFECT: Permit; Deny; Encrypt; Audit $%#@!*(&^$%$% ^&*()(*&^%$#@#$ %^&*DFGHJTR#$ Static Data (at rest)

38 Data Encryption Architecture Authenticated Users Applications DBMS Server server / file File server ftp server DE Agent SSL x.509 Certificates Web Administration https File System Active /Active IBM DE Server Data Encryption Security Server Policy and Key Management Centralized administration Separation of duties Key, Policy, Audit Log Store Online Files 38

39 Protecting big data at rest All data sources potentially contain sensitive information Data is distributed as needed throughout the cluster by the Big Data application Deploy encryption agents to all systems hosting Data Stores Agents protect the data store at the file system or volume level 39 From Vormetric

40 Implement database activity monitoring Create a secure, detailed, verifiable audit trail of all database activities User activity, including privileged users User creation and object creation and manipulation Gain visibility into all database activity involving sensitive data Who, what, when and how Real-time alerts for suspicious activity Integrate with business processes for audit compliance Dissemination of reports to appropriate personnel for signoff and review Retain reports and signoffs per audit requirements Dynamic Data (in use) 40

41 High level architecture of the InfoSphere Guardium DAM solution Network traffic sent to tamper-proof appliance by lightweight agent Heavy lifting done on appliance, not on data cluster Separation of duties Role-based GUI Security policies separate from DBA Audit data is accessible only through APIs and reports Reports/Ad hoc searches InfoSphere Guardium Collector Real-time alerts can be integrated with SIEM systems Clients Name node or routing node Data node S-TAPs Routing server or name node (where applicable)

42 Challenges of protecting the Hadoop stack User Interface Hackers Application MapReduce Hive Unvetted applications or ad hoc processes Oozie Storage HBase HDFS Privileged users

43 Hadoop example Select count(*) from page_click where Hive query:who ran it and on what object Breaks down into MapReduce Job Low level HDFS commands

44 Use case: What Map Reduce jobs are accessing the cluster? Do you know when new MapReduce jobs are running in the cluster? Do you know who is submitting them and from where? Are they accessing sensitive data? Now, reduce the noise by filtering out authorized jobs.

45 Use case: What Map Reduce jobs are accessing the cluster? Focus your resources on the unknown Unauthorized MapReduce jobs

46 Use case: What Map Reduce jobs are accessing the cluster? Audit process workflow and administrative automation Should this job be approved? Unauthorized Map Reduce Job List Report How can we automate the process of review, approval, and administration.?

47 Automate approval workflow Audit process workflow and administrative automation Business Owner approves or rejects Information Security confirms Business Owner recommendation Guardium Admin adds authorized jobs to authorized job list

48 Automate approval workflow Populate new vetted applications automatically

49 Automate approval workflow Populate new vetted applications automatically

50 MongoDB Example High Performance -Indexes -RAM Horizontally Scalable -Sharding Native API (Java, C#, C++, 9 more) Highly Available -Replica Sets Dynamic Document Data Model { customer_id : 1, first_name : "Mark", accounts : [ { account_num: 13, branch_id : 200, type : "Checking }, { account_num: 15, branch_id : 300, type : 401(k) co: 10gen } ] }

51 Sample activity db.creditcard.find() db.creditcard.update({"name":"sundari Voruganti"},{$set:{"product":"Platinum card"}},false, true) 51

52 Monitor users and roles Who created the user and when did they do it The full message details includes the actual command which shows you the roles 52

53 53 Automate review of roles

54 Text search for ad-hoc investigations Who dropped my collection?! 54

55 Integrate with QRadar to add data security insights to your security intelligence Security Devices In-depth data activity monitoring and security insights from InfoSphere Guardium Databases Data Warehouses Hadoop/NoSQL Big Data environments File shares Applications Servers & Hosts Network & Virtual Activity Database Activity Activity Application Activity Configuration Info Event Correlation Activity Baselining & Anomaly Detection Offense Identification Vulnerability Info Info Extensive Data Sources User Activity + = Deep Intelligence Specific vulnerability assessment for database infrastructure Exceptionally Accurate and Actionable Insight Send real-time data activity security alerts from Guardium to QRadar in LEEF format Send data activity audit reports (syslog) from Guardium to Q1 to enhance analytics Share database vulnerability findings (CVE) between Guardium and QRadar in AXIS or SCAP

