尊敬的 微信汇率:1円 ≈ 0.046239 元 支付宝汇率:1円 ≈ 0.04633元 [退出登录]
SlideShare a Scribd company logo
Grab some
coffee and
enjoy the
pre-show
banter
before the
top of the
hour! !
The Briefing Room
Solving the Really Big Tech Problems with IoT
Welcome
Host:
Eric Kavanagh
eric.kavanagh@bloorgroup.com
@eric_kavanagh
u  Reveal the essential characteristics of enterprise
software, good and bad
u  Provide a forum for detailed analysis of today s innovative
technologies
u  Give vendors a chance to explain their product to savvy
analysts
u  Allow audience members to pose serious questions…and
get answers!
Mission
Topics
January: ANALYTICS
February: BIG DATA
March: CLOUD
The Rosetta Stone
u  MapReduce wasn’t enough
u  Spark is awesome, but still…
u  Kafka changed the game
u  NiFi is the capstone for
Hadoop!
Analyst
Robin Bloor is
Chief Analyst at
The Bloor Group
robin.bloor@bloorgroup.com
@robinbloor
HPE Security
u  HPE offers comprehensive data security and privacy
solutions for big data, the cloud and the Internet of
Things
u  Its solution features data encryption, tokenization and
key management
u  HPE partnered with Hortonworks to enhance its
DataFlow solution (powered by Apache NiFi) with data
protection
Guest
Reiner Kappenberger,
Global Product Management, Big Data
HPE Security – Data Security
Reiner Kappenberger has over 20 years of
computer software industry experience
focusing on encryption and security for Big
Data environments. His background ranges
from Device management in the
telecommunications sector to GIS and
database systems. He holds a Diploma from
the FH Regensburg, Germany in computer
science.
Solving the Really Big
Tech Problems with IoT
HPE Security – Data Security
January 17, 2017
2
HPE Security - Data Security
We protect the world’s most sensitive data
–  Protect the world’s largest brands & neutralize breach impact by securing
sensitive data-at-rest, in-use and in-motion.
–  Over 80 patents & 51 years of expertise
Our Solutions
–  Provide advanced encryption, tokenization & key management
Market leadership
–  Data-centric security solutions used by eight of the top ten U.S. payment
processors, nine of the top ten U.S. banks.
–  Thousands of enterprise customers across all industries including
transportation, retail, financial services, payment processing, banking,
insurance, high tech, healthcare, energy, telecom & public sector.
–  Email solution used by millions of users and thousands of enterprise & mid-
sized businesses including healthcare organizations, regional banks &
insurance providers.
–  Contribute technology to multiple standards organizations.
Why is securing Hadoop difficult?
Rapid innovation in a well
funded open source community
Multiple feeds of data in real time
from different sources with different
protection needs
Mainframe
MQ
RDBMs
XML
Salesforce
Flat
Files
Multiple types of data combined
in a Hadoop “Data Lake”
3
Why is securing Hadoop difficult?
4
Reduced control if Hadoop
clusters are deployed in a cloud
environment
Automatic replication of data across
multiple nodes once entered into
the HDFS data store
Access by many different users
with varying analytic needs
Introducing “Data-centric” security
5
Traditional IT
Infrastructure Security
Disk encryption
Database encryption
SSL/TLS/firewalls
Authentication
Management
Threats to
Data
Malware,
Insiders
SQL injection,
Malware
Traffic
Interceptors
Malware,
Insiders
Credential
Compromise
Security
Gaps
HPE SecureData
Data-centric Security
SSL/TLS/firewalls
Datasecuritycoverage
End-to-endProtection
Data
Ecosystem
Storage
File systems
Databases
Data and applications
Security gap
Security gap
Security gap
Security gap
Middleware
HPE Format-Preserving Encryption (FPE)
6
– Supports data of any format: name, address, dates, numbers, etc.
– Preserves referential integrity
– Only applications that need the original value need change
– Used for production protection and data masking
– NIST-standard using FF1 AES Encryption
AES - CBC
AES - FPE 253- 67-2356
8juYE%Uks&dDFa2345^WFLERG
First Name: Uywjlqo Last Name: Muwruwwbp
SSN: 253- 67-2356
DOB: 18-06-1972
Ija&3k24kQotugDF2390^32 0OWioNu2(*872weW
Oiuqwriuweuwr%oIUOw1@
First Name: Gunther
Last Name: Robertson
SSN: 934-72-2356
DOB: 20-07-1966
Tax ID
934-72-2356
Hyper Secure Stateless Tokenization (SST)
Credit Card
4171 5678 8765 4321
– Tokenization for PCI scope reduction
– Replaces token database with a smaller token mapping table
– Token values mapped using random numbers
– Lower costs
− No database hardware, software, replication problems, etc.
– Hyper SST technology is architected to leverage the latest compute-platform advances
7
SST 8736 5533 4678 9453
Partial SST 4171 5633 4678 4321
Obvious SST 4171 56AZ UYTZ 4321
BIN Mapping 1236 5533 4678 4321
Granular Policy Managed by HPE SecureData
– A policy consists of Data Formats, Protection, and Data Access Rules
8
Data Format Name – Field or Object
Type Alphabets, Formats
Logic Rules – Meaning Preservation Rules
Protection Method
Authentication Policy
