(Big) Data Security: Protecting Information at the Source

With the growing adoption of cloud computing, Big Data or open APIs, managing, securing and sharing massive amounts of digital data across heterogeneous and increasingly interconnected infrastructures is becoming increasingly difficult. From file servers to relational databases and big data frameworks, to the Internet of Things and entire API ecosystems – each data model imposes its own security controls and separate technology stack for enforcing them.

An alternative approach – data-centric security – is in fact nothing new and quite simple in theory: instead of managing access to each individual infrastructure, just focus on protecting the data itself, regardless of its type and location. However, practical implementations of this concept depend heavily on two things: standards and policies. A solution that manages to successfully implement them in a unified, flexible and open manner, could surely be able to bring data security to a new level.

In this KuppingerCole webinar, you will learn about:

  • Current challenges and trends that shape modern data protection solutions;
  • Improving business agility and reducing complexity by redesigning traditional security models;
  • Hardening against security breaches and ensuring GDPR compliance with dynamic Attribute-Based Access Control;
  • Implementing policy-based security and privacy controls for Big Data infrastructures.

In the first part of the webinar, Alexei Balaganski, Lead Analyst at KuppingerCole, will present an overview of the security and compliance challenges of managing access to sensitive data across heterogeneous IT infrastructures. He will talk about the crucial role of standards in fighting complexity and improving the flexibility of access management.

In the second part, Gerry Gebel, Vice President of Business Development at Axiomatics, Inc., will present a deeper insight into the benefits and challenges of applying standard-based ABAC security and privacy controls to Big Data frameworks like Hadoop and will introduce his company’s new solution implementing this technology.

Other Resources

Webinars
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
Webinars
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.
Webinars
Taking an identity-centric approach to a modern security architecture
Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.