56 InfoSphere Guardium protects sensitive data in Big Data and NoSQL environments Protect your sensitive data with real time activity monitoring Gain insights into activity throughout the Hadoop stack: Hive, MapReduce, HBase and HDFS Gain insight into NoSQL systems such as MongoDB, Cassandra, CouchDB Detect unauthorized applications or users Real time alerts reduce time to discovery for possible breach or infraction of compliance Automate compliance and management tasks Integrates with security information and event management systems for action and correlation analysis User Interface Application Storage Hive MapReduce Oozie HBase HDFS

57 Protect sensitive data wherever it lies DATABASES NEW Optim Archival D A T A B A S E Exadata InfoSphere BigInsights Master Data Management Data Stage CICS Siebel, PeopleSoft, E-Business FTP InfoSphere Guardium

58 Next steps? E-book NoSQL does not have to mean no security EN.PDF E-book Planning a security and auditing deployment for Hadoop WW Sales leader: Dave Valovcin (dvalovcin@us.ibm.com)

59 Dziękuję gracias Traditional Chinese Polish Thai Spanish Merci French спасибо Russian Obrigado Brazilian Portuguese Danke German Arabic Tack Swedish Simplified Chinese Japanese Grazie Italian

60 Question and Answer Kathy Zeidenstein Technology Evangelist IBM InfoSphere Guardium 27 60

61 Open Panel with Audience Q&A Chris Diehl Principal and Co-Founder, The Data Guild Kathy Zeidenstein Technology Evangelist, IBM InfoSphere Guardium 61

62 Closing Remarks Thank you to our Sponsor Thank you to Citrix for donating this Webcast service Online Meetings Made Easy 62

63 CPE Credit Within 24 hours of the conclusion of this webcast, you will receive a link via to a post Web Conference quiz. After the successful completion of the quiz you will be given an opportunity to PRINT a certificate of attendance to use for the submission of CPE credits. On-Demand Viewers Quiz Link: Conference-Big-Data-Controlling-the-Perfect-Storm- September

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems Proactively address regulatory compliance requirements and protect sensitive data in real time Highlights Monitor and audit data activity

More information

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server InfoSphere Guardium Ingmārs Briedis (ingmars.briedis@also.com) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions

More information

IBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop

IBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop Planning a data security and auditing deployment for Hadoop 2 1 2 3 4 5 6 Introduction Architecture Plan Implement Operationalize Conclusion Key requirements for detecting data breaches and addressing

More information

Encryption is Fundamental: A Technical Overview of Guardium Data Encryption October 2014

Encryption is Fundamental: A Technical Overview of Guardium Data Encryption October 2014 IBM Security Systems Encryption is Fundamental: A Technical Overview of Guardium Data Encryption October 2014 Tim Parmenter InfoSphere Guardium Technical Professional Mark Jamison Accelerated Value Specialist

More information

IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive

IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive One of a series of InfoSphere Guardium Technical Talks Ernie Mancill Executive IT Specialist Logistics This tech talk is being recorded. If you

More information

Real-Time Database Protection and. Overview. 2010 IBM Corporation

Real-Time Database Protection and. Overview. 2010 IBM Corporation Real-Time Database Protection and Monitoring: IBM InfoSphere Guardium Overview Agenda Business drivers for database security InfoSphere Guardium architecture Common applications The InfoSphere portfolio

More information

Guardium Change Auditing System (CAS)

Guardium Change Auditing System (CAS) Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity

More information

IBM InfoSphere Guardium

IBM InfoSphere Guardium IBM InfoSphere Guardium Enterprise-wide Database Protection and Compliance Jānis Bērziņš, DPA 08.11.2012 Data is the key target for security breaches.. and Database Servers Are The Primary Source of Breached

More information

BIG DATA: Big Opportunity, Big Headaches Protect your Big Data with data security

