Aircloak Anonymized Analytics: Better Data, Better Intelligence
|
|
|
- Hector Singleton
- 10 years ago
- Views:
Transcription
1 Aircloak Anonymized Analytics: Better Data, Better Intelligence An Aircloak White Paper Data is the new gold. The amount of valuable data produced by users today through smartphones, wearable devices, and connected things is exploding. The companies that can best collect, mine, and monetize that data will be the winners. At the same time, public concerns over privacy are on the rise, and tough new regulations are just around the corner. Aircloak s anonymized analytics lets companies maximize the benefits of user data, while satisfying the public s and governments need for privacy. Data is the New Gold A WIFI hot-spot provider receives location data about millions of users. The provider s clients restaurants, stores, public buildings - would benefit from the insights this data provides: in the aggregate, where do their customers live and work? What other businesses do they frequent? How do these correlate with the customers purchases? Health clinics increasingly store patient care data electronically. Combining this data with that of other health clinics could provide tremendous benefits in the quality and cost of health care: For a given quality of health care, are some clinics more cost effective than others? Are the differences due to operational factors (nurse/patient ratio), or due to patient demographic factors (age or economic welfare)? Smart watch makers hold detailed information about peoples activities and certain health metrics. Smart scale makers track their customers weight and body mass index. Supermarkets track people s food purchases. Combining this data would provide unprecedented insights into diet and health for individuals and researchers alike. Aircloak
2 Privacy concerns stand in the way of these use cases. For example, the WIFI provider must certify that its data is anonymized before releasing information to its clients a lengthy, costly, and error-prone process. Using traditional anonymization methods, it is typically not possible to anonymize complex data like health data without destroying the utility of the data. Combining data from different data silos also cannot be done with traditional anonymization methods. In these cases, data is most often simply not shared. When it is shared, it is done only in high-trust settings supported by costly legal and technical oversight. These use cases are just a few of many examples, from transportation, automotive, health, Smart City, Internet of Things, finance, and government. Across the spectrum, vast amounts of useful data are going to waste because privacy concerns prevent easy and safe access to data. Aircloak s Anonymized Analytics Solution Aircloak s patented-pending solution enables anonymization for use cases where it was traditionally not possible. Aircloak is certified for all anonymization i use cases by TÜViT, the data protection division of TÜV, the largest and bestknown certification and testing organization in Germany. Aircloak immensely simplifies data anonymization. For the first time, certified data anonymization is as simple as uploading the data into an Aircloak SQLbased database cluster. Scalable, Flexible, Robust Aircloak s core technology is a scalable relational database deployed on a cluster of servers called cloaks. Sensitive data (data about users or their devices) is uploaded into a cloaked database, queries are submitted to the database, and anonymized answers are returned. Deployment: Aircloak s database cluster can be used as-a-service deployed by Aircloak in a data center in the client s country of choice, or as appliances Aircloak
3 deployed in-house. When in-house, the cluster may be administered remotely by Aircloak, or may be administered by the client. Either way, the data is anonymous: nobody, including system administrators, can view individual user data. Data Upload: Data is uploaded into the cloaked database through a simple RESTful API (JSON over attested HTTPS). The cloaked database can handle structured and unstructured data types, including free text. Data may be uploaded from existing databases, or directly from user devices. The data is anonymous from the moment it leaves the existing database or user device. Data may be uploaded in batches, or streamed and analyzed in real-time. For instance, a company that collects GPS location data for a car routing service may be legally obligated to delete that data after a short while. The company can insert that data into a cloaked database in daily batches, and keep the data indefinitely for later analysis, or offer analysis to third parties like city road planning. As another example, a company that monitors crowd movement in train stations through its own app may stream WIFI-triangulated location data directly into a cloaked database. In this case, the data is anonymous end to end there is virtually no individual data exposure at any point. Data may be uploaded from multiple sources and combined in the cloaked database. Data Query: Data may be queried from the cloaked relational database through the RESTful API, or via a simple and intuitive web interface. Via the web interface, the analyst may select tables, columns in tables, and ranges over the values in the columns. The analyst may select from a library of pre-configured aggregation functions such as sum, average, median, number of rows, and so on. The analyst may also write