Big Data: Controlling the Perfect Storm September 24, 2013
|
|
- Chrystal Nichols
- 8 years ago
- Views:
Transcription
1 Big Data: Controlling the Perfect Storm September 24, 2013 Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London 1
2 2 Generously sponsored by:
3 Welcome Conference Moderator Matt Mosley Northern Virginia, USA Chapter ISSA Web Conference Committee 3
4 Agenda Speakers Chris Diehl Principal and Co-Founder, The Data Guild Kathy Zeidenstein Technology Evangelist, IBM InfoSphere Guardium Open Panel with Audience Q&A Closing Remarks 4
5 Organizational Resilience in an Uncertain World Chris Diehl Principal and Co-Founder The Data Guild 5
6 6
7 7
8 8
9 9
10 10
11 11
12 12
13 13
14 14
15 15
16 16
17 17
18 18
19 19
20 20
21 21
22 22
23 23
24 24
25 25
26 26
27 27
28 Question and Answer Chris Diehl Principal and Co-Founder The Data Guild 27 28
29 Data protection for the new world of Hadoop and NoSQL system Kathy Zeidenstein Technology Evangelist IBM InfoSphere Guardium 5
30 Agenda Overview of NoSQL and Hadoop Protecting data at rest (file encryption) Protecting data in use (monitoring) Integrating with SIEM
31 Information protection in the new era of computing Sensitive data is everywhere; Traditional boundaries don t exist Business Application Systems Unstructured Data File Systems (SAP, PeopleSoft, Oracle Financials, In-house, CRM, etc.) Application Server v Office documents, PDF, Vision, Audio & other Fax/Print Servers File Servers Remote locations & Systems Storage & Backup Systems SAN/NAS Backup Systems Security & Other Systems (Event logs, Error logs Cache, Encryption keys, & other secrets) Security Systems Structured Data Database Systems (SQL, Oracle, DB2, Informix, MySQL) Database Server NoSQL and Hadoop Data Communications VoIP Systems FTP/Dropbox Server Servers (MongoDB, CouchDB, Hbase, Cassandra, HDFS)
32 NoSQL and Hadoop 101 NoSQL is a generic term for a very nongeneric landscape of data stores Hadoop is a framework for processing large and varied data sets with low cost at a high degree of fault tolerance. Components include (among others): A file system (Hadoop File System HDFS) A framework for processing data (Map- Reduce) May include a NoSQL Database HBase SQL Not Only SQL Hive Application MapReduce MapReduce Oozie HBase Storage HDFS
33 Categories of NoSQL Source: Akmal Chaudhri s NoSQLpresentation:
34 Market is growing and fragmented Hadoop-NoSQL Software and Services Market Forecast
35 FUD (for a good reason). more than half (56%) [senior-lever IT and security respondents admitted that these security concerns have kept them from starting or finishing cloud or big data projects. 1 Big Data may well present a rich target of opportunity for cybercriminals. 2 1Study conducted by Voltage at InfoSecurity Europe in April 2013 with over 300 IT professionals Reported in Dark Reading: 2 Rob Livingstone in CFO.com "Security and access control are part of the reason why Hadoop is not ready to replace relational databases" 3 3David Menninger, an analyst with Ventana Research. Quoted in
36 Perimeter Security is Not Enough Dynamic Data (in use) Static Data (at rest)
37 Protecting data at rest (encryption) WHO is attempting to access protected data? Configure groups, or applications who can access protected data WHAT data is being accessed? Configure appropriate file and directory access WHEN is the data being accessed? Configure a range of hours and days of the week for authorized access HOW is the data being accessed? Configure allowable file system operations allowed to access the data e.g. read, write, delete, rename, application or process, etc. EFFECT: Permit; Deny; Encrypt; Audit $%#@!*(&^$%$% ^&*()(*&^%$#@#$ %^&*DFGHJTR#$ Static Data (at rest)
38 Data Encryption Architecture Authenticated Users Applications DBMS Server server / file File server ftp server DE Agent SSL x.509 Certificates Web Administration https File System Active /Active IBM DE Server Data Encryption Security Server Policy and Key Management Centralized administration Separation of duties Key, Policy, Audit Log Store Online Files 38
39 Protecting big data at rest All data sources potentially contain sensitive information Data is distributed as needed throughout the cluster by the Big Data application Deploy encryption agents to all systems hosting Data Stores Agents protect the data store at the file system or volume level 39 From Vormetric
40 Implement database activity monitoring Create a secure, detailed, verifiable audit trail of all database activities User activity, including privileged users User creation and object creation and manipulation Gain visibility into all database activity involving sensitive data Who, what, when and how Real-time alerts for suspicious activity Integrate with business processes for audit compliance Dissemination of reports to appropriate personnel for signoff and review Retain reports and signoffs per audit requirements Dynamic Data (in use) 40
41 High level architecture of the InfoSphere Guardium DAM solution Network traffic sent to tamper-proof appliance by lightweight agent Heavy lifting done on appliance, not on data cluster Separation of duties Role-based GUI Security policies separate from DBA Audit data is accessible only through APIs and reports Reports/Ad hoc searches InfoSphere Guardium Collector Real-time alerts can be integrated with SIEM systems Clients Name node or routing node Data node S-TAPs Routing server or name node (where applicable)
42 Challenges of protecting the Hadoop stack User Interface Hackers Application MapReduce Hive Unvetted applications or ad hoc processes Oozie Storage HBase HDFS Privileged users
43 Hadoop example Select count(*) from page_click where Hive query:who ran it and on what object Breaks down into MapReduce Job Low level HDFS commands
44 Use case: What Map Reduce jobs are accessing the cluster? Do you know when new MapReduce jobs are running in the cluster? Do you know who is submitting them and from where? Are they accessing sensitive data? Now, reduce the noise by filtering out authorized jobs.
45 Use case: What Map Reduce jobs are accessing the cluster? Focus your resources on the unknown Unauthorized MapReduce jobs
46 Use case: What Map Reduce jobs are accessing the cluster? Audit process workflow and administrative automation Should this job be approved? Unauthorized Map Reduce Job List Report How can we automate the process of review, approval, and administration.?
47 Automate approval workflow Audit process workflow and administrative automation Business Owner approves or rejects Information Security confirms Business Owner recommendation Guardium Admin adds authorized jobs to authorized job list
48 Automate approval workflow Populate new vetted applications automatically
49 Automate approval workflow Populate new vetted applications automatically
50 MongoDB Example High Performance -Indexes -RAM Horizontally Scalable -Sharding Native API (Java, C#, C++, 9 more) Highly Available -Replica Sets Dynamic Document Data Model { customer_id : 1, first_name : "Mark", accounts : [ { account_num: 13, branch_id : 200, type : "Checking }, { account_num: 15, branch_id : 300, type : 401(k) co: 10gen } ] }
51 Sample activity db.creditcard.find() db.creditcard.update({"name":"sundari Voruganti"},{$set:{"product":"Platinum card"}},false, true) 51
52 Monitor users and roles Who created the user and when did they do it The full message details includes the actual command which shows you the roles 52
53 53 Automate review of roles
54 Text search for ad-hoc investigations Who dropped my collection?! 54
55 Integrate with QRadar to add data security insights to your security intelligence Security Devices In-depth data activity monitoring and security insights from InfoSphere Guardium Databases Data Warehouses Hadoop/NoSQL Big Data environments File shares Applications Servers & Hosts Network & Virtual Activity Database Activity Activity Application Activity Configuration Info Event Correlation Activity Baselining & Anomaly Detection Offense Identification Vulnerability Info Info Extensive Data Sources User Activity + = Deep Intelligence Specific vulnerability assessment for database infrastructure Exceptionally Accurate and Actionable Insight Send real-time data activity security alerts from Guardium to QRadar in LEEF format Send data activity audit reports (syslog) from Guardium to Q1 to enhance analytics Share database vulnerability findings (CVE) between Guardium and QRadar in AXIS or SCAP