BIG DATA: Big Opportunity, Big Headaches Protect your Big Data with data security BIG DATA: Big Opportunity, Big Headaches Protect your Big Data with data security Marilene Roder WW Enablement, Guardium IBM Security Brazil Security Roadshow June 9-11, 2 015 12015 IBM Corporation 2014

More information

BYOD to the Cloud May 28, 2013

BYOD to the Cloud May 28, 2013 BYOD to the Cloud May 28, 2013 Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London 1 2 Generously sponsored by: Welcome Conference Moderator Matt Mosley Northern Virginia, USA Chapter ISSA Web Conference

More information

Securely maintaining sensitive financial and

Securely maintaining sensitive financial and How the Guardium Platform Helped Dell IT Simplify Enterprise security By Phil Neray Addison Lawrence David McMaster Venugopal Nonavinakere Safeguarding data is critical for many organizations, but auditing

More information

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Obtaining Value from Your Database Activity Monitoring (DAM) Solution Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation

More information

Application Monitoring for SAP

Application Monitoring for SAP Application Monitoring for SAP Detect Fraud in Real-Time by Monitoring Application User Activities Highlights: Protects SAP data environments from fraud, external or internal attack, privilege abuse and

More information

What is Security Intelligence?

What is Security Intelligence? 2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the

More information

How To Manage A Database With Infosphere Guardium

How To Manage A Database With Infosphere Guardium IBM InfoSphere Guardium Managing the entire database security and compliance life cycle Leading organizations across the world trust IBM to secure their critical enterprise data. The fact is, we provide

More information

Business Activity Monitoring of non-ibm activity

Business Activity Monitoring of non-ibm activity Business Activity Monitoring of non-ibm activity WebSphere Technical Sales Agenda Intro to BPM & BAM WebSphere Business Monitor Talking to WebSphere Business Monitor Demo using WebSphere Message Broker

More information

Luncheon Webinar Series May 13, 2013

Luncheon Webinar Series May 13, 2013 Luncheon Webinar Series May 13, 2013 InfoSphere DataStage is Big Data Integration Sponsored By: Presented by : Tony Curcio, InfoSphere Product Management 0 InfoSphere DataStage is Big Data Integration

More information

IBM Software Top tips for securing big data environments

IBM Software Top tips for securing big data environments IBM Software Top tips for securing big data environments Why big data doesn t have to mean big security challenges 2 Top Comprehensive tips for securing data big protection data environments for physical,

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

Five Keys to Big Data Audit and Protection WHITEPAPER

Five Keys to Big Data Audit and Protection WHITEPAPER 1 Introduction Driven by the promise of uncovering valuable insights that enable better, fine-tuned decision making, many businesses are planning if not already making substantial investments in big data

More information

Q1 Labs Corporate Overview

Q1 Labs Corporate Overview Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,

More information

IBM Infrastructure Suite for z/vm and Linux

IBM Infrastructure Suite for z/vm and Linux IBM Infrastructure Suite for z/vm and Linux Tracy Dean, IBM tld1@us.ibm.com October 2015 Agenda Solution introduction Solution details Summary, contacts, and more information 2 IBM Infrastructure Suite

More information

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions Database Auditing & Security Brian Flasck - IBM Louise Joosse - BPSolutions Agenda Introduction Drivers for Better DB Security InfoSphere Guardium Solution Summary Netherlands Case Study The need for additional

More information

Enterprise Database Security & Monitoring: Guardium Overview

Enterprise Database Security & Monitoring: Guardium Overview Enterprise Database Security & Monitoring: Guardium Overview Phone: 781.487.9400 Email: info@guardium.com Guardium: Market-Proven Leadership Vision Enterprise platform for securing critical data across

More information

GAIN BETTER INSIGHT FROM BIG DATA USING JBOSS DATA VIRTUALIZATION

GAIN BETTER INSIGHT FROM BIG DATA USING JBOSS DATA VIRTUALIZATION GAIN BETTER INSIGHT FROM BIG DATA USING JBOSS DATA VIRTUALIZATION Syed Rasheed Solution Manager Red Hat Corp. Kenny Peeples Technical Manager Red Hat Corp. Kimberly Palko Product Manager Red Hat Corp.