his or her own aggregation functions in the scripting language Lua. Queries may be one-time batch, periodic batch, or streaming. A one-time batch query runs once, for instance over a time range selected by the analyst. A periodic batch query runs the same query periodically over a shifting time window, for instance a daily query that runs over the last 24 hours of data. A streaming query runs every time data is uploaded into a cloaked database, producing continuous real-time output. A cloaked database only returns aggregate results: it is prohibitively difficult, and in most cases impossible, to infer anything about individual users in the database. For example, the crowd monitoring application could insert a streaming query that produces a heat-map of crowd density (number of people per area) in real time. Although the output heat map displays approximately accurate density in relatively more crowded areas, individuals cannot be tracked even in areas Aircloak
4 where for instance there is only a single person. In another example, a medical researcher inserts a one-time batch query that outputs the correlation between various treatment protocols and the result patient reactions. Where there are a statistically significant number of patients for a given correlation, the cloak produces an approximately accurate result. Where the number of patients is too small or even one, the cloak will not output a meaningful value. This protects individual patient privacy. Query Answers: Answers to queries may be received through the RESTful API, may be viewed on Aircloak s web GUI, or can be downloaded from the web GUI as a csv file for direct import into virtually any existing analytics package, including Excel, Tableau, MySQL, R, SPSS, and many others. Scalable: The cloaked database cluster is built on a sharded PostgreSQL substrate. By adding machines, the cluster can grow to accommodate virtually any sized database. The Failure of Traditional Anonymization The opinion on anonymization written by the Article 29 Data Protection Working Party of the EU discusses a number of traditional anonymization approaches, such as K-anonymity, L-diversity, and data permutation ii. One problem with these approaches is that they simply don t work for complex data, for instance health records and geo-location data. Even where they do work, these traditional approaches preclude joining data from multiple sources. As a result, the norm today is not anonymization, but rather pseudonymization. Pseudonymization involves removing personally identifying information like names, addresses, and account numbers, and replacing them with a random identifier. As the working party 29 opinion makes clear, a common error organizations make in private analytics is mistakenly believing that pseudonymization is anonymization. In spite of several past high-profile data leaks iii, organizations continue to make the same mistake iv. It is easy to see why pseudonymization doesn t work. Imagine a database of GPS location traces for millions of people, but where names have been replaced by random numbers. To uniquely identify a person in the database requires knowing only a few locations and times where that person has been v. To mitigate the risks in sharing pseudonymized data, reputable organizations today minimize their data sharing, and typically share only under strict contractual arrangements. Many opportunities for better analytics and data monetization are passed over. Aircloak
5 A New Approach to Anonymization Aircloak takes a different approach to anonymization. Based on research done at the Max Planck Institute for Software Systems in Germany, Aircloak s approach combines three unique features: Zero Password, Zero Access data protection. Advanced post query answer anonymization. Trusted third-party oversight, enforced and remotely attested by trusted secure hardware (TPM). The first feature, Zero Password, Zero Access data protection, ensures that nobody, not even system administrators or system developers, can view sensitive data residing in a cloaked database. The second feature, post query answer anonymization, ensures that queries run over the raw data do not expose individual user data. Nevertheless, Aircloak s unique answer anonymization limits answer distortion to a minimum, resulting in sufficiently accurate answers in most cases. By allowing queries to run over raw data, cloaked databases overcome the limitations of traditional anonymization. Assurance is provided by a trusted third-party, enforced and remotely attested by secure hardware TPM. Secure Hardware and Super-Hardening Hardening a computer means disabling every unnecessary function so as to minimize both the attack surface and the possibility of human error. Cloaked databases are super-hardened. The only interfaces enabled are those for uploading data, submitting queries, receiving answers, and reporting system performance. This hardening is enforced by Security Enhanced Linux (SELinux). The cloaked database has no password, because there is no system login. There are no user or system accounts, no SSH or telnet; no way to log into the system at all. This approach to hardening protects against human error such as poorly protected passwords, and as well protects against insider attacks. All data is encrypted while on disk. The crypto-disk key is protected by the sealing function of the secure hardware TPM. The secure hardware TPM doesn t use a password to encrypt and decrypt the crypto-disk key. Rather, when the TPM first encrypts the crypto-disk key, it takes a snapshot of certain cloak software and remembers it. When the TPM is asked to decrypt the crypto-disk key, it takes another snapshot of the same cloak software. If the software has changed, the TPM will refuse to decrypt the key, and no user data can be read. In essence, the software itself is the password. While in memory (RAM), data is protected by the proprietary Data Scrambling feature of the Intel CPU. Aircloak
