Gartner Blog Network


Speaking at the Gartner Catalyst Conference EMEA 2014

by Joerg Fritsch  |  March 25, 2014  |  6 Comments

For those attending the EMEA edition of the Gartner Catalyst Conference (June 17 – 18, 2014 in London), here is what I will be presenting on:

  1. How to use IaaS encryption to enable cloud adoption for high risk services
  2. Private cloud security, the deja vus, the surprises and the pitfalls
  3. With Big Data comes great responsibility, –securing Hadoops

The sessions in detail:

How to use IaaS encryption to enable cloud adoption for high risk services

The promise of IaaS data at rest encryption is to make sure that no one else but your organization can benefit from the organization’s intellectual property. To get as close to this promise as feasible, you need to make a candid trade-off between confidentiality, resilience and trust.

Key issues:
  • What possibilities to encrypt data on IaaS offerings exist and how do they differ?
  • Whose eyes can prey on my data?
  • What confidentiality and compliance goals can be achieved?

This presentation is based on my paper with the same name “How to use IaaS encryption to enable cloud adoption for high risk services” (soon to be published).

Private cloud security, the deja vus, the surprises and the pitfalls

In private clouds, new security requirements stem from the cloud paradigm that makes fork-lifting security from the physical world into the virtual world insufficient. The deployed security measures need to match the new paradigm that involves for example elasticity, portability, self-service and API Keys.

Key issues:
  • How must we think about private cloud security?
  • How do we best address segregation and security zoning?
  • How can we make security ready for elasticity?

With Big Data comes great responsibility, –securing Hadoop

Although Hadoop was initially not created with any notion of (data) security in mind, security features were recently grafted in to re-assure firms and open it up for a bigger market. This session analyzes the security features offered by the Hadoop software packages and third party products in the contexts of the surrounding computing paradigms, applications and data analytic layers.

Key Issues:
  • How must we think about Hadoop Security?
  • What are the main components that can be used to secure Hadoop at infrastructure level and at data level?
  • For better or worse: Is YARN (Hadoop 2.0) a security “game changer”?

This presentation is based on my paper about Hadoop Security, to be published mid 2014.

Category: 

Joerg Fritsch
Research Director
1 year at Gartner
15 years IT Industry

Joerg Fritsch is a Research Director in the Gartner for Technical Professionals Security and Risk Management Strategies team. His specialties include information security, data center and cloud security, big data (analytics), cloud computing, PaaS, distributed systems, messaging and event-driven systems, and very fast networks and servers. Read Full Bio


Thoughts on Speaking at the Gartner Catalyst Conference EMEA 2014


  1. […] see this blog post from Joerg Fritsch from our team who IS speaking at the […]

  2. […] see this blog post from Joerg Fritsch from our team who IS speaking at the […]

  3. […] see this blog post from Joerg Fritsch from our team who IS speaking at the […]

  4. […] see this blog post from Joerg Fritsch from our team who IS speaking at the […]



Comments are closed

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.