More information

IBM BigInsights for Apache Hadoop

IBM BigInsights for Apache Hadoop IBM BigInsights for Apache Hadoop Efficiently manage and mine big data for valuable insights Highlights: Enterprise-ready Apache Hadoop based platform for data processing, warehousing and analytics Advanced

More information

Big Data Management and Security

Big Data Management and Security Big Data Management and Security Audit Concerns and Business Risks Tami Frankenfield Sr. Director, Analytics and Enterprise Data Mercury Insurance What is Big Data? Velocity + Volume + Variety = Value

More information

Secret Server Qualys Integration Guide

Secret Server Qualys Integration Guide Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server

More information

BIG DATA ANALYTICS REFERENCE ARCHITECTURES AND CASE STUDIES

BIG DATA ANALYTICS REFERENCE ARCHITECTURES AND CASE STUDIES BIG DATA ANALYTICS REFERENCE ARCHITECTURES AND CASE STUDIES Relational vs. Non-Relational Architecture Relational Non-Relational Rational Predictable Traditional Agile Flexible Modern 2 Agenda Big Data

More information

Infomatics. Big-Data and Hadoop Developer Training with Oracle WDP

Infomatics. Big-Data and Hadoop Developer Training with Oracle WDP Big-Data and Hadoop Developer Training with Oracle WDP What is this course about? Big Data is a collection of large and complex data sets that cannot be processed using regular database management tools

More information

IBM InfoSphere Guardium Vulnerability Assessment

IBM InfoSphere Guardium Vulnerability Assessment IBM InfoSphere Guardium Vulnerability Assessment Scan database infrastructures to detect vulnerabilities and suggest remedial actions Highlights Lowers total cost of ownership, improves security and supports

More information

NIST 800-53 Accelerator Automated Real-Time Controls to Protect Against Cyberattacks & Insider Threats

NIST 800-53 Accelerator Automated Real-Time Controls to Protect Against Cyberattacks & Insider Threats NIST 800-53 Accelerator Automated Real-Time Controls to Protect Against Cyberattacks & Insider Threats Highlights Full suite of database security applications: Automate & simplify NIST 800-53 controls

More information

IBM InfoSphere Guardium Vulnerability Assessment

IBM InfoSphere Guardium Vulnerability Assessment IBM InfoSphere Guardium Vulnerability Assessment Scan database infrastructures to detect vulnerabilities and suggest remedial actions Highlights Lowers total cost of ownership, improves security and supports

More information

Big Data Analytics Platform @ Nokia

Big Data Analytics Platform @ Nokia Big Data Analytics Platform @ Nokia 1 Selecting the Right Tool for the Right Workload Yekesa Kosuru Nokia Location & Commerce Strata + Hadoop World NY - Oct 25, 2012 Agenda Big Data Analytics Platform

More information

Oracle Big Data Essentials

Oracle Big Data Essentials Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 40291196 Oracle Big Data Essentials Duration: 3 Days What you will learn This Oracle Big Data Essentials training deep dives into using the

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals November 13, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer

More information

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation

IBM Security. 2013 IBM Corporation. 2013 IBM Corporation IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure

More information

IBM InfoSphere Guardium

IBM InfoSphere Guardium IBM InfoSphere Guardium Managing the Entire Database Security and Compliance Lifecycle More Global 1000 organizations trust IBM to secure their critical enterprise data than any other technology provider.

More information

XpoLog Competitive Comparison Sheet

XpoLog Competitive Comparison Sheet XpoLog Competitive Comparison Sheet New frontier in big log data analysis and application intelligence Technical white paper May 2015 XpoLog, a data analysis and management platform for applications' IT

More information

How To Protect Data From Attack On A Computer System

How To Protect Data From Attack On A Computer System Information Management White Paper Understanding holistic database security 8 steps to successfully securing enterprise data sources 2 Understanding holistic database security News headlines about the

More information

Oracle Big Data Fundamentals Ed 1 NEW

Oracle Big Data Fundamentals Ed 1 NEW Oracle University Contact Us: +90 212 329 6779 Oracle Big Data Fundamentals Ed 1 NEW Duration: 5 Days What you will learn In the Oracle Big Data Fundamentals course, learn to use Oracle's Integrated Big

