Ten Best Practices for Securing Sensitive Data in Hadoop

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12
Previous Next

Click through for 10 security best practices for organizations considering or implementing Hadoop, as identified by Dataguise.

Dataguise, a leading innovator of data security intelligence and protection solutions, recently released 10 security best practices for organizations considering or implementing Hadoop. By following these procedures to manage privacy risk, data management and security, professionals can prevent costly exposure of sensitive data, reduce their risk profile and better adhere to compliance mandates. With Hadoop security deployments among the Fortune 200, Dataguise has developed these practices and procedures from significant experience in securing these large and diverse environments.

The explosion in information technology tools and capabilities has enabled advanced analytics using Big Data. However, the benefits of this new technology area are often coupled with data privacy issues. In these large information repositories, personally identifiable information (PII), such as names, addresses and social security numbers may exist. Financial data such as credit card and account numbers might also be found in large volumes across these environments and pose serious concerns related to access. Through careful planning, testing, pre-production preparation and the appropriate use of technology, much of these concerns can be alleviated.

The following 10 Hadoop security best practices provide valuable guidance throughout Hadoop project implementations, but are especially important in the early planning stages.

 

Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

 
More Slideshows

ZettasetBigDataAutomation0x Five Ways Automation Speeds Up Big Data Deployments

As enterprises move Hadoop from pilot to production environments, they are finding the "on-boarding" process slow and complicated. ...  More >>

DataM26-290x195 Overcoming Five Managed File Transfer Myths

Despite the rapid growth and adoption of the technology, several misconceptions about MFT and its benefits still exist today. Here are the five primary misconceptions regarding MFT. ...  More >>

ShapiroMarketRevolution0x Five Revolutions that Will Shape the Future of Marketing

Everyone in marketing should be aware of several horizon-level revolutions, because they are about to be felt with a force that is difficult to overstate. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date