by Joerg Fritsch | April 17, 2015 | Comments Off on What’s new in Hadoop Security?
2014 was a big year for Hadoop security. After a number of acquisitions, some exciting TIT FOR TAT strategies between vendors and the entry of established DAP ( = Database Audit and Protection) vendors into the Hadoop security market, clients have now a number of good choices as to how they want to secure their big data in Hadoop for production.
- Controls applied when the data is captured.
- Controls applied when data is preserved.
- Controls applied when data is analyzed.
- Auditing, monitoring and assessment functions.
For structured data in Hadoop, security architects have regained the controls that they have been used to in RDBMS. For unstructured data, clients must resort to basic platform security and hope for the best. The 2015 version of my research note “Protecting Big Data in Hadoop” assess and introduces the available controls and maturity levels to security and risk management professionals who need to secure big data in Hadoop.
Though the controls that are meanwhile available are plenty, the market still disagrees on the best way to control the many ways of data in Hadoop,–either North/South or East/West between the transforms and components. Some push central security services, others push data encryption (or an other transform) that would implicitly govern data access on all its ways.
I believe that my new report gives a very good overview and gives the necessary guidance to finally from the new paradigms in their production environments.
Read Complimentary Relevant Research
100 Data and Analytics Predictions Through 2021
Over the next few years, data and analytics programs will become even more mission-critical throughout the business and across industries....
View Relevant Webinars
Digital Business Architecture: From Strategy to Guiding Execution
New techniques have emerged to help CIOs and EA practitioners leverage business architecture to guide investment and execution decisions,...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.