More information

AMPLIFYING SECURITY INTELLIGENCE

AMPLIFYING SECURITY INTELLIGENCE AMPLIFYING SECURITY INTELLIGENCE WITH BIG DATA AND ADVANCED ANALYTICS Chris Meenan Senior Product Manager, Security Intelligence 1 IBM Security Systems Welcome to a Not So Friendly Cyber World Biggest

More information

Enterprise Security Solutions

Enterprise Security Solutions Enterprise Security Solutions World-class technical solutions, professional services and training from experts you can trust ISOCORP is a Value-Added Reseller (VAR) and services provider for best in class

More information

How To Use Big Data For Telco (For A Telco)

How To Use Big Data For Telco (For A Telco) ON-LINE VIDEO ANALYTICS EMBRACING BIG DATA David Vanderfeesten, Bell Labs Belgium ANNO 2012 YOUR DATA IS MONEY BIG MONEY! Your click stream, your activity stream, your electricity consumption, your call

More information

IBM InfoSphere Guardium Tech Talk: Database Discovery and Sensitive Data Finder

IBM InfoSphere Guardium Tech Talk: Database Discovery and Sensitive Data Finder Dan Goodes Guardium Technical Sales Engineer July 2013 : Database Discovery and Sensitive Data Finder Information Management Logistics This tech talk is being recorded. If you object, please hang up and

More information

How to Choose the Right Security Information and Event Management (SIEM) Solution

How to Choose the Right Security Information and Event Management (SIEM) Solution How to Choose the Right Security Information and Event Management (SIEM) Solution John Burnham Director, Strategic Communications and Analyst Relations IBM Security Chris Meenan Director, Security Intelligence

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks

More information

CloudPassage Halo Technical Overview

CloudPassage Halo Technical Overview TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure

More information

Manageability with BPM

Manageability with BPM Manageability with BPM Presenter Names: Thierry Hendrickx / Chris den Hoedt 2008 IBM Corporation Agenda What is BPM Managing Internal controls with BPM IBM s Vision to BPM 1 Government leaders know what

More information

Information Security & Privacy Solutions Enabling Information Governance

Information Security & Privacy Solutions Enabling Information Governance Information Security & Privacy Solutions Enabling Information Governance LYNDA KEITANY IM SALES SPECIALIST July 11, 2012 What s at Stake? Damage to company reputation Brand equity damage; negative publicity

More information

Simplifying Big Data Analytics: Unifying Batch and Stream Processing. John Fanelli,! VP Product! In-Memory Compute Summit! June 30, 2015!!

Simplifying Big Data Analytics: Unifying Batch and Stream Processing. John Fanelli,! VP Product! In-Memory Compute Summit! June 30, 2015!! Simplifying Big Data Analytics: Unifying Batch and Stream Processing John Fanelli,! VP Product! In-Memory Compute Summit! June 30, 2015!! Streaming Analy.cs S S S Scale- up Database Data And Compute Grid

More information

Data Integration Checklist

Data Integration Checklist The need for data integration tools exists in every company, small to large. Whether it is extracting data that exists in spreadsheets, packaged applications, databases, sensor networks or social media

More information

IBM Security Intelligence Strategy

IBM Security Intelligence Strategy IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational

More information

The SparkWeave Private Cloud & Secure Collaboration Suite. Core Features

The SparkWeave Private Cloud & Secure Collaboration Suite. Core Features The SparkWeave Private Cloud & Secure Collaboration Suite The SparkWeave Private Cloud is a virtual platform hosted in the customer s data center. SparkWeave is storage agnostic, autonomously providing

More information

An Integrated Big Data & Analytics Infrastructure June 14, 2012 Robert Stackowiak, VP Oracle ESG Data Systems Architecture

An Integrated Big Data & Analytics Infrastructure June 14, 2012 Robert Stackowiak, VP Oracle ESG Data Systems Architecture An Integrated Big Data & Analytics Infrastructure June 14, 2012 Robert Stackowiak, VP ESG Data Systems Architecture Big Data & Analytics as a Service Components Unstructured Data / Sparse Data of Value

More information

Guardium7: Windows Event Log Capture All files needed for this exercise are in the TSE FTP Folder : Run script: read_events.pl:

