Logo

This webinar was originally broadcast on:
Wednesday, August 27, 2014 01:00 PM EDT / 10:00 AM PDT
 
If you have previously registered for this event, please login here:
 Email
 LOGIN

Registration is required to attend this event. Please register now.
First Name*
Last Name*
Title*
Industry*
Company Size*
Company*
Street Address 1*
Street Address 2
City*
State/Province*
Zip*
Country*
Phone*
Email*
NEW!... Early Registration!
 Check here if you would like to automatically be registered for webinars on the same topic
You must have Javascript and Cookies enabled to access this webcast. Click here for Help.
 
Please enable Cookies in your browser before registering for the webcast.
 
*Denotes required.
 
REGISTER
Abstract Now that you are faced with moving your Hadoop POC into production, you know that sensitive customer and corporate data will be in the ecosystem–credit card numbers, intellectual property, customer files, and more. Now the question becomes, how to keep all this sensitive data secure, as it moves into Hadoop, as it is stored and as it moves beyond Hadoop? And, most importantly, how to secure the data but still make it available for analytics? After all, analytics is why it’s in Hadoop in the first place.

Attend this discussion to learn about security options with authentication, authorization, monitoring and data-level security for Apache Hadoop. Get insight to the use cases and architectural decisions that enable the business benefits you need to deliver, while avoiding risks straight from today’s headlines, including cyber attacks and leaking of sensitive customer data. Cases to be covered include:

  • Global Telco–moving petabytes of user and location data into Hadoop, including 17 PII data elements
  • Top 5 financial services firm–reducing the costs of its data warehouse infrastructure by performing fraud analytics on Hadoop
  • Supply Chain data and analytics solutions provider delivering pharmacy claims reconciliations, product usage trending and market basket insights

Learn how to protect your sensitive data, enable analytics without security risk, and neutralize breaches through new data-centric technologies that are easy to integrate with Hive, Sqoop, MapReduce and many other interfaces.


Presenters

Sudeep Venkatesh
VP Solutions Architecture
Voltage Security, Inc.



Vinod Nair
Senior Manager, Partner Product Management
Hortonworks




Moderator

Peter Bernstein
Senior Editor
TMCnet