Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Dataguise Enhances Hadoop Security Solution

Dataguise, a provider of data security intelligence and protection solutions, this week announced DG for Hadoop v4.3, a solution that provides masking and selective encryption for sensitive data in major Hadoop distributions.

Dataguise, a provider of data security intelligence and protection solutions, this week announced DG for Hadoop v4.3, a solution that provides masking and selective encryption for sensitive data in major Hadoop distributions.

DG for Hadoop enables organizations to determine the most appropriate remediation technique based on privacy requirements, the company said in an announcement. The new version also brings expanded capabilities, including contextual-based search to identify sensitive data in unstructured files, simplified management with automatic notifications and detailed audit reporting to demonstrate compliance.

DataguiseTraditional approaches to securing Hadoop fail because they are too complex, expensive, and incapable of selectively protecting the data that matters in these large and diverse environments, the company explained.

Part of Dataguise’s DgSecure suite, DG for Hadoop v4.3 is able to process multiple terabytes of structured, unstructured and semi-structured data in a few hours to protect sensitive data at the source, during ingestion and in the Hadoop Distributed File System (HDFS).

Key features available in the latest version of DG for Hadoop include:

• Selective Encryption: DG for Hadoop uses symmetric key based encryption of data and also encrypts the encryption keys themselves for stronger security.

• Contextual-based data discovery: The Dataguise contextual-based data discovery capability uses a “neural-like network” approach for data search instead of a simple “rule-based” approach. As a result, information surrounding a given string is correlated and complex inferences are made to determine whether that string is relevant to the search.

• Consistent masking across a single or multiple Hadoop clusters: This capability preserves analytical value of information for trend analysis and aggregations.

• Simplified management: DG for Hadoop provides automatic notifications so that security personnel can be alerted by e-mail or SMS when a job is completed or when changes occur.

Advertisement. Scroll to continue reading.

• Compliance audit reports: New reporting that compliance auditors can integrate in their analysis of the company’s overall compliance process and posture.

“The various distributions of Apache Hadoop provide a high performance platform for managing large volumes of data, helping organizations harness the potential of Big Data to make informed decisions,” said Ashar Baig, Founder & Principal Analyst, Analyst Connection. “For security solutions to be effective in this environment requires both the ability to secure the information effectively and do so without significant impact to operational performance.”

“With Hadoop deployments projected to grow in an upward direction for the foreseeable future, the threat to organizations that do not adopt a comprehensive approach to securing this data remains high,” addded Manmeet Singh, CEO, Dataguise.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...