56 InfoSphere Guardium protects sensitive data in Big Data and NoSQL environments Protect your sensitive data with real time activity monitoring Gain insights into activity throughout the Hadoop stack: Hive, MapReduce, HBase and HDFS Gain insight into NoSQL systems such as MongoDB, Cassandra, CouchDB Detect unauthorized applications or users Real time alerts reduce time to discovery for possible breach or infraction of compliance Automate compliance and management tasks Integrates with security information and event management systems for action and correlation analysis User Interface Application Storage Hive MapReduce Oozie HBase HDFS
57 Protect sensitive data wherever it lies DATABASES NEW Optim Archival D A T A B A S E Exadata InfoSphere BigInsights Master Data Management Data Stage CICS Siebel, PeopleSoft, E-Business FTP InfoSphere Guardium
58 Next steps? E-book NoSQL does not have to mean no security EN.PDF E-book Planning a security and auditing deployment for Hadoop WW Sales leader: Dave Valovcin (dvalovcin@us.ibm.com)
59 Dziękuję gracias Traditional Chinese Polish Thai Spanish Merci French спасибо Russian Obrigado Brazilian Portuguese Danke German Arabic Tack Swedish Simplified Chinese Japanese Grazie Italian
60 Question and Answer Kathy Zeidenstein Technology Evangelist IBM InfoSphere Guardium 27 60
61 Open Panel with Audience Q&A Chris Diehl Principal and Co-Founder, The Data Guild Kathy Zeidenstein Technology Evangelist, IBM InfoSphere Guardium 61
62 Closing Remarks Thank you to our Sponsor Thank you to Citrix for donating this Webcast service Online Meetings Made Easy 62
63 CPE Credit Within 24 hours of the conclusion of this webcast, you will receive a link via to a post Web Conference quiz. After the successful completion of the quiz you will be given an opportunity to PRINT a certificate of attendance to use for the submission of CPE credits. On-Demand Viewers Quiz Link: Conference-Big-Data-Controlling-the-Perfect-Storm- September
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems Proactively address regulatory compliance requirements and protect sensitive data in real time Highlights Monitor and audit data activity
More informationHow To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis (ingmars.briedis@also.com) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
More informationIBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop
Planning a data security and auditing deployment for Hadoop 2 1 2 3 4 5 6 Introduction Architecture Plan Implement Operationalize Conclusion Key requirements for detecting data breaches and addressing
More informationEncryption is Fundamental: A Technical Overview of Guardium Data Encryption October 2014
IBM Security Systems Encryption is Fundamental: A Technical Overview of Guardium Data Encryption October 2014 Tim Parmenter InfoSphere Guardium Technical Professional Mark Jamison Accelerated Value Specialist
More informationIBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive
IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive One of a series of InfoSphere Guardium Technical Talks Ernie Mancill Executive IT Specialist Logistics This tech talk is being recorded. If you
More informationReal-Time Database Protection and. Overview. 2010 IBM Corporation
Real-Time Database Protection and Monitoring: IBM InfoSphere Guardium Overview Agenda Business drivers for database security InfoSphere Guardium architecture Common applications The InfoSphere portfolio
More informationGuardium Change Auditing System (CAS)
Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity
More informationIBM InfoSphere Guardium
