Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Zettaset to Enable Data-in-Motion Encryption for Hadoop

Zettaset, a Mountain View, California-based provider of Big Data management and security solutions, today announced the addition of data-in-motion encryption as a soon-to-be released feature in its flagship management and security add-on application for Hadoop.

Zettaset, a Mountain View, California-based provider of Big Data management and security solutions, today announced the addition of data-in-motion encryption as a soon-to-be released feature in its flagship management and security add-on application for Hadoop.

Zettaset Logo

Dubbed “Zettaset Orchestrator”, the company’s Hadoop management platform works with any open source Apache Hadoop-based distribution, including Cloudera, IBM BigInsights, and Hortonworks.

Data-in-motion encryption provides organizations with an additional layer of protection for their Hadoop clusters and sensitive data, eliminating access by unauthorized users, Zettaset said.

Using a Secure Socket Layer (SSL) tunnel, the solution encrypts all network connections to the Orchestrator web-based console, along with links between all cluster nodes, to reduce the risk of unauthorized access.

Connections from the Orchestrator Business Intelligence (BI) Connector, an API that connects Hadoop clusters with analytics applications, are also secured.

“Risks associated with Hadoop projects include security and privacy challenges,” wrote Gartner Research Director & Analyst, Bhavish Sood et. al. “Hadoop certainly wasn’t built with enterprise IT environments in mind because there is a shortage of robust security controls in Hadoop.”

Node performance with encryption is key as enterprises scale up their Hadoop clusters and move from pilot to production, the company said. For that reason, Zettaset’s data-in-motion encryption was designed to have “virtually no negative impact” on node and cluster performance.

Orchestrator data-in-motion encryption for Hadoop is next phase of the company’s Big Data encryption technology initiative, which began with the release of data-at-rest encryption in November 2013.  

Advertisement. Scroll to continue reading.

“Unlike other Hadoop encryption approaches which are bolt-on point products, Zettaset has integrated encryption into a complete security solution for Hadoop that provides an enterprise-wide framework for identity and access management, as well as security policy enforcement,” said Jim Vogt, CEO of Zettaset.

Scheduled to be available in Q2 2014, data-in-motion encryption for Hadoop will be bundled with every Orchestrator application license, Zettaset said.

Originally named GOTO Metrics, the company was re-named Zettaset in 2011 at the same time it announced a $3 million round of funding. The company also raised a $10 million round of funding in January 2013. 

Related: Big Data Security Challenge: Integrating Multiple Data Sources

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.