The Top Big Data Security Considerations

 

As organizations gather and manage more and more big data, here are 10 best practices to protect all of that information from hackers and cyber breaches.

Apache Hadoop, the grid technology, is increasingly popular for storing massive amounts of data. By default, Hadoop runs in non-secure mode. When service-level authentication is turned on, Hadoop end-users must be authenticated by Kerberos – the popular computer network authentication protocol.

The major Hadoop distribution providers – including Cloudera, Hortonworks and MapR – also offer various Security solutions that support authentication, authorization, encryption and more.

Yes indeed, relational databases and SQL-oriented solutions still manage the majority of enterprise data, according to a recent survey from Dell and Unisphere. To safeguard a relational database, make sure you focus on five areas of breach prevention (authentication and authorization; database firewall; encryption; data redaction and masking; and patch management), according to Layer Seven Security. Also, make sure your organization understands four areas of breach detection (data discovery and classification; privilege analysis; configuration management; and logging and auditing), Layer Seven Security adds.

In-memory databases store data entirely in main memory, which can be an ideal approach for data-intensive applications like analytics, social networking and e-commerce systems.

Generally speaking, in-memory databases have built-in security features but the bigger concerns involve IT architecture. For instance, a Payment Card Industry Data Security Standard (PCI DSS) best practice calls for application and database services to run on separate servers located in independent network zones, notes Layer Seven Security. However, some in-memory databases have built-in application and web servers – allowing each piece of software to share hardware resources.

Share it:
Share it:

[Social9_Share class=”s9-widget-wrapper”]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

You Might Be Interested In

Thingsee Internet of things platform

24 Jun, 2015

  The next big battle for tech giants is in the realm of the Internet of things, which is an …

Read more

The Future of Analytics Is Prescriptive, Not Predictive

13 Jul, 2015

  Though predictive analytics and data mining are particularly hot topics at the moment, they’ve been widely used in marketing …

Read more

Karens Rules for Being Lazy from InfoAdvisors’ Blog

3 Jun, 2015

In this presentation Karen discusses tips for automating more of the mindless tasks in data modeling (printing, publishing, complex by …

Read more

Recent Jobs

IT Engineer

Washington D.C., DC, USA

1 May, 2024

Read More

Data Engineer

Washington D.C., DC, USA

1 May, 2024

Read More

Applications Developer

Washington D.C., DC, USA

1 May, 2024

Read More

D365 Business Analyst

South Bend, IN, USA

22 Apr, 2024

Read More

Do You Want to Share Your Story?

Bring your insights on Data, Visualization, Innovation or Business Agility to our community. Let them learn from your experience.

Get the 3 STEPS

To Drive Analytics Adoption
And manage change

3-steps-to-drive-analytics-adoption

Get Access to Event Discounts

Switch your 7wData account from Subscriber to Event Discount Member by clicking the button below and get access to event discounts. Learn & Grow together with us in a more profitable way!

Get Access to Event Discounts

Create a 7wData account and get access to event discounts. Learn & Grow together with us in a more profitable way!

Don't miss Out!

Stay in touch and receive in depth articles, guides, news & commentary of all things data.