Logo

Overview

Title: Survive Hadoop Go-Live: Achieving Security, Compliance, and Business Needs

  To authenticate your registration please enter your email address below:
 Email
 LOGIN

First Name*
Last Name*
Email*
Job Title*
Industry*
Work Phone*
Organization*
Street Address Line 1*
Street Address Line 2
City*
State*
Zip*
Country*
Company Size*
 I acknowledge and agree to Penton’s Terms of Service and to Penton’s use of my contact information to communicate with me about offerings by Penton, its brands, affiliates and/or third-party partners, consistent with Penton’s Privacy Policy In addition, I understand that my personal information will be shared with any sponsor(s) of the webinar so they can contact me directly about their products or services. Please refer to the privacy policies of such sponsor(s) for more details on how your information will be used by them.
By clicking below, I acknowledge and agree to Penton’s Terms of Service and to Penton’s use of my contact information to communicate with me about offerings by Penton, its brands, affiliates and/or third-party partners, consistent with Penton’s Privacy Policy. In addition, I understand that my personal information will be shared with any sponsor(s) of the webinar so they can contact me directly about their products or services. Please refer to the privacy policies of such sponsor(s) for more details on how your information will be used by them.


You must have Javascript and Cookies enabled to access this webcast. Click here for Help.
 
Please enable Cookies in your browser before registering for the webcast.
 
*Denotes required.
 
REGISTER

Summary

Why Attend

Hadoop is becoming a cornerstone of IT environments and rapidly moving to full production.  With high-value data being stored and processed within Hadoop, it’s critical to ensure environments and data are secure and meet compliance requirements such as SOX, PCI and HIPAA - before they are moved to production.

Get insights on securing the Hadoop infrastructure, as well as the data in Hadoop.  Explore business considerations such as accelerating deployment, leveraging existing Active Directory-based authentication and simplifying access with single-sign-on for business and privileged users.

Attendees will learn about:

  • New security challenges of Big Data
  • Extending Active Directory’s Kerberos and LDAP capabilities to Hadoop clusters
  • Enabling MapR distribution to run in secure mode 
  • Enforcing least privilege policies and eliminate the use of root privileges
  • User activity auditing with logs and correlation of activity across the cluster
  • Health Check services for security and compliance

Panelists:

David McNeely
VP, Product Strategy
Centrify

David McNeely works with customers to drive the product strategy and roadmap for Centrify's award-winning identity and access management solutions and cloud service. David has worked in the identity and access management market for over 20 years, holding various product marketing and management positions at ActiveIdentity, AOL, iPlanet and Netscape. At Netscape and iPlanet he was the director of product management for the Directory and Security product line, where he first promoted the concept of a centralized enterprise directory for unified identity and access management.

Dale Kim
Director of Industry Solutions
MapR

Dale Kim is the Director of Industry Solutions at MapR.  His background includes a variety of technical and management roles at information technology companies. While his experience includes work with relational databases, much of his career pertains to non-relational data in the areas of search, content management, and NoSQL, and includes senior roles in technical marketing, sales engineering, and support engineering. Dale holds an MBA from Santa Clara University, and a BA in Computer Science from the University of California, Berkeley.

Moderator:

Bill Kleyman
Director of Strategy and Innovation
MTM Technologies

Bill is an enthusiastic technologist with experience in data center design, management, and deployment. His architecture work includes large virtualization and cloud deployments as well as business network design and implementation. As the Director of Strategy and Innovation at MTM Technologies, he interacts with enterprise organizations and helps align IT strategies with direct business goals. He also publishes freelance whitepapers, articles, podcasts, and blogs around data center, cloud, security, and infrastructure management topics.

Sponsor: Centrify