IBM InfoSphere Guardium Enterprise-wide Database Protection and Compliance Jānis Bērziņš, DPA 08.11.2012 Data is the key target for security breaches.. and Database Servers Are The Primary Source of Breached
More informationBIG DATA: Big Opportunity, Big Headaches Protect your Big Data with data security
BIG DATA: Big Opportunity, Big Headaches Protect your Big Data with data security Marilene Roder WW Enablement, Guardium IBM Security Brazil Security Roadshow June 9-11, 2 015 12015 IBM Corporation 2014
More informationBYOD to the Cloud May 28, 2013
BYOD to the Cloud May 28, 2013 Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London 1 2 Generously sponsored by: Welcome Conference Moderator Matt Mosley Northern Virginia, USA Chapter ISSA Web Conference
More informationSecurely maintaining sensitive financial and
How the Guardium Platform Helped Dell IT Simplify Enterprise security By Phil Neray Addison Lawrence David McMaster Venugopal Nonavinakere Safeguarding data is critical for many organizations, but auditing
More informationObtaining Value from Your Database Activity Monitoring (DAM) Solution
Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
More informationApplication Monitoring for SAP
Application Monitoring for SAP Detect Fraud in Real-Time by Monitoring Application User Activities Highlights: Protects SAP data environments from fraud, external or internal attack, privilege abuse and
More informationWhat is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
More informationHow To Manage A Database With Infosphere Guardium
IBM InfoSphere Guardium Managing the entire database security and compliance life cycle Leading organizations across the world trust IBM to secure their critical enterprise data. The fact is, we provide
More informationBusiness Activity Monitoring of non-ibm activity
Business Activity Monitoring of non-ibm activity WebSphere Technical Sales Agenda Intro to BPM & BAM WebSphere Business Monitor Talking to WebSphere Business Monitor Demo using WebSphere Message Broker
More informationLuncheon Webinar Series May 13, 2013
Luncheon Webinar Series May 13, 2013 InfoSphere DataStage is Big Data Integration Sponsored By: Presented by : Tony Curcio, InfoSphere Product Management 0 InfoSphere DataStage is Big Data Integration
More informationIBM Software Top tips for securing big data environments
IBM Software Top tips for securing big data environments Why big data doesn t have to mean big security challenges 2 Top Comprehensive tips for securing data big protection data environments for physical,
More informationIBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
More informationFive Keys to Big Data Audit and Protection WHITEPAPER
1 Introduction Driven by the promise of uncovering valuable insights that enable better, fine-tuned decision making, many businesses are planning if not already making substantial investments in big data
More informationQ1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
More informationIBM Infrastructure Suite for z/vm and Linux
IBM Infrastructure Suite for z/vm and Linux Tracy Dean, IBM tld1@us.ibm.com October 2015 Agenda Solution introduction Solution details Summary, contacts, and more information 2 IBM Infrastructure Suite
More informationDatabase Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions
Database Auditing & Security Brian Flasck - IBM Louise Joosse - BPSolutions Agenda Introduction Drivers for Better DB Security InfoSphere Guardium Solution Summary Netherlands Case Study The need for additional
More informationEnterprise Database Security & Monitoring: Guardium Overview
Enterprise Database Security & Monitoring: Guardium Overview Phone: 781.487.9400 Email: info@guardium.com Guardium: Market-Proven Leadership Vision Enterprise platform for securing critical data across
More informationGAIN BETTER INSIGHT FROM BIG DATA USING JBOSS DATA VIRTUALIZATION
GAIN BETTER INSIGHT FROM BIG DATA USING JBOSS DATA VIRTUALIZATION Syed Rasheed Solution Manager Red Hat Corp. Kenny Peeples Technical Manager Red Hat Corp. Kimberly Palko Product Manager Red Hat Corp.
