article thumbnail

For Government Cyber Security Leaders and Big Data Designers: 27 Jan Breakfast To Share Design Patterns

CTOvision

Join Eddie and Bob Gourley of CTOvision on 27 Jan 2015 in an interactive discussion on best practices in security for big data deployments that will cover: Authentication. Ways to leverage Intel hardware for enhanced security performance. Lessons learned from commercial and government deployments.

Big Data 269
article thumbnail

Join World Renowned Big Data Cyber Security Architect Eddie Garcia at 27 Jan Breakfast

CTOvision

Join Eddie and CTOvision''s Bob Gourley in an interactive discussion on best practices in security for big data deployments that will cover: Authentication. Ways to leverage Intel hardware for enhanced security performance. Analysis Big Data CTO Cyber Security DoD and IC News Apache Hadoop Cloudera Data security Eddie Garcia'

Big Data 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Big Data Cyber Security Architect Eddie Garcia Discusses Best Practices at 27 Jan Breakfast in DC

CTOvision

Join Eddie and CTOvision''s Bob Gourley in an interactive discussion on best practices in security for big data deployments that will cover: Authentication. Ways to leverage Intel hardware for enhanced security performance. He was also the chief architect of the Gazzang zNcrypt product and is author of two patents for data security.

Big Data 150
article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

Working for the office of the CTO, Eddie also provides security thought leadership and vision to the Cloudera product roadmap. Authentication is addressed for the perimeter security requirements. Active Directory and Kerberos are the authentication staples within the enterprise, allowing all users to be authenticated.

Big Data 150
article thumbnail

Cloudera Strengthens Hadoop Security with Acquisition of Gazzang: Builds on additional community efforts to deliver end-to-end security offering

CTOvision

Later, more and more security related capabilities were added, including better access control, authentication, auditing, and data provenance. The news below is the product of many of these factors plus the vision and leadership of very smart people at Gazzang, Intel and Cloudera. Then some very positive things started happening.

Security 272
article thumbnail

Technology News and Hot Topics

CTOvision

Cloudera CTO on Big Data analytics and security risks. We feel Cloudera has a very strong security story with our authentication, access management and encryption tools, and we couple that with a very tight system on the auditing side, for security is only as good as the auditing.

Dell 258
article thumbnail

Defense in Depth: Protecting the Organization’s Data

CTOvision

Smartkeys are automatically generated, shared, and synchronized between authenticated devices without changing or interrupting user workflows. Takes advantage of IBM and Intel hardware encryption accelerators. Smartcrypt also allows users to encrypt data for external parties such as vendors or partners. High Performance. Existing PKI.

Data 150