Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
MOUNTAIN VIEW, CA -- (Marketwired) -- 03/25/14 -- Zettaset, the leader in secure Big Data management, today announced the addition of data-in-motion encryption as a new feature in its innovative Zettaset Orchestrator management and security add-on application for Hadoop. Data-in-motion encryption provides organizations with an additional layer of protection for their Hadoop clusters and sensitive data, eliminating access by unauthorized users.
Orchestrator data-in-motion encryption ensures that all networking connections to the Orchestrator web-based console are completely secure within a Secure Socket Layer (SSL) tunnel. Communication links between all cluster nodes are encrypted and authenticated to eliminate the possibility of unauthorized access to data by anyone within the corporate network or Hadoop cluster. Connections from the Orchestrator Business Intelligence (BI) Connector, an API that connects Hadoop clusters with analytics applications, are also protected.
"Risks associated with Hadoop projects include security and privacy challenges," wrote Gartner Research Director & Analyst, Bhavish Sood et. al. "Hadoop certainly wasn't built with enterprise IT environments in mind because there is a shortage of robust security controls in Hadoop."(1)
Orchestrator data-in-motion encryption comes on the heels of Zettaset's data-at-rest encryption, and similarly, is designed to have virtually no negative impact on node and cluster performance. Node performance with encryption is especially critical as more enterprise customers scale up their Hadoop clusters and move from pilot to production.
"Orchestrator data-in-motion encryption for Hadoop represents the next phase of Zettaset's Big Data encryption technology initiative, which began with the release of data-at-rest encryption in late 2013," said Jim Vogt, CEO of Zettaset. "Unlike other Hadoop encryption approaches which are bolt-on point products, Zettaset has integrated encryption into a complete security solution for Hadoop that provides an enterprise-wide framework for identity and access management, as well as security policy enforcement."
Orchestrator's management console automates virtually all manual configuration processes within Hadoop, eliminating the need for professional services and reducing IT resource requirements in the enterprise.
The Orchestrator security and management application is not a Hadoop distribution, but is distribution-agnostic and fully compatible with branded Hadoop distributions from Cloudera and Hortonworks. Orchestrator can replace existing branded Hadoop management products with a more automated and robust Hadoop management platform, which is optimized to deliver superior security and high availability for enterprise customers. Data-in-motion encryption is part of Orchestrator's comprehensive, fully-integrated security solution. Zettaset Orchestrator features and benefits include:
Data-in-motion encryption for Hadoop will be bundled with every Orchestrator application license, and is scheduled for availability in early Q2, 2014.
For more information, please visit here.
(1) Gartner - Technology Overview: Hadoop Maturity and Adoption Trends in Asia/Pacific, 22 October 2013, Bhavish Sood, Arun Chandrasekaran
About Zettaset, Inc.
Zettaset, the leader in secure Big Data management, automates, accelerates, and simplifies Hadoop cluster deployment for the enterprise. Zettaset Orchestrator is the only Big Data management solution designed to address enterprise requirements for comprehensive security, high availability, manageability and scalability in a distributed computing environment. Orchestrator helps organizations move Hadoop more efficiently from pilot into production, replacing open source management with a more robust approach that easily fits into existing enterprise security and policy frameworks. Zettaset Orchestrator provides multi-service fail-over for all critical cluster services, facilitates integration with the most widely adopted ETL and analytics applications, and is compatible with the leading Hadoop distributions.
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs