1 
Innovation without Compromise 
The Challenges of Securing Big Data
Presenters 
Carl Olofson 
Research Vice President, 
IDC 
Michael Versace 
Global Research Director, 
IDC 
Eddie Garcia 
Chief Security Architect, 
Cloudera 
Anil Earla 
Chief Data and Analytics 
Officer, Global Information 
Security, Visa 
2 ©2014 Cloudera, Inc. All rights reserved.
The Third 
Platform 
 Embracing the third 
platform is 
necessary to 
embrace the future 
of business. 
 All this data, from a 
mix of sources, 
requires 
governance, 
including data 
quality and security. 
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 3 Source: IDC
Hadoop and the Real Time Enterprise 
Real Time BI 
Composite Data 
Framework 
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 4 4 
CEP 
Engine 
Streaming 
Data 
Business Action 
Enterprise Analytics 
IMDB 
High Speed Transactions and 
Automated Decisioning 
Integrated 
Business 
Process 
Apps 
Data 
Warehouse 
Hadoop
Data Security Challenges 
 What is it? 
• From unmanaged sources 
• Uncontrolled data 
 Need to identify and protect 
• Personal identifying 
information 
• Other confidential data 
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 5
The Financial Services, The Digital Universe Is Growing 
Faster Than Most Commercial Markets 
176 
exabytes 
2,334 
exabytes 
46% annual 
growth 
2013 2020 
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 
6 
 In 2013, tablets 
representing the financial 
services portion of the DU 
– the financial services 
“Digital Galaxy” would be 
40% of the volume of the 
Empire State Building 
 By 2020, it would 5.1 
times the volume of the 
Empire State Building 
 At 46% CAGR, the 
financial services Digital 
Galaxy is growing faster 
than the overall DU 
* iPad Air – 9.4” high, 6.6” wide, 0.29” thick, 128 GB; volume of Empire State Building – 37 million cubic feet 
Source: IDC, 2014
At a Growing Rate, Firms Turn to Hadoop and the BDA 
Ecosystem, And Getting the Payoff 
81% of organizations surveyed 
indicated “met expectations” or 
“exceeded expectations” as the 
most frequent benefit achieved from 
BDA initiatives in aggregate. 
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 
7 
N = 84 
Source: IDC's 2013 BDA Survey, July 2013
Where’s the Opportunity? 
In MI, Customer Acquisition, Pricing Services, and Risk Management 
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 
8 
Cross Industry 
Comparison 
Commercial, Retail, 
Investment Banks 
Customer Acquisition and/or Retention 40.7 54.8 
Customer Service and Support 46.8 47.6 
Pricing Strategies and Programs 46.0 47.6 
Product, Service, or Program Improvement and Innovation 48.6 54.8 
Market and Competitive Intelligence 42.8 48.8 
Process and Operations Optimization and Control 42.0 39.3 
Plant, Facilities, and Equipment Design, Maintenance 19.4 11.9 
Human Capital Management 27.6 29.8 
Operational, Fraud, and Risk Management 24.5 38.1 
Regulatory Compliance, Financial Controls 34.8 44.0 
Supply Chain Management and Logistics 33.4 13.1 
Information Technology Optimization and/or Modernization 40.0 38.1 
Other 1.3 1.2 
N=84 
Source: IDC's 2013 BDA Survey
Security and Data Governance Lack Attention 
“Ethical Use”, Privacy, Right to be Forgotten, and Resources Constraints 
Over 50% of organizations surveyed 
indicated they have been less than 
successful in hiring, retraining, or 
rewarding big data and analytical 
staff involved in security and 
governance processes. 
© IDC Visit us at IDC.com and follow us on Twitter: @IDC 
9 
N = 84 
Source: IDC's 2013 BDA Survey, July 2013
Security and Governance at Scale 
Scale-up and Scale-out to Workload Requirements 
Workload Class Business Drivers Metrics Gap Enablers 
Class 1 
Development 
File & Print 
Small Data Marts 
Small-scale applications & DB 
servers 
Increased utilization 
Consolidation 
Lower unit costs 
Ease on demand 
Simplification – do more w/less 
Server Utilization 
VP Ratio (i.e. #VMs) 
Time-to-provision 
End-user Satisfaction 
Cost (TCO) 
Developer productivity 
Overhead & IO Performance 
Storage Management 
Backup window 
Pay as you go services 
Multi-tenant services 
Bandwidth 
CPU Performance 
Class 2 
Medium-scale applications & 
DB servers 
Data Marts 
Small Data Warehouses 
Messaging (Exchange, etc) 
Greater flexibility to move 
workloads 
Shed non-core workloads 
Extend Class 1 benefits 
Increase asset utilization 
System availability 
Service management 
Storage admin productivity 
Backup efficiency 
RPO/RTO 
Overhead & IO Performance 
Problem Determination 
Initial component integration; 
De-facto support for Exchange 
and Oracle 
SaaS 
Chargebacks 
Class 3 
Mission Critical Applications 
Larger scale OLTP 
Larger scale DB Servers 
Large r scale messaging 
Simpler application 
management 
Quicker time to market 
Simpler and better application 
integration 
Less expensive recovery 
Cost 
Change and new product 
deployment times (TTM) 
I/O Performance 
Enhanced Security & 
Compliance 
SLA Management 
Integrated Recovery 
Encapsulated workloads 
SLA management of high-performance 
systems 
Ability to design low RPO/RTO 
systems cost effectively 
Compliance data standard 
Security Ops Management 
Class 4 
Large-scale applications 
requiring highest levels of 
availability, security & 
recoverability 
Quicker time to market 
Standard Infrastructure stack 
Deeper business integration 
Resiliency 
Cost 
Compliance 
Speed to deploy 
Trusted Integration 
High-speed recovery 
Proven Resilience 
“Certified” platforms 
“Cannot fail” fault tolerance 
Defensible Security
11 
Big Data Security Roundtable
Protecting Big Data 
Share what you can about your Hadoop 
environment, and tell us how the big data 
trend has changed the way Visa is 
thinking about protecting data and 
security in general? 
12 ©2014 Cloudera, Inc. All rights reserved.
Using Big Data as a Security Enabler 
On the flip side, how are all the 
innovations around the big data trend 
helping Visa with cyber security 
perspective? 
13 ©2014 Cloudera, Inc. All rights reserved.
When designing with Hadoop as a 
target technology, what were the 
biggest security and risk 
considerations? 
14 ©2014 Cloudera, Inc. All rights reserved.
How did these and other design and 
implementation issues influence Cloudera's 
strategy for securing Hadoop as a big data 
platform? 
How are you seeing the adoption of Hadoop 
change the way practitioners think about 
security? 
15 ©2014 Cloudera, Inc. All rights reserved.
What do you see as the greatest challenges 
to Hadoop security? You mentioned 
multiple access paths, Hive and Impala for 
example, as a challenge. Can you expand 
on that? 
16 ©2014 Cloudera, Inc. All rights reserved.
What are some of the biggest 
challenges? For example, how does 
Cloudera approach the “Access Path” 
challenge that Carl referenced? 
17 ©2014 Cloudera, Inc. All rights reserved.
Has Cloudera Security for Hadoop 
become part of Visa’s overall security 
operation – if so, how? 
18 ©2014 Cloudera, Inc. All rights reserved.
Can you give us top down view of 
Cloudera's approach to Hadoop and 
security? 
19 ©2014 Cloudera, Inc. All rights reserved.
What's in the future for big data security? 
What are some of the gaps in Hadoop 
security that Cloudera and the open 
source community are addressing? 
20 ©2014 Cloudera, Inc. All rights reserved.
What advice do you have for your 
peers and others securing Hadoop? 
21 ©2014 Cloudera, Inc. All rights reserved.
22 
The Future of Big Data Security 
Cloudera + Security
Our Approach to Hadoop Security 
Comprehensive 
• Standards-based Authentication 
• Centralized, Granular Authorization 
• Native Data Protection 
• End-to-End Data Audit and Lineage 
Compliance-Ready 
• Meet compliance requirements 
• HIPAA, PCI-DSS, … 
• Encryption and key management 
Transparent 
• Security at the core 
• Minimal performance impact 
• Compatible with new components 
• Insight with compliance 
23 
©2014 Cloudera, Inc. All rights reserved.
CLOUDERA ENTERPRISE Comprehensive, Transparent, Compliance-Ready Security 
Batch 
Processing 
Analytic 
MPP SQL 
Search 
Engine 
Machine 
Learning 
Workload & Resource Management 
©2014 Cloudera, Inc. All rights reserved. 24 
Stream 
Processing 
End-to-End, Zero-Downtime System Administration 
3rd Party 
Apps 
Distributed Filesystem Online NoSQL Database 
Perimeter 
Authentication 
Access Control 
Authorization 
Data Protection 
Encryption, 
Key Management 
Data Visibility 
Audit, Lineage 
Data Lifecycle 
BDR, Snapshots 
ANALYTIC & 
PROCESSING 
ENGINES 
SYSTEMS 
MANAGEMENT 
UNIFIED DATA 
STORAGE & 
INTEGRATION 
SECURITY & 
GOVERNANCE
Introducing the Cloudera Center for Security Excellence 
• Based in Austin, Texas 
• Comprehensive data and 
cluster security technologies 
• Hadoop security test and 
certification lab 
• Compliance cookbooks 
• Security ecosystem partner 
enablement 
• Intel chipset, cloud and 
virtualization security 
alignment 
25 
©2014 Cloudera, Inc. All rights reserved.
26 ©2014 Cloudera, Inc. All rights reserved. 
Questions?

More Related Content

PDF
Dell Digital Transformation Through AI and Data Analytics Webinar
PPTX
Partena 2010.02.10
PPTX
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
PDF
Accelerating big data with ioMemory and Cisco UCS and NOSQL
PPT
Msc Presentation
PPTX
#1 keynote get social_be_mobile_runcloud
PPTX
Dell | Your Path – Our Platform & Great Partnerships
PDF
Design advantages of Hadoop ETL offload with the Intel processor-powered Dell...
Dell Digital Transformation Through AI and Data Analytics Webinar
Partena 2010.02.10
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
Accelerating big data with ioMemory and Cisco UCS and NOSQL
Msc Presentation
#1 keynote get social_be_mobile_runcloud
Dell | Your Path – Our Platform & Great Partnerships
Design advantages of Hadoop ETL offload with the Intel processor-powered Dell...

What's hot (20)

PDF
Connecting Legacy Data Sources to the Data Lifecycle
PDF
Meet up roadmap cloudera 2020 - janeiro
PDF
Logicalis IoT & Smart Cities (Use Case)
PDF
Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...
PPTX
Powering the Internet of Things with Apache Hadoop
PPTX
Strategies for Enterprise Grade Azure-based Analytics
PPTX
Cloudera Altus: Big Data in der Cloud einfach gemacht
PPTX
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
PPTX
Top 5 IoT Use Cases
PPTX
The Vortex of Change - Digital Transformation (Presented by Intel)
PPTX
Cloudera - IoT & Smart Cities
PDF
Cloudera - Enabling the IoT Revolution Driving Insights in a Connected World
PPTX
Delivering improved patient outcomes through advanced analytics 6.26.18
PPTX
IoT Data as Service with Hadoop
PDF
Infrastructure as a Service (IaaS)
PDF
IBM Rational Software Conference 2009 Day 2 Keynote: Steve Mills
PPTX
Empowering a Mobile Workforce: An Objective Comparison of Leading Mobile Devi...
PPTX
IoT-Enabled Predictive Maintenance
PDF
About us tapsolutions
PPTX
Building the Next Generation IoT & Telematics Platform
Connecting Legacy Data Sources to the Data Lifecycle
Meet up roadmap cloudera 2020 - janeiro
Logicalis IoT & Smart Cities (Use Case)
Intro to Big Data and Apache Hadoop by Dr. Amr Awadallah at CLOUD WEEKEND '13...
Powering the Internet of Things with Apache Hadoop
Strategies for Enterprise Grade Azure-based Analytics
Cloudera Altus: Big Data in der Cloud einfach gemacht
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
Top 5 IoT Use Cases
The Vortex of Change - Digital Transformation (Presented by Intel)
Cloudera - IoT & Smart Cities
Cloudera - Enabling the IoT Revolution Driving Insights in a Connected World
Delivering improved patient outcomes through advanced analytics 6.26.18
IoT Data as Service with Hadoop
Infrastructure as a Service (IaaS)
IBM Rational Software Conference 2009 Day 2 Keynote: Steve Mills
Empowering a Mobile Workforce: An Objective Comparison of Leading Mobile Devi...
IoT-Enabled Predictive Maintenance
About us tapsolutions
Building the Next Generation IoT & Telematics Platform
Ad

Similar to Innovation Without Compromise: The Challenges of Securing Big Data (20)

PDF
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
PDF
Capgemini Leap Data Transformation Framework with Cloudera
PDF
Oracle's Cloud Strategy
PDF
Technology Megatrends Reshaping IT: What’s Your Migration Path
PPTX
Get ahead of the cloud or get left behind
PDF
Big Data LDN 2017: Data Governance Reimagined
PDF
Analyst Keynote: Forrester: Data Fabric Strategy is Vital for Business Innova...
PPTX
Hadoop and Financial Services
PPTX
Seeking Cybersecurity--Strategies to Protect the Data
PPTX
Microsoft Cloud
PPTX
MongoDB IoT City Tour STUTTGART: Hadoop and future data management. By, Cloudera
PDF
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
PDF
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the IT
PPTX
Hadoop: Making it work for the Business Unit
PDF
Tdwi austin simplifying big data delivery to drive new insights final
PPTX
VSD Paris 2018 - Présentation Finale
PPTX
Are your Cloud Services Secure and Compliant today?
PDF
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
PPTX
ANIn Pune July 2024 | Bootstrapping Data Mesh for a Complex Enterprise by Bal...
PPTX
Dell Software: An Opportunity For Channel Partners
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Capgemini Leap Data Transformation Framework with Cloudera
Oracle's Cloud Strategy
Technology Megatrends Reshaping IT: What’s Your Migration Path
Get ahead of the cloud or get left behind
Big Data LDN 2017: Data Governance Reimagined
Analyst Keynote: Forrester: Data Fabric Strategy is Vital for Business Innova...
Hadoop and Financial Services
Seeking Cybersecurity--Strategies to Protect the Data
Microsoft Cloud
MongoDB IoT City Tour STUTTGART: Hadoop and future data management. By, Cloudera
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the IT
Hadoop: Making it work for the Business Unit
Tdwi austin simplifying big data delivery to drive new insights final
VSD Paris 2018 - Présentation Finale
Are your Cloud Services Secure and Compliant today?
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
ANIn Pune July 2024 | Bootstrapping Data Mesh for a Complex Enterprise by Bal...
Dell Software: An Opportunity For Channel Partners
Ad

More from Cloudera, Inc. (20)

PPTX
Partner Briefing_January 25 (FINAL).pptx
PPTX
Cloudera Data Impact Awards 2021 - Finalists
PPTX
2020 Cloudera Data Impact Awards Finalists
PPTX
Edc event vienna presentation 1 oct 2019
PPTX
Machine Learning with Limited Labeled Data 4/3/19
PPTX
Data Driven With the Cloudera Modern Data Warehouse 3.19.19
PPTX
Introducing Cloudera DataFlow (CDF) 2.13.19
PPTX
Introducing Cloudera Data Science Workbench for HDP 2.12.19
PPTX
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19
PPTX
Leveraging the cloud for analytics and machine learning 1.29.19
PPTX
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19
PPTX
Leveraging the Cloud for Big Data Analytics 12.11.18
PPTX
Modern Data Warehouse Fundamentals Part 3
PPTX
Modern Data Warehouse Fundamentals Part 2
PPTX
Modern Data Warehouse Fundamentals Part 1
PPTX
Extending Cloudera SDX beyond the Platform
PPTX
Federated Learning: ML with Privacy on the Edge 11.15.18
PPTX
Analyst Webinar: Doing a 180 on Customer 360
PPTX
Build a modern platform for anti-money laundering 9.19.18
PPTX
Introducing the data science sandbox as a service 8.30.18
Partner Briefing_January 25 (FINAL).pptx
Cloudera Data Impact Awards 2021 - Finalists
2020 Cloudera Data Impact Awards Finalists
Edc event vienna presentation 1 oct 2019
Machine Learning with Limited Labeled Data 4/3/19
Data Driven With the Cloudera Modern Data Warehouse 3.19.19
Introducing Cloudera DataFlow (CDF) 2.13.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19
Leveraging the cloud for analytics and machine learning 1.29.19
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19
Leveraging the Cloud for Big Data Analytics 12.11.18
Modern Data Warehouse Fundamentals Part 3
Modern Data Warehouse Fundamentals Part 2
Modern Data Warehouse Fundamentals Part 1
Extending Cloudera SDX beyond the Platform
Federated Learning: ML with Privacy on the Edge 11.15.18
Analyst Webinar: Doing a 180 on Customer 360
Build a modern platform for anti-money laundering 9.19.18
Introducing the data science sandbox as a service 8.30.18

Recently uploaded (20)

PDF
AI Guide for Business Growth - Arna Softech
PPTX
Viber For Windows 25.7.1 Crack + Serial Keygen
PDF
Practical Indispensable Project Management Tips for Delivering Successful Exp...
PPTX
Chapter 1 - Transaction Processing and Mgt.pptx
PPTX
Human-Computer Interaction for Lecture 2
PPTX
Computer Software - Technology and Livelihood Education
PDF
Sun and Bloombase Spitfire StoreSafe End-to-end Storage Security Solution
PDF
BoxLang Dynamic AWS Lambda - Japan Edition
PDF
Visual explanation of Dijkstra's Algorithm using Python
PPTX
R-Studio Crack Free Download 2025 Latest
PDF
CCleaner 6.39.11548 Crack 2025 License Key
PDF
MiniTool Power Data Recovery 12.6 Crack + Portable (Latest Version 2025)
PDF
How Tridens DevSecOps Ensures Compliance, Security, and Agility
PPTX
Bista Solutions Advanced Accounting Package
PDF
SOFTWARE ENGINEERING Software Engineering (3rd Edition) by K.K. Aggarwal & Yo...
PDF
Guide to Food Delivery App Development.pdf
PPTX
hospital managemt ,san.dckldnklcdnkdnkdnjadnjdjn
PDF
CapCut PRO for PC Crack New Download (Fully Activated 2025)
PDF
Internet Download Manager IDM Crack powerful download accelerator New Version...
PDF
infoteam HELLAS company profile 2025 presentation
AI Guide for Business Growth - Arna Softech
Viber For Windows 25.7.1 Crack + Serial Keygen
Practical Indispensable Project Management Tips for Delivering Successful Exp...
Chapter 1 - Transaction Processing and Mgt.pptx
Human-Computer Interaction for Lecture 2
Computer Software - Technology and Livelihood Education
Sun and Bloombase Spitfire StoreSafe End-to-end Storage Security Solution
BoxLang Dynamic AWS Lambda - Japan Edition
Visual explanation of Dijkstra's Algorithm using Python
R-Studio Crack Free Download 2025 Latest
CCleaner 6.39.11548 Crack 2025 License Key
MiniTool Power Data Recovery 12.6 Crack + Portable (Latest Version 2025)
How Tridens DevSecOps Ensures Compliance, Security, and Agility
Bista Solutions Advanced Accounting Package
SOFTWARE ENGINEERING Software Engineering (3rd Edition) by K.K. Aggarwal & Yo...
Guide to Food Delivery App Development.pdf
hospital managemt ,san.dckldnklcdnkdnkdnjadnjdjn
CapCut PRO for PC Crack New Download (Fully Activated 2025)
Internet Download Manager IDM Crack powerful download accelerator New Version...
infoteam HELLAS company profile 2025 presentation

Innovation Without Compromise: The Challenges of Securing Big Data

  • 1. 1 Innovation without Compromise The Challenges of Securing Big Data
  • 2. Presenters Carl Olofson Research Vice President, IDC Michael Versace Global Research Director, IDC Eddie Garcia Chief Security Architect, Cloudera Anil Earla Chief Data and Analytics Officer, Global Information Security, Visa 2 ©2014 Cloudera, Inc. All rights reserved.
  • 3. The Third Platform  Embracing the third platform is necessary to embrace the future of business.  All this data, from a mix of sources, requires governance, including data quality and security. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 3 Source: IDC
  • 4. Hadoop and the Real Time Enterprise Real Time BI Composite Data Framework © IDC Visit us at IDC.com and follow us on Twitter: @IDC 4 4 CEP Engine Streaming Data Business Action Enterprise Analytics IMDB High Speed Transactions and Automated Decisioning Integrated Business Process Apps Data Warehouse Hadoop
  • 5. Data Security Challenges  What is it? • From unmanaged sources • Uncontrolled data  Need to identify and protect • Personal identifying information • Other confidential data © IDC Visit us at IDC.com and follow us on Twitter: @IDC 5
  • 6. The Financial Services, The Digital Universe Is Growing Faster Than Most Commercial Markets 176 exabytes 2,334 exabytes 46% annual growth 2013 2020 © IDC Visit us at IDC.com and follow us on Twitter: @IDC 6  In 2013, tablets representing the financial services portion of the DU – the financial services “Digital Galaxy” would be 40% of the volume of the Empire State Building  By 2020, it would 5.1 times the volume of the Empire State Building  At 46% CAGR, the financial services Digital Galaxy is growing faster than the overall DU * iPad Air – 9.4” high, 6.6” wide, 0.29” thick, 128 GB; volume of Empire State Building – 37 million cubic feet Source: IDC, 2014
  • 7. At a Growing Rate, Firms Turn to Hadoop and the BDA Ecosystem, And Getting the Payoff 81% of organizations surveyed indicated “met expectations” or “exceeded expectations” as the most frequent benefit achieved from BDA initiatives in aggregate. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 7 N = 84 Source: IDC's 2013 BDA Survey, July 2013
  • 8. Where’s the Opportunity? In MI, Customer Acquisition, Pricing Services, and Risk Management © IDC Visit us at IDC.com and follow us on Twitter: @IDC 8 Cross Industry Comparison Commercial, Retail, Investment Banks Customer Acquisition and/or Retention 40.7 54.8 Customer Service and Support 46.8 47.6 Pricing Strategies and Programs 46.0 47.6 Product, Service, or Program Improvement and Innovation 48.6 54.8 Market and Competitive Intelligence 42.8 48.8 Process and Operations Optimization and Control 42.0 39.3 Plant, Facilities, and Equipment Design, Maintenance 19.4 11.9 Human Capital Management 27.6 29.8 Operational, Fraud, and Risk Management 24.5 38.1 Regulatory Compliance, Financial Controls 34.8 44.0 Supply Chain Management and Logistics 33.4 13.1 Information Technology Optimization and/or Modernization 40.0 38.1 Other 1.3 1.2 N=84 Source: IDC's 2013 BDA Survey
  • 9. Security and Data Governance Lack Attention “Ethical Use”, Privacy, Right to be Forgotten, and Resources Constraints Over 50% of organizations surveyed indicated they have been less than successful in hiring, retraining, or rewarding big data and analytical staff involved in security and governance processes. © IDC Visit us at IDC.com and follow us on Twitter: @IDC 9 N = 84 Source: IDC's 2013 BDA Survey, July 2013
  • 10. Security and Governance at Scale Scale-up and Scale-out to Workload Requirements Workload Class Business Drivers Metrics Gap Enablers Class 1 Development File & Print Small Data Marts Small-scale applications & DB servers Increased utilization Consolidation Lower unit costs Ease on demand Simplification – do more w/less Server Utilization VP Ratio (i.e. #VMs) Time-to-provision End-user Satisfaction Cost (TCO) Developer productivity Overhead & IO Performance Storage Management Backup window Pay as you go services Multi-tenant services Bandwidth CPU Performance Class 2 Medium-scale applications & DB servers Data Marts Small Data Warehouses Messaging (Exchange, etc) Greater flexibility to move workloads Shed non-core workloads Extend Class 1 benefits Increase asset utilization System availability Service management Storage admin productivity Backup efficiency RPO/RTO Overhead & IO Performance Problem Determination Initial component integration; De-facto support for Exchange and Oracle SaaS Chargebacks Class 3 Mission Critical Applications Larger scale OLTP Larger scale DB Servers Large r scale messaging Simpler application management Quicker time to market Simpler and better application integration Less expensive recovery Cost Change and new product deployment times (TTM) I/O Performance Enhanced Security & Compliance SLA Management Integrated Recovery Encapsulated workloads SLA management of high-performance systems Ability to design low RPO/RTO systems cost effectively Compliance data standard Security Ops Management Class 4 Large-scale applications requiring highest levels of availability, security & recoverability Quicker time to market Standard Infrastructure stack Deeper business integration Resiliency Cost Compliance Speed to deploy Trusted Integration High-speed recovery Proven Resilience “Certified” platforms “Cannot fail” fault tolerance Defensible Security
  • 11. 11 Big Data Security Roundtable
  • 12. Protecting Big Data Share what you can about your Hadoop environment, and tell us how the big data trend has changed the way Visa is thinking about protecting data and security in general? 12 ©2014 Cloudera, Inc. All rights reserved.
  • 13. Using Big Data as a Security Enabler On the flip side, how are all the innovations around the big data trend helping Visa with cyber security perspective? 13 ©2014 Cloudera, Inc. All rights reserved.
  • 14. When designing with Hadoop as a target technology, what were the biggest security and risk considerations? 14 ©2014 Cloudera, Inc. All rights reserved.
  • 15. How did these and other design and implementation issues influence Cloudera's strategy for securing Hadoop as a big data platform? How are you seeing the adoption of Hadoop change the way practitioners think about security? 15 ©2014 Cloudera, Inc. All rights reserved.
  • 16. What do you see as the greatest challenges to Hadoop security? You mentioned multiple access paths, Hive and Impala for example, as a challenge. Can you expand on that? 16 ©2014 Cloudera, Inc. All rights reserved.
  • 17. What are some of the biggest challenges? For example, how does Cloudera approach the “Access Path” challenge that Carl referenced? 17 ©2014 Cloudera, Inc. All rights reserved.
  • 18. Has Cloudera Security for Hadoop become part of Visa’s overall security operation – if so, how? 18 ©2014 Cloudera, Inc. All rights reserved.
  • 19. Can you give us top down view of Cloudera's approach to Hadoop and security? 19 ©2014 Cloudera, Inc. All rights reserved.
  • 20. What's in the future for big data security? What are some of the gaps in Hadoop security that Cloudera and the open source community are addressing? 20 ©2014 Cloudera, Inc. All rights reserved.
  • 21. What advice do you have for your peers and others securing Hadoop? 21 ©2014 Cloudera, Inc. All rights reserved.
  • 22. 22 The Future of Big Data Security Cloudera + Security
  • 23. Our Approach to Hadoop Security Comprehensive • Standards-based Authentication • Centralized, Granular Authorization • Native Data Protection • End-to-End Data Audit and Lineage Compliance-Ready • Meet compliance requirements • HIPAA, PCI-DSS, … • Encryption and key management Transparent • Security at the core • Minimal performance impact • Compatible with new components • Insight with compliance 23 ©2014 Cloudera, Inc. All rights reserved.
  • 24. CLOUDERA ENTERPRISE Comprehensive, Transparent, Compliance-Ready Security Batch Processing Analytic MPP SQL Search Engine Machine Learning Workload & Resource Management ©2014 Cloudera, Inc. All rights reserved. 24 Stream Processing End-to-End, Zero-Downtime System Administration 3rd Party Apps Distributed Filesystem Online NoSQL Database Perimeter Authentication Access Control Authorization Data Protection Encryption, Key Management Data Visibility Audit, Lineage Data Lifecycle BDR, Snapshots ANALYTIC & PROCESSING ENGINES SYSTEMS MANAGEMENT UNIFIED DATA STORAGE & INTEGRATION SECURITY & GOVERNANCE
  • 25. Introducing the Cloudera Center for Security Excellence • Based in Austin, Texas • Comprehensive data and cluster security technologies • Hadoop security test and certification lab • Compliance cookbooks • Security ecosystem partner enablement • Intel chipset, cloud and virtualization security alignment 25 ©2014 Cloudera, Inc. All rights reserved.
  • 26. 26 ©2014 Cloudera, Inc. All rights reserved. Questions?

Editor's Notes

  • #7: EMC: what is CAGR? Remove ‘digital galaxy’ from everything, need branding of DU. Also why are we using the empire state building, can we instead include the other ones listed on slide 3 and in our 2014 report, see below: represented by memory in a stack of tablets, it would stretch two-thirds the way to the Moon* By 2020, it would be 6.6 stacks from the Earth to the moon*
  • #11: % of budget
  • #13: Anil to answer
  • #14: Anil to answer
  • #15: Anil to answer
  • #16: Eddie to answer
  • #17: Carl to answer IDC, from your perspective, as someone with a long term connection with database/data integration innovation, what do you see as the greatest challenges to Hadoop security – you mentioned earlier multiple access paths, Hive and Impala for example, as a challenge.  Can you expand on that?
  • #18: Eddie to answer
  • #19: Anil to answer
  • #20: Eddie answer
  • #21: Eddie and Carl to answer What's in the future for big data security? What are some of the gaps in Hadoop security that Cloudera and the open source community are addressing? (Education, certification, SIEM integration, fine grained access control, hardened systems, etc.)
  • #22: Anil to answer and Eddie and Carl to comment CTOs CIOs and Business IT leaders Hadoop ecosystem providers Security Professionals Standards developers