Remove Architecture Remove Authentication Remove Big Data Remove Security
article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

On Tuesday, January 27, 2015 CTOvision publisher and Cognitio Corp co-founder Bob Gourley hosted an event for federal big data professionals. The breakfast event focused on security for big data designs and featured the highly regarded security architect Eddie Garcia.

Big Data 150
article thumbnail

Protecting BigData Inside and Out: Learn from Cloudera engineers in DC 7 May

CTOvision

The next in a series of technical talks provided by Cloudera focuses on protecting Big Data. More from their invite is below: Protecting Big Data Inside and Out. Big data is a key advantage in improving your security intelligence, from Medicare fraud to advanced persistent threats.

Big Data 239
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloudera Strengthens Hadoop Security with Acquisition of Gazzang: Builds on additional community efforts to deliver end-to-end security offering

CTOvision

In the early days of production systems built around Apache Hadoop, security was only possible by limiting access to your cluster. Later, more and more security related capabilities were added, including better access control, authentication, auditing, and data provenance. Then some very positive things started happening.

Security 272
article thumbnail

Hadoop Security: New book by Ben Spivey and Joey Echeverria Is Exactly What The Community Needs

CTOvision

Hadoop Security: Protecting Your Big Data Platform is packed with the protective strategies, tips and techniques you will want to build into your designs early in your data modernization efforts. Title: Hadoop Security. Security is typically the longest phase of any Hadoop project. Order here. Amazon.com.

Security 150
article thumbnail

Overcoming the Equation: Security = Friction

CTOvision

Why does security have to be so onerous? Is this password secure enough: Mxyzptlk? Now that’s secure – good luck remembering it! We’ve migrated to a userid-password society; as we’ve added layers of security, we password-protect each layer: PC (and now device), network, enclave, application, database, and storage (encryption).

Security 249
article thumbnail

5G-enabled manufacturing: Realizing Industry 4.0

TM Forum

A two-year project with Ford Motor Company has shown how 5G, mobile private networks, multi-access edge computing (MEC), IoT (Internet of Things), big data, cloud, artificial intelligence will deliver Industry 4.0 Security by design. Securing the MPN was a key feature of this. and the factory of the future.

Industry 130
article thumbnail

Technology News and Hot Topics

CTOvision

Enterprise security company, Palo Alto Networks has announced the latest release of its virtual firewall series (VM-Series). Big Data Product Watch 10/17/14: Big Three Make Big Moves. Big Data Product Watch 10/17/14: Big Three Make Big Moves. and Hortonworks Inc.

Dell 258