6 Trusted Third-Party Oversight, with Teeth Aircloak uses the TPM sealing function to give trusted third parties enforceable oversight over software upgrades: the system won t boot unless the system software is cryptographically signed by the trusted third-party. The oversight function works as follows. The software included in the TPM snapshot includes the entire boot sequence as well as the software that checks the third-party signature. If the third-party signature does not match the system software, the checking software will refuse to let the system boot. If the third-party checking software is changed, the TPM will refuse to decrypt the crypto disk key. Currently Aircloak uses TÜViT as its trusted third-party. Aircloak can work with any trusted third-party or combination of trusted third-parties as required. Data sources uploading to a cloaked database can get cryptographic proof that the cloaked database has been signed off by the trusted third-party. This cryptographic proof is provided by the secure hardware TPM using a function called remote attestation. Overall, the TPM supports a cryptographically proven chain-of-trust extended all the way from a trusted third-party to the data source. Finally, the cloaked database produces a tamper-proof log of all analyst interactions (queries and answers). Any attempts by the analyst, or for that matter by Aircloak, to infer individual user data through the query interface will be logged. In certain settings, such as medical research, ethics committees can use the logs to verify appropriate behavior by analysts and Aircloak. This level of oversight is unmatched in the analytics industry. Dynamic Stateful Answer Anonymization Aircloak s patent-pending anonymization dynamically filters and distorts query answers to prevent disclosure of individual user data while still providing sufficiently accurate answers for almost all analytics tasks. The distortion is less than 1% for answers involving roughly 400 or more users. The distortion, however, is never less than roughly plus or minus five. This defeats queries that target individual users. Aircloak anonymization adds a small amount of zero-mean random noise to answers (Gaussian, standard deviation of 2). In this one regard, Aircloak s anonymization is similar to Differential Privacy, regarded by many researchers to be the gold standard in anonymization. Aircloak s anonymization, however, goes much further. Aircloak s anonymization adds a second layer of fixed noise whose value depends on the exact set of users that contributed to the answer. This prevents simple repeated answers from averaging away the first layer of random noise. Aircloak s anonymization probabilistically suppresses answers with very low user counts. This prevents an analyst from inferring individual user data based on Aircloak
7 the answer s label. For instance, a query that says If target user has the secret attribute, output an answer labeled yes, otherwise output an answer labeled no will result in no output what-so-ever. The analyst learns nothing. Aircloak s anonymization maintains a history of all previous answers reported by the cloaked database, at least until the data that produced the answer is deleted from the cloaked database. Every answer derived from some given user data is compared with every past answer derived from the same data. The comparisons take place at lightning speed, millions of comparisons per second, so query latency does not suffer. These comparisons detect combinations of answers that, taken together, could allow inference of individual user data. When such combinations are found, which rarely occur in normal usage, Aircloak s anonymization further modifies the answers to defeat the attack. In spite of the above mechanisms, there may still exist unique combinations of tens or hundreds of answers that can leak small amounts of user data that are not prevented. These combinations, however, exhibit a certain analyst fingerprint that very rarely occurs with normal analyst behavior. Cloaked databases detect these fingerprints, and block analysts from further activity until the tamper-proof logs can be examined for possible misbehavior. Example Use Cases Aircloak analytics enables data collection, storage, sharing, and monetization anywhere user privacy is important. Here we highlight just three of the many possible use cases. Smart City / Transport: Smart city technology promises to reduce cities' operating and infrastructure costs, make them more attractive for citizens and businesses, and even provide new revenue sources. With Aircloak, cities can: Improve intelligence for both real-time services (safety and law enforcement) and city planning by combining data from different sources: public transportation and taxi services, car-sharing, sociodemographic data, city web services, indoor geo-location tracking, and smart streetlights. Safely provide data to third parties for monetization or Open Data initiatives. Instantly comply with national data privacy laws and reduce citizens' concerns over a "surveillance society". Medical Research: Sharing medical data for research is a costly and risky process. Huge opportunities for improved medical research are lost because medical institutions leave data locked-up in protected silos. Aircloak enables: Safe and anonymous transmission of hospital and clinical research data to central research repositories. Aircloak