FPE SST IBSE
Dynamic Masking Policy Mask Type, Mask
System Auth
Key Rotation Policy for Encryption, Caching Policy
Authorization Groups, Roles – No Access, Access, Masked Access
App Auth
App Permissions – Encrypt, Tokenization, Detokenize, Decrypt
Note: Some features vary by platform, use of LDAP, IAM, IDM
LDAP, Groups
PKI, Secret, IP
ranges, custom
adapters/Java
Securing Sensitive Data in Big Data Platforms and Hadoop
9
Public
data
Big Data Platform
Teradata, Vertica, Hadoop
Sqoop
Hive
UDFs
Map
Reduce
“Landing
zone”
TDE
SQL Spark
Sensor
Data
Power
user re-
identifies
data
BI tools
work on
protected
data
Business
processes
use
protected
data
Laptop
log files
Server
log files
Any data
Source
Flume
NiFi
Storm
Kafka
60 Data Sources
20 Million records
per day = 1TB
250 Nodes
LDAP
Sensitive
structured
sources
Hadoop Cluster
Sqoop
Flume
Storm
Hive
UDFs
Map Reduce
Staging Area
HPE SecureData
File Processor
Teradata EDW
UDFs
Data
Virtualization
layer
Tableau
Analytics &
Data Science
HPE SecureData
Key Servers & WS
API’s
Leading Telecoms Provider – Big Data Primary Data Flow
Data
Cleansing
22
Threats in the IoT Space
11
Public
data
Sqoop
Hive
UDFs
Map
Reduce
“Landing
zone”
TDE
SQL Spark
Sensor
Data
Power
user re-
identifies
data
BI tools
work on
protected
data
Business
processes
use
protected
data
Laptop
log files
Server
log files
Any data
Source
Flume
NiFi
Storm
Kafka
Back-end infrastructure
Leading car manufacturer – Big Data primary data flow
12
Sensitive
structured data
Hadoop Edge
Nodes
HPE SecureData
Hadoop Tools
Hadoop Cluster Data Warehouse
Sensitive
structured
sources
Cognos
Analytics &
Data Science
HPE SecureData
Key Servers &
WS API’s
~2 Billion real time
transactions/day
Other real-time data
feeds – customer
data from
dealerships,
manufacturers
Sqoop
Hive
UDFs
Map Reduces
“Landing
zone”
“Integration
Controls”
Flume real
time ingest
Existing data sets
and 3rd party data,
e.g.. accident data
UDFs
IBM DataStage
Thank you
13
Perceptions & Questions
Analyst:
Robin Bloor
The Nature of Data in
Motion
Robin Bloor, PhD
Event Management and Processing
We have gradually entered an event-
based IT world.
It brings with it new realities.
We need to consider “data in motion.”
New Realities
u  A good deal of (new) data is
now sourced from outside the
business
u  Data has to be governed
u  Provenance and lineage
matter
u  There is no perimeter
anywhere -- data access
permissions and encryption
apply everywhere
§  Time
§  Geographic location
§  Virtual/logical
location
§  Source device
§  Device ID
§  Ownership and actors
§  Data
Events and Event Data
§  Apache project from
NSA (2015)
§  Highly scalable
§  Parallel operation
§  A distributed data
flow platform
§  Point to point (pull-
push)
§  IoT
§  Apache Project from
LinkedIn (2015)
§  Highly scalable
§  Parallel operation
§  A distributed streaming
platform
§  Publish Subscribe
(push-pull)
§  Not so much IoT
NiFi v Kafka
NiFi Kafka
A View of a Coherent Data Lake
u  Data Lakes are complex -
more complex, for
example, than a data
warehouse
u  It’s becoming obvious that
streaming and data flow
are inherent to the data
lake
u  It is the primary place of
governance
u  There needs to be a
strategy for data
Secure
Transform &
Aggregate
Ingest
Extracts
Network Devices IoTMobileServers Desktops
Embedded Chips RFID The Cloud Log Files
OSes VMsESB/Messaging Software Sys Mgt Apps
Social Network DataWeb Services Data Streams
WorkflowBI & Office AppsBusiness AppsSaaS
To
Databases
Data Marts
Other Apps
Search &
Query
BI, Visual'n
& Analytics
Other
Apps
ETL
D
A
T
A
S
T
O
R
A
G
E
A
R
C
H
I
V
E
Real-Time
Apps
Metadata
MGT
Data
Cleansing
Life
Cycle
Compliance and Regulations
u  Aside from sector initiatives there
are many official regulations:
HIPAA, SOX, FISMA, FERPA, GLBA
(mainly US legislation)
u  Standards (Global): PCI-DSS, ISO/
IEC 17799 (data should be owned)
u  National regulations differ
country to country (even in
Europe)
u  GDPR being negotiated
The Challenges
It is ceasing to be possible to include
security as an afterthought.
Security needs to be designed in from
the get go.
u  How many companies doing big data projects
do you believe have security properly
organized? Is anything happening that is likely
to complicate the situation even more?
u  Security often comes with performance
penalties. What is the performance cost of
the solutions you are advocating?
u  Costs? How much budget needs to be
allocated? Can you give a feel for this?
u  Where do you tend to see NiFi and Kafka (Storm,
Flume, Flink…) being used?
u  Security needs to be integrated, so encryption
needs to shake hands with authentication. How
does HPE make this work?
u  Are there any environments/applications to
which HPE’s security technology is inapplicable:
OLTP, Data Streaming & Streaming Analytics, BI,
Mobile, Cloud, etc.…
Upcoming Topics
www.insideanalysis.com
January: ANALYTICS
February: BIG DATA
March: CLOUD
THANK YOU
for your
ATTENTION!
Some images provided courtesy of Wikimedia Commons

More Related Content

What's hot

3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
Keith Braswell
 
Big Data & Oracle Technologies
Big Data & Oracle TechnologiesBig Data & Oracle Technologies
Big Data & Oracle Technologies
Oleksii Movchaniuk
 
Enterprise Apache Hadoop: State of the Union
Enterprise Apache Hadoop: State of the UnionEnterprise Apache Hadoop: State of the Union
Enterprise Apache Hadoop: State of the Union
Hortonworks
 
Data Science at Speed. At Scale.
Data Science at Speed. At Scale.Data Science at Speed. At Scale.
Data Science at Speed. At Scale.
DataWorks Summit
 
Big Data Analytics with Hadoop
Big Data Analytics with HadoopBig Data Analytics with Hadoop
Big Data Analytics with Hadoop
Philippe Julio
 
Big Data Tech Stack
Big Data Tech StackBig Data Tech Stack
Big Data Tech Stack
Abdullah Çetin ÇAVDAR
 
Organising the Data Lake - Information Management in a Big Data World
Organising the Data Lake - Information Management in a Big Data WorldOrganising the Data Lake - Information Management in a Big Data World
Organising the Data Lake - Information Management in a Big Data World
DataWorks Summit/Hadoop Summit
 
BIG DATA
BIG DATABIG DATA
BIG DATA
Shashank Shetty
 
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
DataWorks Summit
 
RDBMS vs Hadoop vs Spark
RDBMS vs Hadoop vs SparkRDBMS vs Hadoop vs Spark
RDBMS vs Hadoop vs Spark
Laxmi8
 
Spark and Hadoop Perfect Togeher by Arun Murthy
Spark and Hadoop Perfect Togeher by Arun MurthySpark and Hadoop Perfect Togeher by Arun Murthy
Spark and Hadoop Perfect Togeher by Arun Murthy
Spark Summit
 
Open source stak of big data techs open suse asia
Open source stak of big data techs   open suse asiaOpen source stak of big data techs   open suse asia
Open source stak of big data techs open suse asia
Muhammad Rifqi
 
Voltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in HadoopVoltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in Hadoop
HPE Security - Data Security
 
Oil and gas big data edition
Oil and gas  big data editionOil and gas  big data edition
Oil and gas big data edition
Mark Kerzner
 
IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop Environment
IRJET Journal
 
Rob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoopRob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoop
Ghassan Al-Yafie
 
Continuous Data Ingestion pipeline for the Enterprise
Continuous Data Ingestion pipeline for the EnterpriseContinuous Data Ingestion pipeline for the Enterprise
Continuous Data Ingestion pipeline for the Enterprise
DataWorks Summit
 
IT @ Intel: Preparing the Future Enterprise with the Internet of Things
IT @ Intel: Preparing the Future Enterprise with the Internet of ThingsIT @ Intel: Preparing the Future Enterprise with the Internet of Things
IT @ Intel: Preparing the Future Enterprise with the Internet of Things
Intel IT Center
 
Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25
Hortonworks
 
Big Data, Hadoop, Hortonworks and Microsoft HDInsight
Big Data, Hadoop, Hortonworks and Microsoft HDInsightBig Data, Hadoop, Hortonworks and Microsoft HDInsight
Big Data, Hadoop, Hortonworks and Microsoft HDInsight
Hortonworks
 

What's hot (20)

3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 
Big Data & Oracle Technologies
Big Data & Oracle TechnologiesBig Data & Oracle Technologies
Big Data & Oracle Technologies
 
Enterprise Apache Hadoop: State of the Union
Enterprise Apache Hadoop: State of the UnionEnterprise Apache Hadoop: State of the Union
Enterprise Apache Hadoop: State of the Union
 
Data Science at Speed. At Scale.
Data Science at Speed. At Scale.Data Science at Speed. At Scale.
Data Science at Speed. At Scale.
 
Big Data Analytics with Hadoop
Big Data Analytics with HadoopBig Data Analytics with Hadoop
Big Data Analytics with Hadoop
 
Big Data Tech Stack
Big Data Tech StackBig Data Tech Stack
Big Data Tech Stack
 
Organising the Data Lake - Information Management in a Big Data World
Organising the Data Lake - Information Management in a Big Data WorldOrganising the Data Lake - Information Management in a Big Data World
Organising the Data Lake - Information Management in a Big Data World
 
BIG DATA
BIG DATABIG DATA
BIG DATA
 
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
 
RDBMS vs Hadoop vs Spark
RDBMS vs Hadoop vs SparkRDBMS vs Hadoop vs Spark
RDBMS vs Hadoop vs Spark
 
Spark and Hadoop Perfect Togeher by Arun Murthy
Spark and Hadoop Perfect Togeher by Arun MurthySpark and Hadoop Perfect Togeher by Arun Murthy
Spark and Hadoop Perfect Togeher by Arun Murthy
 
Open source stak of big data techs open suse asia
Open source stak of big data techs   open suse asiaOpen source stak of big data techs   open suse asia
Open source stak of big data techs open suse asia
 
Voltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in HadoopVoltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in Hadoop
 
Oil and gas big data edition
Oil and gas  big data editionOil and gas  big data edition
Oil and gas big data edition
 
IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop Environment
 
Rob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoopRob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoop
 
Continuous Data Ingestion pipeline for the Enterprise
Continuous Data Ingestion pipeline for the EnterpriseContinuous Data Ingestion pipeline for the Enterprise
Continuous Data Ingestion pipeline for the Enterprise
 
IT @ Intel: Preparing the Future Enterprise with the Internet of Things
IT @ Intel: Preparing the Future Enterprise with the Internet of ThingsIT @ Intel: Preparing the Future Enterprise with the Internet of Things
IT @ Intel: Preparing the Future Enterprise with the Internet of Things
 
Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25
 
Big Data, Hadoop, Hortonworks and Microsoft HDInsight
Big Data, Hadoop, Hortonworks and Microsoft HDInsightBig Data, Hadoop, Hortonworks and Microsoft HDInsight
Big Data, Hadoop, Hortonworks and Microsoft HDInsight
 

Viewers also liked

Test your taste buds
Test your taste budsTest your taste buds
Test your taste buds
kelsey-jane
 
Auto bodies
Auto bodiesAuto bodies
Auto bodies
M-droid
 
Warsztaty PR-u i komunikacji | Opinie
Warsztaty PR-u i komunikacji | OpinieWarsztaty PR-u i komunikacji | Opinie
Warsztaty PR-u i komunikacji | Opinie
sawares
 
Warsztaty Active Image | Opinie
Warsztaty Active Image | OpinieWarsztaty Active Image | Opinie
Warsztaty Active Image | Opiniesawares
 
Presentation dual inversion-index
Presentation dual inversion-indexPresentation dual inversion-index
Presentation dual inversion-index
mahi_uta
 
Arcadian Landscapes
Arcadian LandscapesArcadian Landscapes
Arcadian Landscapes
M-droid
 
See the Whole Story: The Case for a Visualization Platform
See the Whole Story: The Case for a Visualization PlatformSee the Whole Story: The Case for a Visualization Platform
See the Whole Story: The Case for a Visualization Platform
Eric Kavanagh
 
Who, What, Where and How: Why You Want to Know
 Who, What, Where and How: Why You Want to Know Who, What, Where and How: Why You Want to Know
Who, What, Where and How: Why You Want to Know
Eric Kavanagh
 
The Art of Visibility: Enabling Multi-Platform Management
The Art of Visibility: Enabling Multi-Platform ManagementThe Art of Visibility: Enabling Multi-Platform Management
The Art of Visibility: Enabling Multi-Platform Management
Eric Kavanagh
 
A Better Understanding: Solving Business Challenges with Data
A Better Understanding: Solving Business Challenges with DataA Better Understanding: Solving Business Challenges with Data
A Better Understanding: Solving Business Challenges with Data
Eric Kavanagh
 
The Key to Effective Analytics: Fast-Returning Queries
The Key to Effective Analytics: Fast-Returning QueriesThe Key to Effective Analytics: Fast-Returning Queries
The Key to Effective Analytics: Fast-Returning Queries
Eric Kavanagh
 
Extracción-de-la-muestra-_ Clase Nº 2 Hematología
Extracción-de-la-muestra-_ Clase Nº 2  Hematología Extracción-de-la-muestra-_ Clase Nº 2  Hematología
Extracción-de-la-muestra-_ Clase Nº 2 Hematología
gabriela aguilar
 
The Central Hub: Defining the Data Lake
The Central Hub: Defining the Data LakeThe Central Hub: Defining the Data Lake
The Central Hub: Defining the Data Lake
Eric Kavanagh
 
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 Mind Your Business: Why Privacy Matters to the Successful Enterprise Mind Your Business: Why Privacy Matters to the Successful Enterprise
Mind Your Business: Why Privacy Matters to the Successful Enterprise
Eric Kavanagh
 
A Tight Ship: How Containers and SDS Optimize the Enterprise
 A Tight Ship: How Containers and SDS Optimize the Enterprise A Tight Ship: How Containers and SDS Optimize the Enterprise
A Tight Ship: How Containers and SDS Optimize the Enterprise
Eric Kavanagh
 

Viewers also liked (16)

Test your taste buds
Test your taste budsTest your taste buds
Test your taste buds
 
Auto bodies
Auto bodiesAuto bodies
Auto bodies
 
Warsztaty PR-u i komunikacji | Opinie
Warsztaty PR-u i komunikacji | OpinieWarsztaty PR-u i komunikacji | Opinie
Warsztaty PR-u i komunikacji | Opinie
 
Warsztaty Active Image | Opinie
Warsztaty Active Image | OpinieWarsztaty Active Image | Opinie
Warsztaty Active Image | Opinie
 
Presentation dual inversion-index
Presentation dual inversion-indexPresentation dual inversion-index
Presentation dual inversion-index
 
Arcadian Landscapes
Arcadian LandscapesArcadian Landscapes
Arcadian Landscapes
 
See the Whole Story: The Case for a Visualization Platform
See the Whole Story: The Case for a Visualization PlatformSee the Whole Story: The Case for a Visualization Platform
See the Whole Story: The Case for a Visualization Platform
 
Who, What, Where and How: Why You Want to Know
 Who, What, Where and How: Why You Want to Know Who, What, Where and How: Why You Want to Know
Who, What, Where and How: Why You Want to Know
 
The Art of Visibility: Enabling Multi-Platform Management
The Art of Visibility: Enabling Multi-Platform ManagementThe Art of Visibility: Enabling Multi-Platform Management
The Art of Visibility: Enabling Multi-Platform Management
 
A Better Understanding: Solving Business Challenges with Data
A Better Understanding: Solving Business Challenges with DataA Better Understanding: Solving Business Challenges with Data
A Better Understanding: Solving Business Challenges with Data
 
My OS
My OSMy OS
My OS
 
The Key to Effective Analytics: Fast-Returning Queries
The Key to Effective Analytics: Fast-Returning QueriesThe Key to Effective Analytics: Fast-Returning Queries
The Key to Effective Analytics: Fast-Returning Queries
 
Extracción-de-la-muestra-_ Clase Nº 2 Hematología
Extracción-de-la-muestra-_ Clase Nº 2  Hematología Extracción-de-la-muestra-_ Clase Nº 2  Hematología
Extracción-de-la-muestra-_ Clase Nº 2 Hematología
 
The Central Hub: Defining the Data Lake
The Central Hub: Defining the Data LakeThe Central Hub: Defining the Data Lake
The Central Hub: Defining the Data Lake
 
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 Mind Your Business: Why Privacy Matters to the Successful Enterprise Mind Your Business: Why Privacy Matters to the Successful Enterprise
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 
A Tight Ship: How Containers and SDS Optimize the Enterprise
 A Tight Ship: How Containers and SDS Optimize the Enterprise A Tight Ship: How Containers and SDS Optimize the Enterprise
A Tight Ship: How Containers and SDS Optimize the Enterprise
 

Similar to Solving the Really Big Tech Problems with IoT

Big data data lake and beyond
Big data data lake and beyond Big data data lake and beyond
Big data data lake and beyond
Rajesh Kumar
 
To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security
Inside Analysis
 
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
Denodo
 
Haven 2 0
Haven 2 0 Haven 2 0
Big data processing with apache spark
Big data processing with apache sparkBig data processing with apache spark
Big data processing with apache spark
sarith divakar
 
Getting Started with Data Virtualization – What problems DV solves
Getting Started with Data Virtualization – What problems DV solvesGetting Started with Data Virtualization – What problems DV solves
Getting Started with Data Virtualization – What problems DV solves
Denodo
 
Internet of Things and Hadoop
Internet of Things and HadoopInternet of Things and Hadoop
Internet of Things and Hadoop
aziksa
 
Sycamore Quantum Computer 2019 developed.pptx
Sycamore Quantum Computer 2019 developed.pptxSycamore Quantum Computer 2019 developed.pptx
Sycamore Quantum Computer 2019 developed.pptx
shujee381
 
Deutsche Telekom on Big Data
Deutsche Telekom on Big DataDeutsche Telekom on Big Data
Deutsche Telekom on Big Data
DataWorks Summit
 
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization
Denodo
 
Bigdata and Hadoop Bootcamp
Bigdata and Hadoop BootcampBigdata and Hadoop Bootcamp
Bigdata and Hadoop Bootcamp
Spotle.ai
 
Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloud
sornalathaNatarajan
 
Introduction Big Data
Introduction Big DataIntroduction Big Data
Introduction Big Data
Frank Kienle
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
at MicroFocus Italy ❖✔
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
at MicroFocus Italy ❖✔
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
Cloudera, Inc.
 
Big Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsBig Data for Security - DNS Analytics
Big Data for Security - DNS Analytics
Marco Casassa Mont
 
Role of cloud and analytics in IoT
Role of cloud and analytics in IoTRole of cloud and analytics in IoT
Role of cloud and analytics in IoT
Selvaraj Kesavan
 
Cloud Computing & Big Data
Cloud Computing & Big DataCloud Computing & Big Data
Cloud Computing & Big Data
Mrinal Kumar
 
The Practice of Big Data - The Hadoop ecosystem explained with usage scenarios
The Practice of Big Data - The Hadoop ecosystem explained with usage scenariosThe Practice of Big Data - The Hadoop ecosystem explained with usage scenarios
The Practice of Big Data - The Hadoop ecosystem explained with usage scenarios
kcmallu
 

Similar to Solving the Really Big Tech Problems with IoT (20)

Big data data lake and beyond
Big data data lake and beyond Big data data lake and beyond
Big data data lake and beyond
 
To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security
 
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
 
Haven 2 0
Haven 2 0 Haven 2 0
Haven 2 0
 
Big data processing with apache spark
Big data processing with apache sparkBig data processing with apache spark
Big data processing with apache spark
 
Getting Started with Data Virtualization – What problems DV solves
Getting Started with Data Virtualization – What problems DV solvesGetting Started with Data Virtualization – What problems DV solves
Getting Started with Data Virtualization – What problems DV solves
 
Internet of Things and Hadoop
Internet of Things and HadoopInternet of Things and Hadoop
Internet of Things and Hadoop
 
Sycamore Quantum Computer 2019 developed.pptx
Sycamore Quantum Computer 2019 developed.pptxSycamore Quantum Computer 2019 developed.pptx
Sycamore Quantum Computer 2019 developed.pptx
 
Deutsche Telekom on Big Data
Deutsche Telekom on Big DataDeutsche Telekom on Big Data
Deutsche Telekom on Big Data
 
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization
 
Bigdata and Hadoop Bootcamp
Bigdata and Hadoop BootcampBigdata and Hadoop Bootcamp
Bigdata and Hadoop Bootcamp
 
Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloud
 
Introduction Big Data
Introduction Big DataIntroduction Big Data
Introduction Big Data
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Big Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsBig Data for Security - DNS Analytics
Big Data for Security - DNS Analytics
 
Role of cloud and analytics in IoT
Role of cloud and analytics in IoTRole of cloud and analytics in IoT
Role of cloud and analytics in IoT
 
Cloud Computing & Big Data
Cloud Computing & Big DataCloud Computing & Big Data
Cloud Computing & Big Data
 
The Practice of Big Data - The Hadoop ecosystem explained with usage scenarios
The Practice of Big Data - The Hadoop ecosystem explained with usage scenariosThe Practice of Big Data - The Hadoop ecosystem explained with usage scenarios
The Practice of Big Data - The Hadoop ecosystem explained with usage scenarios
 

More from Eric Kavanagh

The Future of Data Warehousing and Data Integration
The Future of Data Warehousing and Data IntegrationThe Future of Data Warehousing and Data Integration
The Future of Data Warehousing and Data Integration
Eric Kavanagh
 
Best Practices in DataOps: How to Create Agile, Automated Data Pipelines
Best Practices in DataOps: How to Create Agile, Automated Data PipelinesBest Practices in DataOps: How to Create Agile, Automated Data Pipelines
Best Practices in DataOps: How to Create Agile, Automated Data Pipelines
Eric Kavanagh
 
Expediting the Path to Discovery with Multi-Source Analysis
Expediting the Path to Discovery with Multi-Source AnalysisExpediting the Path to Discovery with Multi-Source Analysis
Expediting the Path to Discovery with Multi-Source Analysis
Eric Kavanagh
 
Will AI Eliminate Reports and Dashboards
Will AI Eliminate Reports and DashboardsWill AI Eliminate Reports and Dashboards
Will AI Eliminate Reports and Dashboards
Eric Kavanagh
 
Metadata Mastery: A Big Step for BI Modernization
Metadata Mastery: A Big Step for BI ModernizationMetadata Mastery: A Big Step for BI Modernization
Metadata Mastery: A Big Step for BI Modernization
Eric Kavanagh
 
Horses for Courses: Database Roundtable
Horses for Courses: Database RoundtableHorses for Courses: Database Roundtable
Horses for Courses: Database Roundtable
Eric Kavanagh
 
Database Survival Guide: Exploratory Webcast
Database Survival Guide: Exploratory WebcastDatabase Survival Guide: Exploratory Webcast
Database Survival Guide: Exploratory Webcast
Eric Kavanagh
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
Eric Kavanagh
 
The Model Enterprise: A Blueprint for Enterprise Data Governance
The Model Enterprise: A Blueprint for Enterprise Data GovernanceThe Model Enterprise: A Blueprint for Enterprise Data Governance
The Model Enterprise: A Blueprint for Enterprise Data Governance
Eric Kavanagh
 
Best Laid Plans: Saving Time, Money and Trouble with Optimal Forecasting
Best Laid Plans: Saving Time, Money and Trouble with Optimal ForecastingBest Laid Plans: Saving Time, Money and Trouble with Optimal Forecasting
Best Laid Plans: Saving Time, Money and Trouble with Optimal Forecasting
Eric Kavanagh
 
A Winning Strategy for the Digital Economy
A Winning Strategy for the Digital EconomyA Winning Strategy for the Digital Economy
A Winning Strategy for the Digital Economy
Eric Kavanagh
 
