Big Data Encryption for Privacy and Compliance



Similar documents
Security and Compliance in Big Data

Security Considerations

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Compliance & Data Protection in the Big Data Age - MongoDB Security Architecture

Enterprise Architecture Review Checklist

Cloud Security and Managing Use Risks

The increasing popularity of mobile devices is rapidly changing how and where we

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.

Complying with PCI Data Security

FAMILY BROCHURE Sensitive data is everywhere. So are we.

Compliance for the Road Ahead

Assignment # 1 (Cloud Computing Security)

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Using Cloud Services for Test Environments A case study of the use of Amazon EC2

White Paper. BD Assurity Linc Software Security. Overview

Encrypting Data at Rest

Certified Cloud Computing Professional VS-1067

Encryption and Anonymization in Hadoop

Alliance Key Manager Cloud HSM Frequently Asked Questions

Securing Data in the Cloud

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Application Security Best Practices. Matt Tavis Principal Solutions Architect

Clever Security Overview

Complying with Payment Card Industry (PCI-DSS) Requirements with DataStax and Vormetric

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Security Policy. Security Policy.

Oracle White Paper October Oracle Advanced Security with Oracle Database 11g Release 2

Business and enterprise cloud sync, backup and sharing solutions

How To Achieve Pca Compliance With Redhat Enterprise Linux

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

Securing Data at Rest with Encryption

CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY

THE BLUENOSE SECURITY FRAMEWORK

Cloud Data Security. Sol Cates

Data Security in Hadoop

Securing Data at Rest ViSolve IT Security Team

VAULT MODERN SECRETS MANAGEMENT

Securing Big Data at Rest with Encryption for Hadoop, Cassandra and MongoDB on Red Hat.

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

How do I secure and manage an out-of-band connection to network devices?

API-Security Gateway Dirk Krafzig

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

Anypoint Platform Cloud Security and Compliance. Whitepaper

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

How To Protect Your Data From Harm With Safenet

Navigating Endpoint Encryption Technologies

NoSQL Database Systems and their Security Challenges

How to Hadoop Without the Worry: Protecting Big Data at Scale

Top 9 Reasons. Why choose ISL Online as the enterprise remote support and remote access service?

SafeNet Authentication Service Security Considerations

Data Security as a Business Enabler Not a Ball & Chain. Big Data Everywhere May 12, 2015

Famly ApS: Overview of Security Processes

Crypho Security Whitepaper

RSA Digital Certificate Solution

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Secure SSL, Fast SSL

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

DiamondStream Data Security Policy Summary

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Alliance Key Manager A Solution Brief for Technical Implementers

Research Information Security Guideline

RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

Alliance AES Encryption for IBM i Solution Brief

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

Top 7 Tips for Better Business Continuity

Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security

Blue Jeans Network Security Features

The AskCody experience is safe with Microsoft Azure

White Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC.

ONLINE FILE SHARING: WHO S IN CONTROL? Dave Ewart Sr. Director of Product Marketing

The Role of Identity Enabled Web Services in Cloud Computing

PATCH MANAGER what does it do?

Cloud Security Who do you trust?

Implementing Multi-factor Authentication for Clinical Applications

SharePlus Enterprise: Security White Paper

Alliance Key Manager Solution Brief

Transcription:

Big Data Encryption for Privacy and Compliance LinuxCon Sam Heywood, VP Products and Marketing September 10, 2013

Seen the news lately? 2

What do we know about Big Data? No agreed-upon definition 3

What do we know about Big Data? No agreed-upon definition Is it about the technology? Courstesy Sqrrl Data, Inc. 4

What do we know about Big Data? No agreed-upon definition Is it about the size of the data? 5

What do we know about Big Data? No agreed-upon definition Is it about what we do with the data? 6

What do we know about Big Data? The market is enormous and growing Source: Wikibon 2012 7

What do we know about Big Data? The market is enormous Everyone is getting in on the act 8

What do we know about Big Data? NoSQL often means No Security Hadoop, Cassandra, MongoDB, etc were not developed with security in mind 9

What do we know about Big Data? NoSQL often means No Security Many projects are being deployed in the cloud, adding another layer of security complexity 10

What do we know about Big Data? NoSQL often means No Security Bad news if you re working with sensitive, confidential or regulated data PII HIPPA FERPA SOX PCI-DSS EU Data Protection Customer/Personal Data Protected Health Information Student Data Financial Data Account Information Customer/Personal Data 11

What s being done to protect Big Data? Open Source projects are patching holes Sentry Project Rhino Accumulo Knox 12

What s being done to protect Big Data? Platform vendors are adding security Authentication Identity Management SSL encryption Some audit features 13

What can YOU do to protect Big Data? 1. Encrypt Everything Everywhere 2. Set and Enforce Access Controls 3. Manage Digital Security-Related Artifacts 4. Establish Data Security for Hybrid Environments 14

What can YOU do to protect Big Data? 1. Encrypt Everything Everywhere Encrypt data at-rest and on the wire to protect sensitive data and ensure compliance 15

What can YOU do to protect Big Data? 2. Set and Enforce Access Controls Protect the keys at the user, role and process levels Copyright: Paramount Pictures, 1996 16

What can YOU do to protect Big Data? 3. Manage Digital Security-Related Artifacts Secure keys, certificates, tokens, passwords in a virtual safe-deposit box 17

What can YOU do to protect Big Data? 4. Establish Data Security for Hybrid Environments NoSQL data security should be equally effective in public, private and hybrid environments Copyright: Lucasfilm, ltd 18

About Gazzang Headquartered in Austin, Texas Focus on high-performance data-at-rest encryption and key management Specialize in securing cloud and Big Data environments Key vertical industries: financial services, healthcare, retail, government, education, technology Packaged solutions available for all major Big Data distributions

Gazzang Encryption Gazzang zncrypt sits between the file system and any database, application or service running on Linux to encrypt data before it s written to the disk. AES-256 encryption Process-based ACLs File and block encryption Maximum performance Enterprise scalability Packaged support for Hadoop, Cassandra, MongoDB and other big data platforms Keys protected by 256-bit passphrase/ 16-bit Salt and RSA Keys, certificates, fingerprints, one-time secrets 20

Gazzang Key Management Gazzang ztrustee is a virtual safe-deposit box for managing zncrypt keys or any other digital artifact that must be secure and policy controlled Software-based solution separates keys from encrypted data Centralized management of SSL certificates, SSH keys, tokens, passwords and more Unique trustee and machinebased policies deliver multifactor authentication Integration with HSMs from Thales, RSA and SafeNet Multiple deployment options include on-prem, VPC or hosted SaaS offering API Library Java Python C library Time Trustee to live votes Number Time to of live retrievals URL Retrieval limits Trustee approval Single-use URL Client Much Client more permissions Trustees must approve release of objects in accordance with the deposit policy 21

Questions? Thank You sam.heywood@gazzang.com September 10, 2013