Securing Big Data: Security recommendations for Hadoop and NoSQL environments

Simplifying data security and key management
Simplifying data security and key management

Securing Big Data: Security recommendations for Hadoop and NoSQL environments

Date: Nov. 13
Time: 2:00 p.m. ET / 11:00 a.m. PT

Click here to register for free

This webcast examines security for “Big Data” environments, reviewing built-in protections and weaknesses of these systems. Our goal is to educate Big Data users on security problems they face with pragmatic advice on how to secure these environments.

During this webcasts there are two key assumptions made:

• First, Big Data projects are common — almost the norm — within the enterprise. Corporations and government have embraced the technology and pushed vast amounts of data into these clusters.

• Second, most enterprises have implemented little or no security beyond user passwords.

Our examination of different Big Data implementations shows that security features are sparse and aftermarket offerings are not fully tailored to these clusters. The good news is that several critical security concerns can be addressed by a handful of security measures.

Come listen and learn how a reasonable amount of effort can make it considerably more difficult to subvert systems or steal information.

Featured speakers:
Adrian Lane, analyst and CTO, Securosis
Todd Thiemann, senior director of product marketing, Vormetric

Sponsored by:

Sign up to our newsletters

More in Vendor Webcasts

Why NAC? Why now?

Why are so many enterprises rushing to implement network access control (NAC) now? Watch this webcast to learn about the many uses of NAC.

Security Based on Trust, Not Fear

Security Based on Trust, Not Fear

Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, ...

Unknown Targeted Attacks - Stopping malware at the endpoint

Unknown Targeted Attacks - Stopping malware at the ...

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen. Organizations must ask ...