More informationIBM BigInsights for Apache Hadoop
IBM BigInsights for Apache Hadoop Efficiently manage and mine big data for valuable insights Highlights: Enterprise-ready Apache Hadoop based platform for data processing, warehousing and analytics Advanced
More informationBig Data Management and Security
Big Data Management and Security Audit Concerns and Business Risks Tami Frankenfield Sr. Director, Analytics and Enterprise Data Mercury Insurance What is Big Data? Velocity + Volume + Variety = Value
More informationSecret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
More informationBIG DATA ANALYTICS REFERENCE ARCHITECTURES AND CASE STUDIES
BIG DATA ANALYTICS REFERENCE ARCHITECTURES AND CASE STUDIES Relational vs. Non-Relational Architecture Relational Non-Relational Rational Predictable Traditional Agile Flexible Modern 2 Agenda Big Data
More informationInfomatics. Big-Data and Hadoop Developer Training with Oracle WDP
Big-Data and Hadoop Developer Training with Oracle WDP What is this course about? Big Data is a collection of large and complex data sets that cannot be processed using regular database management tools
More informationIBM InfoSphere Guardium Vulnerability Assessment
IBM InfoSphere Guardium Vulnerability Assessment Scan database infrastructures to detect vulnerabilities and suggest remedial actions Highlights Lowers total cost of ownership, improves security and supports
More informationNIST 800-53 Accelerator Automated Real-Time Controls to Protect Against Cyberattacks & Insider Threats
NIST 800-53 Accelerator Automated Real-Time Controls to Protect Against Cyberattacks & Insider Threats Highlights Full suite of database security applications: Automate & simplify NIST 800-53 controls
More informationIBM InfoSphere Guardium Vulnerability Assessment
IBM InfoSphere Guardium Vulnerability Assessment Scan database infrastructures to detect vulnerabilities and suggest remedial actions Highlights Lowers total cost of ownership, improves security and supports
More informationBig Data Analytics Platform @ Nokia
Big Data Analytics Platform @ Nokia 1 Selecting the Right Tool for the Right Workload Yekesa Kosuru Nokia Location & Commerce Strata + Hadoop World NY - Oct 25, 2012 Agenda Big Data Analytics Platform
More informationOracle Big Data Essentials
Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 40291196 Oracle Big Data Essentials Duration: 3 Days What you will learn This Oracle Big Data Essentials training deep dives into using the
More informationStrengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
More informationDeveloping Value from Oracle s Audit Vault For Auditors and IT Security Professionals
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals November 13, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer
More informationIBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
More informationIBM InfoSphere Guardium
IBM InfoSphere Guardium Managing the Entire Database Security and Compliance Lifecycle More Global 1000 organizations trust IBM to secure their critical enterprise data than any other technology provider.
More informationXpoLog Competitive Comparison Sheet
XpoLog Competitive Comparison Sheet New frontier in big log data analysis and application intelligence Technical white paper May 2015 XpoLog, a data analysis and management platform for applications' IT
More informationHow To Protect Data From Attack On A Computer System
Information Management White Paper Understanding holistic database security 8 steps to successfully securing enterprise data sources 2 Understanding holistic database security News headlines about the
More informationOracle Big Data Fundamentals Ed 1 NEW
Oracle University Contact Us: +90 212 329 6779 Oracle Big Data Fundamentals Ed 1 NEW Duration: 5 Days What you will learn In the Oracle Big Data Fundamentals course, learn to use Oracle's Integrated Big
More informationAMPLIFYING SECURITY INTELLIGENCE
AMPLIFYING SECURITY INTELLIGENCE WITH BIG DATA AND ADVANCED ANALYTICS Chris Meenan Senior Product Manager, Security Intelligence 1 IBM Security Systems Welcome to a Not So Friendly Cyber World Biggest
More informationEnterprise Security Solutions
Enterprise Security Solutions World-class technical solutions, professional services and training from experts you can trust ISOCORP is a Value-Added Reseller (VAR) and services provider for best in class
More informationHow To Use Big Data For Telco (For A Telco)
ON-LINE VIDEO ANALYTICS EMBRACING BIG DATA David Vanderfeesten, Bell Labs Belgium ANNO 2012 YOUR DATA IS MONEY BIG MONEY! Your click stream, your activity stream, your electricity consumption, your call
More informationIBM InfoSphere Guardium Tech Talk: Database Discovery and Sensitive Data Finder
Dan Goodes Guardium Technical Sales Engineer July 2013 : Database Discovery and Sensitive Data Finder Information Management Logistics This tech talk is being recorded. If you object, please hang up and
More informationHow to Choose the Right Security Information and Event Management (SIEM) Solution
How to Choose the Right Security Information and Event Management (SIEM) Solution John Burnham Director, Strategic Communications and Analyst Relations IBM Security Chris Meenan Director, Security Intelligence
More informationIBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks
More informationCloudPassage Halo Technical Overview
TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure
More informationManageability with BPM
Manageability with BPM Presenter Names: Thierry Hendrickx / Chris den Hoedt 2008 IBM Corporation Agenda What is BPM Managing Internal controls with BPM IBM s Vision to BPM 1 Government leaders know what
More informationInformation Security & Privacy Solutions Enabling Information Governance
Information Security & Privacy Solutions Enabling Information Governance LYNDA KEITANY IM SALES SPECIALIST July 11, 2012 What s at Stake? Damage to company reputation Brand equity damage; negative publicity
More informationSimplifying Big Data Analytics: Unifying Batch and Stream Processing. John Fanelli,! VP Product! In-Memory Compute Summit! June 30, 2015!!
Simplifying Big Data Analytics: Unifying Batch and Stream Processing John Fanelli,! VP Product! In-Memory Compute Summit! June 30, 2015!! Streaming Analy.cs S S S Scale- up Database Data And Compute Grid
More informationData Integration Checklist
The need for data integration tools exists in every company, small to large. Whether it is extracting data that exists in spreadsheets, packaged applications, databases, sensor networks or social media
More informationIBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
More informationThe SparkWeave Private Cloud & Secure Collaboration Suite. Core Features
The SparkWeave Private Cloud & Secure Collaboration Suite The SparkWeave Private Cloud is a virtual platform hosted in the customer s data center. SparkWeave is storage agnostic, autonomously providing
More informationAn Integrated Big Data & Analytics Infrastructure June 14, 2012 Robert Stackowiak, VP Oracle ESG Data Systems Architecture
An Integrated Big Data & Analytics Infrastructure June 14, 2012 Robert Stackowiak, VP ESG Data Systems Architecture Big Data & Analytics as a Service Components Unstructured Data / Sparse Data of Value
More informationGuardium7: Windows Event Log Capture All files needed for this exercise are in the TSE FTP Folder : Run script: read_events.pl:
Guardium7: Windows Event Log Capture Guardium V7 - July 2009 Rodrigo Bisbal Highlights: Detect Active Directory account events such as: user creation, modification & deletion, failed domain logins, logins,
More informationBig Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies
Big Data, Cloud Computing, Spatial Databases Steven Hagan Vice President Server Technologies Big Data: Global Digital Data Growth Growing leaps and bounds by 40+% Year over Year! 2009 =.8 Zetabytes =.08
More informationOracle s Big Data solutions. Roger Wullschleger. <Insert Picture Here>
s Big Data solutions Roger Wullschleger DBTA Workshop on Big Data, Cloud Data Management and NoSQL 10. October 2012, Stade de Suisse, Berne 1 The following is intended to outline
More informationSecuring NoSQL Clusters
Presents Securing NoSQL Clusters Adrian Lane, CTO alane@securosis.com Twitter: @AdrianLane David Mortman dmortman@securosis.com Twitter: @ Independent analysts with backgrounds on both the user and vendor
More informationBig Data Trust and Reputation, Privacy Cyber Threat Intelligence
Big Data Trust and Reputation, Privacy Cyber Threat Intelligence October 27, 2015 Start Time: 9 am US Pacific / 12 noon US Eastern / 5 pm London Time #ISSAWebConf Big Data Trust and Reputation, Privacy
More informationData Loss Prevention: Gone in Under 60 Milliseconds November 20, 2012
Data Loss Prevention: Gone in Under 60 Milliseconds November 20, 2012 Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London 1 2 Generously sponsored by: Welcome Conference Moderator Allan Wall UK,
More informationIntroduction to Hadoop. New York Oracle User Group Vikas Sawhney
Introduction to Hadoop New York Oracle User Group Vikas Sawhney GENERAL AGENDA Driving Factors behind BIG-DATA NOSQL Database 2014 Database Landscape Hadoop Architecture Map/Reduce Hadoop Eco-system Hadoop
More informationData Refinery with Big Data Aspects
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data
More informationThe evolution of database technology (II) Huibert Aalbers Senior Certified Executive IT Architect
The evolution of database technology (II) Huibert Aalbers Senior Certified Executive IT Architect IT Insight podcast This podcast belongs to the IT Insight series You can subscribe to the podcast through
More informationTake the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
More informationLog management & SIEM: QRadar Security Intelligence Platform
Log management & SIEM: QRadar Security Intelligence Platform Tibor Bősze Security Architect for CEE+RCIS tibor.boesze@hu.ibm.com The Security Intelligence Leader Who is Q1Labs: Innovative Security Intelligence
More informationIBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Many enterprise organizations claim that they already
More informationNetwrix Auditor. Administrator's Guide. Version: 7.1 10/30/2015
Netwrix Auditor Administrator's Guide Version: 7.1 10/30/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation
More informationData Security for this dynamic era of computing InfoSphere Guardium Overview February 2014
Data Security for this dynamic era of computing InfoSphere Guardium Overview February 2014 Paul Resten Larry Metaxotos Joe Bedard Agenda The need to act on protecting sensitive data now Protecting Data
More informationReal-time Data Analytics mit Elasticsearch. Bernhard Pflugfelder inovex GmbH
Real-time Data Analytics mit Elasticsearch Bernhard Pflugfelder inovex GmbH Bernhard Pflugfelder Big Data Engineer @ inovex Fields of interest: search analytics big data bi Working with: Lucene Solr Elasticsearch
More informationTowards Smart and Intelligent SDN Controller
Towards Smart and Intelligent SDN Controller - Through the Generic, Extensible, and Elastic Time Series Data Repository (TSDR) YuLing Chen, Dell Inc. Rajesh Narayanan, Dell Inc. Sharon Aicler, Cisco Systems
More informationProcess Automation Overview Process Automation Overview
Process Automation Overview Process Automation Business Overview Presented By: Skype: dom.fernandez Dominic Fernandez Principal Consultant dscf@computants.org http://www.computants.org/ 1 http://www.computants.org/
More informationData processing goes big
Test report: Integration Big Data Edition Data processing goes big Dr. Götz Güttich Integration is a powerful set of tools to access, transform, move and synchronize data. With more than 450 connectors,
More informationSurvival Tips for Big Data Impact on Performance Share Pittsburgh Session 15404
Survival Tips for Big Data Impact on Performance Share Pittsburgh Session 15404 Laura Knapp WW Business Consultant Laurak@aesclever.com ipv6hawaii@outlook.com 08/04/2014 Applied Expert Systems, Inc. 2014
More informationIntroduction to Big data. Why Big data? Case Studies. Introduction to Hadoop. Understanding Features of Hadoop. Hadoop Architecture.
Big Data Hadoop Administration and Developer Course This course is designed to understand and implement the concepts of Big data and Hadoop. This will cover right from setting up Hadoop environment in
More informationOracle Big Data SQL Technical Update
Oracle Big Data SQL Technical Update Jean-Pierre Dijcks Oracle Redwood City, CA, USA Keywords: Big Data, Hadoop, NoSQL Databases, Relational Databases, SQL, Security, Performance Introduction This technical
More informationwith Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
More informationBig Data Are You Ready? Jorge Plascencia Solution Architect Manager
Big Data Are You Ready? Jorge Plascencia Solution Architect Manager Big Data: The Datafication Of Everything Thoughts Devices Processes Thoughts Things Processes Run the Business Organize data to do something
More informationInformation Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review RA-ITCentral@pa.gov
More informationIntel HPC Distribution for Apache Hadoop* Software including Intel Enterprise Edition for Lustre* Software. SC13, November, 2013
Intel HPC Distribution for Apache Hadoop* Software including Intel Enterprise Edition for Lustre* Software SC13, November, 2013 Agenda Abstract Opportunity: HPC Adoption of Big Data Analytics on Apache
More informationChukwa, Hadoop subproject, 37, 131 Cloud enabled big data, 4 Codd s 12 rules, 1 Column-oriented databases, 18, 52 Compression pattern, 83 84
Index A Amazon Web Services (AWS), 50, 58 Analytics engine, 21 22 Apache Kafka, 38, 131 Apache S4, 38, 131 Apache Sqoop, 37, 131 Appliance pattern, 104 105 Application architecture, big data analytics
More informationOracle Database 12c Plug In. Switch On. Get SMART.
