Big Data Security Risk in the Enterprise: The Pitfalls of Hadoop

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Big Data Security Risk in the Enterprise: The Pitfalls of Hadoop-2 Next

Hadoop was originally adopted to manage publicly available information, not enterprise data.

Like many ground-breaking technologies (for instance, TCP/IP or UNIX), Hadoop wasn’t originally built with the enterprise in mind, let alone security. Hadoop’s original purpose was to manage publicly available information like Web links, and was designed to format large amounts of unstructured data within a distributed computing environment, specifically Google’s. It was not written to support hardened security, compliance, encryption, policy enablement, and risk management.

Companies leveraging Big Data are mostly on their own when it comes to security. Best practices for companies with Hadoop clusters include implementing additional access controls and limiting the number of personnel allowed to access the Hadoop cluster.

Big Data wasn’t designed with security in mind; in fact, security has never really been the focus of distributed sciences. With these mountains of data, informing businesses on critical buyer decisions, habits, and countless other minutiae, comes a pressing need to keep this valuable information secure and protected. This is sensitive information, after all, and with so much of it comes a greater risk of breaches.

Data volumes are doubling annually, and roughly 80 percent of that captured data is unstructured, and must be formatted using a technology like Hadoop in order to be mineable for information. Considering this growth, it is clear that security concerns won’t be going away anytime soon. Quite the opposite, actually.

As Hadoop becomes more widely adopted in the enterprise, its security limitations are becoming more apparent. Brian Christian, co-founder and CTO of secure Big Data management vendor Zettaset, explains the biggest Big Data security challenges facing the enterprise today and his thoughts on creating a unified security model for Big Data.


Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

More Slideshows

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

ArriaNLG-IoTAutomation0x Internet of Things Personified: Integration and Automation

The real value that the Internet of Things brings is at the intersection of gathering data and leveraging it. ...  More >>

SAPSocialCollabSuccess0x 6 Strategies for Being Successful with Social Collaboration

Enterprise social collaboration solutions are most successful when they contribute to business value and benefits that address company goals. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.