Ten Best Practices for Securing Sensitive Data in Hadoop

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Previous Next

Click through for 10 security best practices for organizations considering or implementing Hadoop, as identified by Dataguise.

Dataguise, a leading innovator of data security intelligence and protection solutions, recently released 10 security best practices for organizations considering or implementing Hadoop. By following these procedures to manage privacy risk, data management and security, professionals can prevent costly exposure of sensitive data, reduce their risk profile and better adhere to compliance mandates. With Hadoop security deployments among the Fortune 200, Dataguise has developed these practices and procedures from significant experience in securing these large and diverse environments.

The explosion in information technology tools and capabilities has enabled advanced analytics using Big Data. However, the benefits of this new technology area are often coupled with data privacy issues. In these large information repositories, personally identifiable information (PII), such as names, addresses and social security numbers may exist. Financial data such as credit card and account numbers might also be found in large volumes across these environments and pose serious concerns related to access. Through careful planning, testing, pre-production preparation and the appropriate use of technology, much of these concerns can be alleviated.

The following 10 Hadoop security best practices provide valuable guidance throughout Hadoop project implementations, but are especially important in the early planning stages.

 

Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

 
More Slideshows

IPEVOEdTools0x Five Affordable Classroom Technology Tools

Digital learning is more than just providing students with a tablet or laptop. This new teaching technique requires a combination of technology, digital content and instruction to be successful. ...  More >>

IT_Man46-190x128 Six Mistakes that Lead to Poor Enterprise Software Adoption

Enterprise software development is a massive undertaking. Yet, surveys show that more than half of businesses are flat-out terrible at getting users to adopt new software. ...  More >>

MessageSystemsEmail0x Five Reasons Email Remains Dominant

We live in an app-driven world. So it may be a surprise to some that the common denominator allowing people to download, use, purchase and move between apps is not some hot new technology. It is email. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date