Big Data Security Risk in the Enterprise: The Pitfalls of Hadoop

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Big Data Security Risk in the Enterprise: The Pitfalls of Hadoop-2 Next

Hadoop was originally adopted to manage publicly available information, not enterprise data.

Like many ground-breaking technologies (for instance, TCP/IP or UNIX), Hadoop wasn’t originally built with the enterprise in mind, let alone security. Hadoop’s original purpose was to manage publicly available information like Web links, and was designed to format large amounts of unstructured data within a distributed computing environment, specifically Google’s. It was not written to support hardened security, compliance, encryption, policy enablement, and risk management.

Companies leveraging Big Data are mostly on their own when it comes to security. Best practices for companies with Hadoop clusters include implementing additional access controls and limiting the number of personnel allowed to access the Hadoop cluster.

Big Data wasn’t designed with security in mind; in fact, security has never really been the focus of distributed sciences. With these mountains of data, informing businesses on critical buyer decisions, habits, and countless other minutiae, comes a pressing need to keep this valuable information secure and protected. This is sensitive information, after all, and with so much of it comes a greater risk of breaches.

Data volumes are doubling annually, and roughly 80 percent of that captured data is unstructured, and must be formatted using a technology like Hadoop in order to be mineable for information. Considering this growth, it is clear that security concerns won’t be going away anytime soon. Quite the opposite, actually.

As Hadoop becomes more widely adopted in the enterprise, its security limitations are becoming more apparent. Brian Christian, co-founder and CTO of secure Big Data management vendor Zettaset, explains the biggest Big Data security challenges facing the enterprise today and his thoughts on creating a unified security model for Big Data.


Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

More Slideshows

IBM Watson How and Why Companies Are Incorporating the Power of IBM Watson

Watson continuously learns from previous interactions, gaining in value and knowledge over time. Learn how companies are harnessing that AI power to create and improve products and services. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.