Oracle Database 12c Plug In. Switch On. Get SMART. Duncan Harvey Head of Core Technology, Oracle EMEA March 2015 Safe Harbor Statement The following is intended to outline our general product direction.
More informationHow To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
More informationSecuring and protecting the organization s most sensitive data
Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered
More informationSecurity Information and Event Management
Security Information and Event Management sponsored by: ISSA Web Conference April 26, 2011 Start Time: 9 am US Pacific, Noon US Eastern, 5 pm London Welcome Conference Moderator Phillip H. Griffin ISSA
More information8 Steps to Holistic Database Security
Information Management White Paper 8 Steps to Holistic Database Security By Ron Ben Natan, Ph.D., IBM Distinguished Engineer, CTO for Integrated Data Management 2 8 Steps to Holistic Database Security
More informationIBM BigInsights Has Potential If It Lives Up To Its Promise. InfoSphere BigInsights A Closer Look
IBM BigInsights Has Potential If It Lives Up To Its Promise By Prakash Sukumar, Principal Consultant at iolap, Inc. IBM released Hadoop-based InfoSphere BigInsights in May 2013. There are already Hadoop-based
More informationCloudPassage Halo Technical Overview
TECHNICAL BRIEF CloudPassage Halo Technical Overview The Halo cloud security platform was purpose-built to provide your organization with the critical protection, visibility and control needed to assure
More informationAppSentry Application and Database Security Auditing
AppSentry Application and Database Security Auditing May 2014 Stephen Kost Chief Technology Officer Integrigy Corporation About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle and Microsoft
More informationSo What s the Big Deal?
So What s the Big Deal? Presentation Agenda Introduction What is Big Data? So What is the Big Deal? Big Data Technologies Identifying Big Data Opportunities Conducting a Big Data Proof of Concept Big Data
More informationForcepoint Stonesoft Management Center
Datasheet Forcepoint Stonesoft Management Center EFFICIENT, CENTRALIZED MANAGEMENT OF FORCEPOINT STONESOFT NEXT GENERATION FIREWALLS IN DISTRIBUTED ENTERPRISE ENVIRONMENTS FORCEPOINT STONESOFT MANAGEMENT
More informationSIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security
SIEM Optimization 101 ReliaQuest E-Book Fully Integrated and Optimized IT Security Introduction SIEM solutions are effective security measures that mitigate security breaches and increase the awareness
More informationIBM InfoSphere Guardium Data Activity Monitor
IBM InfoSphere Guardium Data Activity Monitor Continuously monitor data access and protect sensitive data across the enterprise Highlights Provides a simple, robust solution for continuously monitoring
More informationUsing OBIEE for Location-Aware Predictive Analytics
Using OBIEE for Location-Aware Predictive Analytics Jean Ihm, Principal Product Manager, Oracle Spatial and Graph Jayant Sharma, Director, Product Management, Oracle Spatial and Graph, MapViewer Oracle
More informationIBM Software Top Three Myths about Big Data Security
IBM Software Top Three Myths about Big Data Security Debunking common misconceptions about big data security 2 Comprehensive Top Three Myths About data Big Data protection Security for physical, virtual
More informationThe SparkWeave Private Cloud & Secure Collaboration Suite. Core Features
The SparkWeave Private Cloud & Secure Collaboration Suite The SparkWeave Private Cloud is a virtual platform hosted in the customer s data center, completely independent from the physical storage hardware,
More informationIBM QRadar Security Intelligence Platform appliances
IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event
More informationPetabyte Scale Data at Facebook. Dhruba Borthakur, Engineer at Facebook, SIGMOD, New York, June 2013
Petabyte Scale Data at Facebook Dhruba Borthakur, Engineer at Facebook, SIGMOD, New York, June 2013 Agenda 1 Types of Data 2 Data Model and API for Facebook Graph Data 3 SLTP (Semi-OLTP) and Analytics
More information