Ten Best Practices for Securing Sensitive Data in Hadoop

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Previous Next

Click through for 10 security best practices for organizations considering or implementing Hadoop, as identified by Dataguise.

Dataguise, a leading innovator of data security intelligence and protection solutions, recently released 10 security best practices for organizations considering or implementing Hadoop. By following these procedures to manage privacy risk, data management and security, professionals can prevent costly exposure of sensitive data, reduce their risk profile and better adhere to compliance mandates. With Hadoop security deployments among the Fortune 200, Dataguise has developed these practices and procedures from significant experience in securing these large and diverse environments.

The explosion in information technology tools and capabilities has enabled advanced analytics using Big Data. However, the benefits of this new technology area are often coupled with data privacy issues. In these large information repositories, personally identifiable information (PII), such as names, addresses and social security numbers may exist. Financial data such as credit card and account numbers might also be found in large volumes across these environments and pose serious concerns related to access. Through careful planning, testing, pre-production preparation and the appropriate use of technology, much of these concerns can be alleviated.

The following 10 Hadoop security best practices provide valuable guidance throughout Hadoop project implementations, but are especially important in the early planning stages.


Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

More Slideshows

email9-190x128 How to Get Control of Your Email Inbox

Email is an integral part of working, but for far too many workers, it hurts rather than helps their productivity. ...  More >>

DataM46-190x128 Automating the Intelligence of Business Intelligence

Automated business intelligence can provide business users faster, more accurate insights into an increasingly overwhelming amount of data. ...  More >>

BreakThroughTechSoftwareUpdate0x Six Warning Signs You've Outgrown Your Software

Despite their importance, many SMBs let their tech solutions languish and turn into outdated relics that can't offer the necessary speed, collaboration and functionality for the modern user or customer. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.