Guardium7: Windows Event Log Capture All files needed for this exercise are in the TSE FTP Folder : Run script: read_events.pl: Guardium7: Windows Event Log Capture Guardium V7 - July 2009 Rodrigo Bisbal Highlights: Detect Active Directory account events such as: user creation, modification & deletion, failed domain logins, logins,

More information

Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies

Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies Big Data: Global Digital Data Growth Growing leaps and bounds by 40+% Year over Year! 2009 =.8 Zetabytes =.08

More information

Oracle s Big Data solutions. Roger Wullschleger. <Insert Picture Here>

Oracle s Big Data solutions. Roger Wullschleger. <Insert Picture Here> s Big Data solutions Roger Wullschleger DBTA Workshop on Big Data, Cloud Data Management and NoSQL 10. October 2012, Stade de Suisse, Berne 1 The following is intended to outline

More information

Securing NoSQL Clusters

Securing NoSQL Clusters Presents Securing NoSQL Clusters Adrian Lane, CTO alane@securosis.com Twitter: @AdrianLane David Mortman dmortman@securosis.com Twitter: @ Independent analysts with backgrounds on both the user and vendor

More information

Big Data Trust and Reputation, Privacy Cyber Threat Intelligence

Big Data Trust and Reputation, Privacy Cyber Threat Intelligence Big Data Trust and Reputation, Privacy Cyber Threat Intelligence October 27, 2015 Start Time: 9 am US Pacific / 12 noon US Eastern / 5 pm London Time #ISSAWebConf Big Data Trust and Reputation, Privacy

More information

Data Loss Prevention: Gone in Under 60 Milliseconds November 20, 2012

Data Loss Prevention: Gone in Under 60 Milliseconds November 20, 2012 Data Loss Prevention: Gone in Under 60 Milliseconds November 20, 2012 Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London 1 2 Generously sponsored by: Welcome Conference Moderator Allan Wall UK,

More information

Introduction to Hadoop. New York Oracle User Group Vikas Sawhney

Introduction to Hadoop. New York Oracle User Group Vikas Sawhney Introduction to Hadoop New York Oracle User Group Vikas Sawhney GENERAL AGENDA Driving Factors behind BIG-DATA NOSQL Database 2014 Database Landscape Hadoop Architecture Map/Reduce Hadoop Eco-system Hadoop

More information

Data Refinery with Big Data Aspects

Data Refinery with Big Data Aspects International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data

More information

The evolution of database technology (II) Huibert Aalbers Senior Certified Executive IT Architect

The evolution of database technology (II) Huibert Aalbers Senior Certified Executive IT Architect The evolution of database technology (II) Huibert Aalbers Senior Certified Executive IT Architect IT Insight podcast This podcast belongs to the IT Insight series You can subscribe to the podcast through

More information

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing

More information

Log management & SIEM: QRadar Security Intelligence Platform

Log management & SIEM: QRadar Security Intelligence Platform Log management & SIEM: QRadar Security Intelligence Platform Tibor Bősze Security Architect for CEE+RCIS tibor.boesze@hu.ibm.com The Security Intelligence Leader Who is Q1Labs: Innovative Security Intelligence

More information

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Many enterprise organizations claim that they already

More information

Netwrix Auditor. Administrator's Guide. Version: 7.1 10/30/2015

Netwrix Auditor. Administrator's Guide. Version: 7.1 10/30/2015 Netwrix Auditor Administrator's Guide Version: 7.1 10/30/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation

More information

Data Security for this dynamic era of computing InfoSphere Guardium Overview February 2014

Data Security for this dynamic era of computing InfoSphere Guardium Overview February 2014 Data Security for this dynamic era of computing InfoSphere Guardium Overview February 2014 Paul Resten Larry Metaxotos Joe Bedard Agenda The need to act on protecting sensitive data now Protecting Data

More information

Real-time Data Analytics mit Elasticsearch. Bernhard Pflugfelder inovex GmbH

Real-time Data Analytics mit Elasticsearch. Bernhard Pflugfelder inovex GmbH Real-time Data Analytics mit Elasticsearch Bernhard Pflugfelder inovex GmbH Bernhard Pflugfelder Big Data Engineer @ inovex Fields of interest: search analytics big data bi Working with: Lucene Solr Elasticsearch

More information

Towards Smart and Intelligent SDN Controller

Towards Smart and Intelligent SDN Controller Towards Smart and Intelligent SDN Controller - Through the Generic, Extensible, and Elastic Time Series Data Repository (TSDR) YuLing Chen, Dell Inc. Rajesh Narayanan, Dell Inc. Sharon Aicler, Cisco Systems

More information

Process Automation Overview Process Automation Overview

Process Automation Overview Process Automation Overview Process Automation Overview Process Automation Business Overview Presented By: Skype: dom.fernandez Dominic Fernandez Principal Consultant dscf@computants.org http://www.computants.org/ 1 http://www.computants.org/

More information

Data processing goes big

Data processing goes big Test report: Integration Big Data Edition Data processing goes big Dr. Götz Güttich Integration is a powerful set of tools to access, transform, move and synchronize data. With more than 450 connectors,

More information

Survival Tips for Big Data Impact on Performance Share Pittsburgh Session 15404

Survival Tips for Big Data Impact on Performance Share Pittsburgh Session 15404 Survival Tips for Big Data Impact on Performance Share Pittsburgh Session 15404 Laura Knapp WW Business Consultant Laurak@aesclever.com ipv6hawaii@outlook.com 08/04/2014 Applied Expert Systems, Inc. 2014

More information

Introduction to Big data. Why Big data? Case Studies. Introduction to Hadoop. Understanding Features of Hadoop. Hadoop Architecture.

Introduction to Big data. Why Big data? Case Studies. Introduction to Hadoop. Understanding Features of Hadoop. Hadoop Architecture. Big Data Hadoop Administration and Developer Course This course is designed to understand and implement the concepts of Big data and Hadoop. This will cover right from setting up Hadoop environment in

More information

Oracle Big Data SQL Technical Update

Oracle Big Data SQL Technical Update Oracle Big Data SQL Technical Update Jean-Pierre Dijcks Oracle Redwood City, CA, USA Keywords: Big Data, Hadoop, NoSQL Databases, Relational Databases, SQL, Security, Performance Introduction This technical

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

Big Data Are You Ready? Jorge Plascencia Solution Architect Manager

Big Data Are You Ready? Jorge Plascencia Solution Architect Manager Big Data Are You Ready? Jorge Plascencia Solution Architect Manager Big Data: The Datafication Of Everything Thoughts Devices Processes Thoughts Things Processes Run the Business Organize data to do something

More information

Information Technology Policy

Information Technology Policy Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review RA-ITCentral@pa.gov

More information

Intel HPC Distribution for Apache Hadoop* Software including Intel Enterprise Edition for Lustre* Software. SC13, November, 2013

Intel HPC Distribution for Apache Hadoop* Software including Intel Enterprise Edition for Lustre* Software. SC13, November, 2013 Intel HPC Distribution for Apache Hadoop* Software including Intel Enterprise Edition for Lustre* Software SC13, November, 2013 Agenda Abstract Opportunity: HPC Adoption of Big Data Analytics on Apache

More information

Chukwa, Hadoop subproject, 37, 131 Cloud enabled big data, 4 Codd s 12 rules, 1 Column-oriented databases, 18, 52 Compression pattern, 83 84

Chukwa, Hadoop subproject, 37, 131 Cloud enabled big data, 4 Codd s 12 rules, 1 Column-oriented databases, 18, 52 Compression pattern, 83 84 Index A Amazon Web Services (AWS), 50, 58 Analytics engine, 21 22 Apache Kafka, 38, 131 Apache S4, 38, 131 Apache Sqoop, 37, 131 Appliance pattern, 104 105 Application architecture, big data analytics

More information

Oracle Database 12c Plug In. Switch On. Get SMART.

Oracle Database 12c Plug In. Switch On. Get SMART. Oracle Database 12c Plug In. Switch On. Get SMART. Duncan Harvey Head of Core Technology, Oracle EMEA March 2015 Safe Harbor Statement The following is intended to outline our general product direction.