8 Improved quality of analytics by preventing the loss of data accuracy normally associated with traditional forms of anonymization. Compliance with medical research anonymization requirements, thus eliminating the need for new patient opt-ins. Monetization of Geo-location Data: Cellular operators obtain outdoor geo-location data over a wide area from cell towers. Many businesses, for instance malls or airports, collect indoor geo-location data from WIFI access points. By combining indoor and outdoor geo-location data, Aircloak can: Improve insights for businesses using indoor geo-location applications by providing information about where customers live and work, as well as their demographics. Provide better monetization opportunities for cellular operators that offer aggregate marketing data. Avoid the need for indoor geo-location user opt-in, and provide compliance for cellular operators. Aircloak Professional Services Aircloak s professional services team can support every facet of your analytics project to ensure a successful outcome. Aircloak can provide basic privacy consulting so that you can assess you need for anonymized analytics. Aircloak can work with you to understand your analytics goals and consult on how to achieve those goals using our solution: what data to collect (and not collect), what kinds of queries to run, how to interpret and display the results to obtain the insights you require. Aircloak professional services can develop any custom tools needed to move your data from existing storage to the cloaked database, develop a data plan and query plan to analyze the data, and develop any custom tools needed to import the results into your existing analytics ecosystem. Aircloak can work with your Data Privacy Officer (DPO) or any certification bodies you require to ensure that the proper approvals and oversights are in place. If you choose to deploy a cloaked database in-house, Aircloak can assist in equipment purchase, installation, and provide remote management. Finally, Aircloak professional services can provide complete training. Contact Us Contact us today, and let Aircloak show you how anonymized analytics can help you collect and retain better data, and lead the way to better insights and data monetization. Aircloak
9 i For its certification, TÜViT uses the definition of anonymization from the German Bundesdatenschutzgesetz (BDSG), 3(6) 3.html ii ARTICLE 29 DATA PROTECTION WORKING PARTY Opinion 05/2014 on Anonymisation Techniques, 29/documentation/opinion-recommendation/files/2014/wp216_en.pdf iii America Online, the state of Massachusetts, and Netflix: see section B.1 of Paul Ohm, Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, 57 UCLA L. Rev. 1701, iv v Unique in the Crowd: The Privacy Bounds of Human Mobility, We are sponsored by: Paul-Ehrlich-Str Kaiserslautern Germany [email protected] Aircloak
Aircloak Analytics: Anonymized User Data without Data Loss
Aircloak Analytics: Anonymized User Data without Data Loss An Aircloak White Paper Companies need to protect the user data they store for business analytics. Traditional data protection, however, is costly
Privacy-preserving Data-aggregation for Internet-of-things in Smart Grid
Privacy-preserving Data-aggregation for Internet-of-things in Smart Grid Aakanksha Chowdhery Postdoctoral Researcher, Microsoft Research ac@microsoftcom Collaborators: Victor Bahl, Ratul Mahajan, Frank
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know
Whitepaper Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know Phone (0) 161 914 7798 www.distology.com [email protected] detecting the unknown Integrity
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
SysAidTM Product Description
SysAidTM Product Description September 2006 IT Challenges As the ratio of computers to IT staff grows, so does the visibility of the IT department in organizations. Efficiency and responsiveness has become
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 The Big Data Working Group (BDWG) will be identifying scalable techniques for data-centric security and privacy problems. BDWG s investigation
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Meeting the Challenge of Big Data Log Management: Sumo Logic s Real-Time Forensics and Push Analytics
Meeting the Challenge of Big Data Log Management: Sumo Logic s Real-Time Forensics and Push Analytics A Sumo Logic White Paper Executive Summary The huge volume of log data generated by today s enterprises
SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF
NFX FOR MSP SOLUTION BRIEF SP Monitor Jump Start Security-as-a-Service Designed to give you everything you need to get started immediately providing security-as-a service, SP Monitor is a real-time event
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu
SAP HANA PLATFORM Top Ten Questions for Choosing In-Memory Databases. Start Here
PLATFORM Top Ten Questions for Choosing In-Memory Databases Start Here PLATFORM Top Ten Questions for Choosing In-Memory Databases. Are my applications accelerated without manual intervention and tuning?.
10 Ways to Not Get Caught Hacking On Your Mac
10 Ways to Not Get Caught Hacking On Your Mac Three18 is a Comprehensive Technology Solutions Provider Apple Certified Partner Microsoft Gold Partner Symantec Security Solutions Partner Novell and RedHat
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach
Wonderware SmartGlance
Wonderware SmartGlance Features 01 SUMMARY Mobile Reporting offered by Schneider Electric provides real-time access to critical KPIs and process or operational data via popular smart phones and tablets.
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server
Attestation and Authentication Protocols Using the TPM
Attestation and Authentication Protocols Using the TPM Ariel Segall June 21, 2011 Approved for Public Release: 11-2876. Distribution Unlimited. c 2011. All Rights Reserved. (1/28) Motivation Almost all
ONLINE EXTERNAL AND SURVEY STUDIES
ONLINE EXTERNAL AND SURVEY STUDIES Before reading this document, be sure you are already familiar with the Instructions for using the School of Psychological Sciences Participant Pool available on the
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
Chronon: A modern alternative to Log Files
Chronon: A modern alternative to Log Files A. The 5 fundamental flows of Log Files Log files, Old School, are a relic from the 1970s, however even today in 2012, IT infrastructure monitoring relies on
Colgate-Palmolive selects SAP HANA to improve the speed of business analytics with IBM and SAP
selects SAP HANA to improve the speed of business analytics with IBM and SAP Founded in 1806, is a global consumer products company which sells nearly $17 billion annually in personal care, home care,
Sisense. Product Highlights. www.sisense.com
Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze
Paper 064-2014. Robert Bonham, Gregory A. Smith, SAS Institute Inc., Cary NC
Paper 064-2014 Log entries, Events, Performance Measures, and SLAs: Understanding and Managing your SAS Deployment by Leveraging the SAS Environment Manager Data Mart ABSTRACT Robert Bonham, Gregory A.
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Using Predictive Maintenance to Approach Zero Downtime
SAP Thought Leadership Paper Predictive Maintenance Using Predictive Maintenance to Approach Zero Downtime How Predictive Analytics Makes This Possible Table of Contents 4 Optimizing Machine Maintenance
Cisco Wireless Control System (WCS)
Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,
Empower Individuals and Teams with Agile Data Visualizations in the Cloud
SAP Brief SAP BusinessObjects Business Intelligence s SAP Lumira Cloud Objectives Empower Individuals and Teams with Agile Data Visualizations in the Cloud Empower everyone to make data-driven decisions
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
FOR SERVERS 2.2: FEATURE matrix
RED hat ENTERPRISE VIRTUALIZATION FOR SERVERS 2.2: FEATURE matrix Red hat enterprise virtualization for servers Server virtualization offers tremendous benefits for enterprise IT organizations server consolidation,
LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Optimized Hadoop for Enterprise
Optimized Hadoop for Enterprise Smart Big data Platform provides Reliability, Security, and Ease of Use + Big Data, Valuable Resource for Forecasting the Future of Businesses + Offers integrated and end-to-end
White Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
Build Your Managed Services Business with ScienceLogic
White Paper Build Your Managed Services Business with ScienceLogic Sharpen Your Competitive Edge with Revenue-Driving Services 1 As a managed service provider (MSP), you realize that both the opportunities
Trusted Platforms for Homeland Security
Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Connected car, big data, big brother?
Connected car, big data, big brother? Using geolocation in a trustworthy and compliant way [email protected] Trends that threaten trust 2 Connected cars with downloadable apps Location services, cloud,
SEACW DELIVERABLE D.1.6
SEACW DELIVERABLE D.1.6 Validation Methodology Specifications Project Acronym SEACW Grant Agreement No. 325146 Project Title Deliverable Reference Number Deliverable Title Social Ecosystem for Antiaging,
Cisco Data Preparation
Data Sheet Cisco Data Preparation Unleash your business analysts to develop the insights that drive better business outcomes, sooner, from all your data. As self-service business intelligence (BI) and
Qlik Sense Enabling the New Enterprise
Technical Brief Qlik Sense Enabling the New Enterprise Generations of Business Intelligence The evolution of the BI market can be described as a series of disruptions. Each change occurred when a technology
Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions
Password Management Buyer s Guide FastPass Password Manager V 3.3 Enterprise & Service Provider Editions FastPassCorp 2010 FPC0 FastPassCorp 2010. Page 1 Requirements for Password Management including
(Big) Data Anonymization Claude Castelluccia Inria, Privatics
(Big) Data Anonymization Claude Castelluccia Inria, Privatics BIG DATA: The Risks Singling-out/ Re-Identification: ADV is able to identify the target s record in the published dataset from some know information
Case Study - I. Industry: Social Networking Website Technology : J2EE AJAX, Spring, MySQL, Weblogic, Windows Server 2008.
Case Study - I Industry: Social Networking Website Technology : J2EE AJAX, Spring, MySQL, Weblogic, Windows Server 2008 Challenges The scalability of the database servers to execute batch processes under
MEGA Web Application Architecture Overview MEGA 2009 SP4
Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.
App coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015
ericsson White paper Uen 284 23-3212 Rev B August 2015 App coverage effectively relating network performance to user experience Mobile broadband networks, smart devices and apps bring significant benefits
Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration
Websense Data Security Suite and Cyber-Ark Inter-Business Vault The Power of Integration Websense Data Security Suite Websense Data Security Suite is a leading solution to prevent information leaks; be
Big Data Primer. 1 Why Big Data? Alex Sverdlov [email protected]
Big Data Primer Alex Sverdlov [email protected] 1 Why Big Data? Data has value. This immediately leads to: more data has more value, naturally causing datasets to grow rather large, even at small companies.
Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology
20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
McAfee Web Reporter Turning volumes of data into actionable intelligence
McAfee Web Reporter Turning volumes of data into actionable intelligence Business today is more Internet-dependent than ever before. From missioncritical services to productivity tools, Internet access
An Oracle White Paper May 2012. Oracle Database Cloud Service
An Oracle White Paper May 2012 Oracle Database Cloud Service Executive Overview The Oracle Database Cloud Service provides a unique combination of the simplicity and ease of use promised by Cloud computing
The Sumo Logic Solution: Security and Compliance
The Sumo Logic Solution: Security and Compliance Introduction With the number of security threats on the rise and the sophistication of attacks evolving, the inability to analyze terabytes of logs using
DOCUMENT REFERENCE: SQ312-002-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. March 2014
DOCUMENT REFERENCE: SQ312-002-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper March 2014 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 002 EN FINAL
CyberSource Payment Security. with PCI DSS Tokenization Guidelines
CyberSource Payment Security Compliance The PCI Security Standards Council has published guidelines on tokenization, providing all merchants who store, process, or transmit cardholder data with guidance
AVLOR SERVER CLOUD RECOVERY
AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties
API Architecture. for the Data Interoperability at OSU initiative
API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models
Big Data. Fast Forward. Putting data to productive use
Big Data Putting data to productive use Fast Forward What is big data, and why should you care? Get familiar with big data terminology, technologies, and techniques. Getting started with big data to realize
Drawbacks to Traditional Approaches When Securing Cloud Environments
WHITE PAPER Drawbacks to Traditional Approaches When Securing Cloud Environments Drawbacks to Traditional Approaches When Securing Cloud Environments Exec Summary Exec Summary Securing the VMware vsphere
interactive product brochure :: Nina: The Virtual Assistant for Mobile Customer Service Apps
interactive product brochure :: Nina: The Virtual Assistant for Mobile Customer Service Apps This PDF contains embedded interactive features. Make sure to download and save the file to your computer to
SharePlex for SQL Server
SharePlex for SQL Server Improving analytics and reporting with near real-time data replication Written by Susan Wong, principal solutions architect, Dell Software Abstract Many organizations today rely
How Solace Message Routers Reduce the Cost of IT Infrastructure
How Message Routers Reduce the Cost of IT Infrastructure This paper explains how s innovative solution can significantly reduce the total cost of ownership of your messaging middleware platform and IT
DOCUMENT REFERENCE: SQ312-003-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015
DOCUMENT REFERENCE: SQ312-003-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper May 2015 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 003 EN FINAL JP
Data Monetization in the Age of Big Data 1
Harnessing the potential of Big Data seems to be on the agenda of every mobile operator and rightly so. In today s climate of convergence, in which new technologies and networks are blurring industry lines,
10 easy steps to secure your retail network
10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015
ORACLE DATABASE 10G ENTERPRISE EDITION
ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.
Your Data, Any Place, Any Time.
Your Data, Any Place, Any Time. Microsoft SQL Server 2008 provides a trusted, productive, and intelligent data platform that enables you to: Run your most demanding mission-critical applications. Reduce
Features Business Perspective. www.eset.com
Features Business Perspective www.eset.com Endpoint Protection Antivirus / Antispyware Auto-Scan of Removable Media Host-based Intrusion Prevention System (HIPS) Client Antispam Cross-platform Protection
Intelligent Business Operations and Big Data. 2014 Software AG. All rights reserved.
Intelligent Business Operations and Big Data 1 What is Big Data? Big data is a popular term used to acknowledge the exponential growth, availability and use of information in the data-rich landscape of
Databricks. A Primer
Databricks A Primer Who is Databricks? Databricks was founded by the team behind Apache Spark, the most active open source project in the big data ecosystem today. Our mission at Databricks is to dramatically
ByteMobile Insight. Subscriber-Centric Analytics for Mobile Operators
Subscriber-Centric Analytics for Mobile Operators ByteMobile Insight is a subscriber-centric analytics platform that provides mobile network operators with a comprehensive understanding of mobile data
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
Your Data, Any Place, Any Time. Microsoft SQL Server 2008 provides a trusted, productive, and intelligent data platform that enables you to:
Your Data, Any Place, Any Time. Microsoft SQL Server 2008 provides a trusted, productive, and intelligent data platform that enables you to: Run your most demanding mission-critical applications. Reduce
End Your Data Center Logging Chaos with VMware vcenter Log Insight
End Your Data Center Logging Chaos with VMware vcenter Log Insight By David Davis, vexpert WHITE PAPER Table of Contents Deploying vcenter Log Insight... 4 vcenter Log Insight Usage Model.... 5 How vcenter
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
An Oracle White Paper November 2010. Leveraging Massively Parallel Processing in an Oracle Environment for Big Data Analytics
An Oracle White Paper November 2010 Leveraging Massively Parallel Processing in an Oracle Environment for Big Data Analytics 1 Introduction New applications such as web searches, recommendation engines,
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.5 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
Overview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
The Advantages of Enterprise Historians vs. Relational Databases
GE Intelligent Platforms The Advantages of Enterprise Historians vs. Relational Databases Comparing Two Approaches for Data Collection and Optimized Process Operations The Advantages of Enterprise Historians
Lecture 7: Privacy and Security in Mobile Computing. Cristian Borcea Department of Computer Science NJIT
Lecture 7: Privacy and Security in Mobile Computing Cristian Borcea Department of Computer Science NJIT Location Privacy Location Authentication Trusted Ad Hoc Networks 2 Privacy Violated Request: Retrieve
DiamondStream Data Security Policy Summary
DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers
Agio Remote Monitoring and Management
Remote Monitoring and Management s Remote Monitoring & Management is a 24x7x365 service in which we proactively manage your infrastructure and IT environment to make sure it s in a healthy state and stays
Microsoft Big Data Solutions. Anar Taghiyev P-TSP E-mail: [email protected];
Microsoft Big Data Solutions Anar Taghiyev P-TSP E-mail: [email protected]; Why/What is Big Data and Why Microsoft? Options of storage and big data processing in Microsoft Azure. Real Impact of Big
RFG Secure FTP. Web Interface
RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken
