Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
MOUNTAIN VIEW, CA -- (Marketwired) -- 08/14/14 -- Zettaset, the leader in Big Data security, today announced Fast-PATH, an advanced software configuration management solution that automates and accelerates Hadoop deployment, significantly reducing the over-reliance on costly and time-consuming professional services that burdens today's Big Data environment.
Hadoop is rapidly evolving, but has not yet reached the level of maturity and sophistication that traditional relational databases offer. As a result, users expecting lower operational costs by using Hadoop software and infrastructure are surprised to find they must spend enormous sums for software support and maintenance in the form of recurring "subscription" fees.
Zettaset Fast-PATH streamlines Hadoop deployment for the enterprise with software automation that eliminates many manual configuration processes, thereby reducing ongoing support requirements. Fast-PATH automates multiple Hadoop functions, including provisioning, installation, configuration, and testing of the software. As a result, cluster deployment can be achieved more rapidly, with much less IT intervention and associated cost.
In recent benchmark testing, Zettaset Fast-PATH was able to fully install a 50-node Hadoop cluster in 140 minutes (2 hours and 20 minutes). The benchmark time included installation of the Hadoop distribution, as well as installation of Kerberos, HBase, Hive, Encryption, Key Management, and Zettaset's patented High-Availability framework on all nodes.
"Hadoop and other Big Data technologies are complex and challenging to set up, sometimes generating large costs for support and maintenance. This is not a scalable model for customers who want to efficiently move Hadoop into production networks," said CEO Jim Vogt of Zettaset. "Fast-PATH provides Hadoop users with a powerful solution that accelerates time to deployment and simplifies ongoing management, without putting an unnecessary drain on limited IT resources. We believe this innovation will spur wider adoption of Hadoop and Big Data technology in medium-sized enterprises, as well as in IT organizations that are more highly resourced."
"Because Hadoop is not a monolithic platform, deploying and securing it has not been a straightforward process," said Tony Baer, Principal Analyst for Ovum. "Our clients have long been asking for single, unified install capabilities that leverage wizard-based automation to take the bottlenecks and guesswork out of securing Hadoop."
Zettaset Fast-PATH Facts:
Additional Zettaset Orchestrator features and benefits include:
For more information on Zettaset Orchestrator and the new Fast-PATH installer, please visit www.zettaset.com
About Zettaset, Inc.
Zettaset, the leader in Big Data security, is an ISV that automates, accelerates, and simplifies Hadoop cluster deployment for the enterprise. Zettaset Orchestrator is the only Big Data management platform designed to address enterprise requirements for comprehensive security, high-availability, manageability and scalability in a distributed computing environment. Orchestrator provides multi-service fail-over for all critical cluster services, facilitates integration with the most widely adopted ETL and analytics applications, and is a fully-compatible with leading Hadoop distributions. Orchestrator helps organizations move Hadoop more efficiently from pilot into production, augmenting open source management with a more robust approach that easily fits into existing enterprise security and policy frameworks.
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs