simplify big data security & management with vormetric
DESCRIPTION
Download the whitepaper on big data security from Vormetric, which outlines what IT & security professionals need to know about the significant big data security, risks & management. www.vormetric.com/bigdata82 With organizations across nearly every vertical market investing in big data technologies, the challenge is to reap the benefits of big data without compromising data security or violating privacy and regulatory compliance requirements. Understand why perimeter security is not enough and that all data sources in big data architecture are at risk. Engage with our CDH4 certified Data security solutions to secure big data. For more information, join: http://www.facebook.com/VormetricInc Follow: https://twitter.com/Vormetric Stay tuned to: http://www.youtube.com/user/VormetricIncTRANSCRIPT
![Page 1: Simplify Big Data Security & Management with Vormetric](https://reader034.vdocuments.us/reader034/viewer/2022051411/5478a0f6b4af9fbe158b45a3/html5/thumbnails/1.jpg)
Securing Big Data is a business imperative.
PROTECT BIG DATAPROTECT BIG DATA
www.vormetric.com/bigdata82
![Page 2: Simplify Big Data Security & Management with Vormetric](https://reader034.vdocuments.us/reader034/viewer/2022051411/5478a0f6b4af9fbe158b45a3/html5/thumbnails/2.jpg)
Perimeter Security is Failing
Source: mandiant.com/threat-landscape/
100% 63%
100%
of victims have up-to-date antivirus software
of breaches are reported by third parties
median number of days advanced attackers are on the network before being detected
of breaches involved stolen credentials
243
![Page 3: Simplify Big Data Security & Management with Vormetric](https://reader034.vdocuments.us/reader034/viewer/2022051411/5478a0f6b4af9fbe158b45a3/html5/thumbnails/3.jpg)
Big Data is NOW a Reality
65%Of Companies deployed/expect to deploy
BIG DATA PROJECTS
Source: CIO Magazine “2012 Big Data Survey”
![Page 4: Simplify Big Data Security & Management with Vormetric](https://reader034.vdocuments.us/reader034/viewer/2022051411/5478a0f6b4af9fbe158b45a3/html5/thumbnails/4.jpg)
Do Organizations Understand the Risks?
Organizations have pushed vast amounts of data into these big data clusters, but most have implemented virtually zero security measures.
!
““Securing Big Data: Security Recommendations
for Hadoop and NoSQL Environments.” Securosis - October, 2012
“
![Page 5: Simplify Big Data Security & Management with Vormetric](https://reader034.vdocuments.us/reader034/viewer/2022051411/5478a0f6b4af9fbe158b45a3/html5/thumbnails/5.jpg)
All Data Sources are at Risk inBig Data Architectures
![Page 6: Simplify Big Data Security & Management with Vormetric](https://reader034.vdocuments.us/reader034/viewer/2022051411/5478a0f6b4af9fbe158b45a3/html5/thumbnails/6.jpg)
View big data as an
extension of the enterprise
Four Steps to Consider whenImplementing A Big Data Project
Minimize points of
integration
Choose and implement a
primary platform
Evaluateservice
providers carefully
Incorporate security plan in the Beginning of Big Data planning stage
![Page 7: Simplify Big Data Security & Management with Vormetric](https://reader034.vdocuments.us/reader034/viewer/2022051411/5478a0f6b4af9fbe158b45a3/html5/thumbnails/7.jpg)
Vormetric Data-Centric Security Elements
DataFirewall
AccessPolicies
Encryption and Key
Management
SecurityIntelligence
Automation
Performance Impact can be minimal for Big Data Security Project
![Page 8: Simplify Big Data Security & Management with Vormetric](https://reader034.vdocuments.us/reader034/viewer/2022051411/5478a0f6b4af9fbe158b45a3/html5/thumbnails/8.jpg)
Vormetric Data Security Certified on CDH4
Cloudera’s Distribution Including Apache Hadoop Version 4 i
““The completion of Vormetric Data Security’s certification on CDH4 further solidifies Vormetric as a leading company in today’s growing big data and open-source space.
Tim StevensVP, Corporate and Business Development,
![Page 9: Simplify Big Data Security & Management with Vormetric](https://reader034.vdocuments.us/reader034/viewer/2022051411/5478a0f6b4af9fbe158b45a3/html5/thumbnails/9.jpg)
Data-Centric Security Is An IssueBig Data, Global Compliance, Cloud Adoption, Data Breaches
CLOUD ADOPTIONEnterprise Security #1 Inhibitor1
APTs DATA BREACHES98% Stolen RecordsFrom Large Orgs2
1. Global State of Information Security® Survey by PwC, CIO magazine, and CSO magazine – October 2012
2. Verizon Data Breach Investigation Report – March 2012
BIG DATABig Data is a Big Target
GLOBALCOMPLIANCEAggressive NewRegulations
![Page 10: Simplify Big Data Security & Management with Vormetric](https://reader034.vdocuments.us/reader034/viewer/2022051411/5478a0f6b4af9fbe158b45a3/html5/thumbnails/10.jpg)
PROTECT BIG DATAPROTECT BIG DATA
Securing Big Data is a business imperative.
www.vormetric.com/bigdata82