Security for Big Data Designs: Examining best practices with security architect Eddie Garcia
CTOvision
FEBRUARY 18, 2015
Authentication is addressed for the perimeter security requirements. Active Directory and Kerberos are the authentication staples within the enterprise, allowing all users to be authenticated. This was also a topic at the February Strata + Hadoop World in San Jose (see his keynote on Data: Open for Good and Secure by Default ).
Let's personalize your content