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Securing and protecting the organization s most sensitive data

Securing and protecting the organization s most sensitive data Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered

More information

Security Information and Event Management

Security Information and Event Management Security Information and Event Management sponsored by: ISSA Web Conference April 26, 2011 Start Time: 9 am US Pacific, Noon US Eastern, 5 pm London Welcome Conference Moderator Phillip H. Griffin ISSA

More information

8 Steps to Holistic Database Security

8 Steps to Holistic Database Security Information Management White Paper 8 Steps to Holistic Database Security By Ron Ben Natan, Ph.D., IBM Distinguished Engineer, CTO for Integrated Data Management 2 8 Steps to Holistic Database Security

More information

IBM BigInsights Has Potential If It Lives Up To Its Promise. InfoSphere BigInsights A Closer Look

IBM BigInsights Has Potential If It Lives Up To Its Promise. InfoSphere BigInsights A Closer Look IBM BigInsights Has Potential If It Lives Up To Its Promise By Prakash Sukumar, Principal Consultant at iolap, Inc. IBM released Hadoop-based InfoSphere BigInsights in May 2013. There are already Hadoop-based

More information

CloudPassage Halo Technical Overview

CloudPassage Halo Technical Overview TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure

More information

AppSentry Application and Database Security Auditing

AppSentry Application and Database Security Auditing AppSentry Application and Database Security Auditing May 2014 Stephen Kost Chief Technology Officer Integrigy Corporation About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle and Microsoft

More information

So What s the Big Deal?

So What s the Big Deal? So What s the Big Deal? Presentation Agenda Introduction What is Big Data? So What is the Big Deal? Big Data Technologies Identifying Big Data Opportunities Conducting a Big Data Proof of Concept Big Data

More information

Forcepoint Stonesoft Management Center

Forcepoint Stonesoft Management Center Datasheet Forcepoint Stonesoft Management Center EFFICIENT, CENTRALIZED MANAGEMENT OF FORCEPOINT STONESOFT NEXT GENERATION FIREWALLS IN DISTRIBUTED ENTERPRISE ENVIRONMENTS FORCEPOINT STONESOFT MANAGEMENT

More information

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security SIEM Optimization 101 ReliaQuest E-Book Fully Integrated and Optimized IT Security Introduction SIEM solutions are effective security measures that mitigate security breaches and increase the awareness

More information

IBM InfoSphere Guardium Data Activity Monitor

IBM InfoSphere Guardium Data Activity Monitor IBM InfoSphere Guardium Data Activity Monitor Continuously monitor data access and protect sensitive data across the enterprise Highlights Provides a simple, robust solution for continuously monitoring

More information

Using OBIEE for Location-Aware Predictive Analytics

Using OBIEE for Location-Aware Predictive Analytics Using OBIEE for Location-Aware Predictive Analytics Jean Ihm, Principal Product Manager, Oracle Spatial and Graph Jayant Sharma, Director, Product Management, Oracle Spatial and Graph, MapViewer Oracle

More information

IBM Software Top Three Myths about Big Data Security

IBM Software Top Three Myths about Big Data Security IBM Software Top Three Myths about Big Data Security Debunking common misconceptions about big data security 2 Comprehensive Top Three Myths About data Big Data protection Security for physical, virtual

More information

The SparkWeave Private Cloud & Secure Collaboration Suite. Core Features

The SparkWeave Private Cloud & Secure Collaboration Suite. Core Features The SparkWeave Private Cloud & Secure Collaboration Suite The SparkWeave Private Cloud is a virtual platform hosted in the customer s data center, completely independent from the physical storage hardware,

More information

IBM QRadar Security Intelligence Platform appliances

IBM QRadar Security Intelligence Platform appliances IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event

More information

Petabyte Scale Data at Facebook. Dhruba Borthakur, Engineer at Facebook, SIGMOD, New York, June 2013

Petabyte Scale Data at Facebook. Dhruba Borthakur, Engineer at Facebook, SIGMOD, New York, June 2013 Petabyte Scale Data at Facebook Dhruba Borthakur, Engineer at Facebook, SIGMOD, New York, June 2013 Agenda 1 Types of Data 2 Data Model and API for Facebook Graph Data 3 SLTP (Semi-OLTP) and Analytics

More information