Ten Best Practices for Securing Sensitive Data in Hadoop

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12
Previous Next

Click through for 10 security best practices for organizations considering or implementing Hadoop, as identified by Dataguise.

Dataguise, a leading innovator of data security intelligence and protection solutions, recently released 10 security best practices for organizations considering or implementing Hadoop. By following these procedures to manage privacy risk, data management and security, professionals can prevent costly exposure of sensitive data, reduce their risk profile and better adhere to compliance mandates. With Hadoop security deployments among the Fortune 200, Dataguise has developed these practices and procedures from significant experience in securing these large and diverse environments.

The explosion in information technology tools and capabilities has enabled advanced analytics using Big Data. However, the benefits of this new technology area are often coupled with data privacy issues. In these large information repositories, personally identifiable information (PII), such as names, addresses and social security numbers may exist. Financial data such as credit card and account numbers might also be found in large volumes across these environments and pose serious concerns related to access. Through careful planning, testing, pre-production preparation and the appropriate use of technology, much of these concerns can be alleviated.

The following 10 Hadoop security best practices provide valuable guidance throughout Hadoop project implementations, but are especially important in the early planning stages.

 

Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

 
More Slideshows

email6-190x128 Six Tools to Help You Gain Control of Your Inbox

We spend hours every day sorting through incoming messages in an attempt to keep on top of projects, but have to deal with tons of spam, scams and less than productive trash. ...  More >>

DataM31-190x128 Five Ways Dirty Data Is Killing Marketing Performance

As marketing becomes increasingly data driven, it’s time for marketers to make data quality a top priority. ...  More >>

UnitrendsDogAteHomework0x A Presidential History of the 'Dog Ate My Email' Excuse

Ever since email first entered the White House, presidential administrations have used the "I lost my email" excuse to evade all sorts of controversies. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date