Discovering Big Data in the Fog: Why Catalogs Matter
 Discovering Big Data in the Fog: Why Catalogs Matter Discovering Big Data in the Fog: Why Catalogs Matter
Discovering Big Data in the Fog: Why Catalogs Matter
Eric Kavanagh
 
Health Check: Maintaining Enterprise BI
Health Check: Maintaining Enterprise BIHealth Check: Maintaining Enterprise BI
Health Check: Maintaining Enterprise BI
Eric Kavanagh
 
Rapid Response: Debugging and Profiling to the Rescue
Rapid Response: Debugging and Profiling to the RescueRapid Response: Debugging and Profiling to the Rescue
Rapid Response: Debugging and Profiling to the Rescue
Eric Kavanagh
 
Beyond the Platform: Enabling Fluid Analysis
Beyond the Platform: Enabling Fluid AnalysisBeyond the Platform: Enabling Fluid Analysis
Beyond the Platform: Enabling Fluid Analysis
Eric Kavanagh
 
Protect Your Database: High Availability for High Demand Data
 Protect Your Database: High Availability for High Demand Data Protect Your Database: High Availability for High Demand Data
Protect Your Database: High Availability for High Demand Data
Eric Kavanagh
 
Application Acceleration: Faster Performance for End Users
Application Acceleration: Faster Performance for End Users	Application Acceleration: Faster Performance for End Users
Application Acceleration: Faster Performance for End Users
Eric Kavanagh
 
Time's Up! Getting Value from Big Data Now
Time's Up! Getting Value from Big Data NowTime's Up! Getting Value from Big Data Now
Time's Up! Getting Value from Big Data Now
Eric Kavanagh
 
The New Normal: Dealing with the Reality of an Unsecure World
The New Normal: Dealing with the Reality of an Unsecure WorldThe New Normal: Dealing with the Reality of an Unsecure World
The New Normal: Dealing with the Reality of an Unsecure World
Eric Kavanagh
 
A Bigger Magnifying Glass: Analyzing the Internet of Things
A Bigger Magnifying Glass: Analyzing the Internet of Things	A Bigger Magnifying Glass: Analyzing the Internet of Things
A Bigger Magnifying Glass: Analyzing the Internet of Things
Eric Kavanagh
 

More from Eric Kavanagh (20)

The Future of Data Warehousing and Data Integration
The Future of Data Warehousing and Data IntegrationThe Future of Data Warehousing and Data Integration
The Future of Data Warehousing and Data Integration
 
Best Practices in DataOps: How to Create Agile, Automated Data Pipelines
Best Practices in DataOps: How to Create Agile, Automated Data PipelinesBest Practices in DataOps: How to Create Agile, Automated Data Pipelines
Best Practices in DataOps: How to Create Agile, Automated Data Pipelines
 
Expediting the Path to Discovery with Multi-Source Analysis
Expediting the Path to Discovery with Multi-Source AnalysisExpediting the Path to Discovery with Multi-Source Analysis
Expediting the Path to Discovery with Multi-Source Analysis
 
Will AI Eliminate Reports and Dashboards
Will AI Eliminate Reports and DashboardsWill AI Eliminate Reports and Dashboards
Will AI Eliminate Reports and Dashboards
 
Metadata Mastery: A Big Step for BI Modernization
Metadata Mastery: A Big Step for BI ModernizationMetadata Mastery: A Big Step for BI Modernization
Metadata Mastery: A Big Step for BI Modernization
 
Horses for Courses: Database Roundtable
Horses for Courses: Database RoundtableHorses for Courses: Database Roundtable
Horses for Courses: Database Roundtable
 
Database Survival Guide: Exploratory Webcast
Database Survival Guide: Exploratory WebcastDatabase Survival Guide: Exploratory Webcast
Database Survival Guide: Exploratory Webcast
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
The Model Enterprise: A Blueprint for Enterprise Data Governance
The Model Enterprise: A Blueprint for Enterprise Data GovernanceThe Model Enterprise: A Blueprint for Enterprise Data Governance
The Model Enterprise: A Blueprint for Enterprise Data Governance
 
Best Laid Plans: Saving Time, Money and Trouble with Optimal Forecasting
Best Laid Plans: Saving Time, Money and Trouble with Optimal ForecastingBest Laid Plans: Saving Time, Money and Trouble with Optimal Forecasting
Best Laid Plans: Saving Time, Money and Trouble with Optimal Forecasting
 
A Winning Strategy for the Digital Economy
A Winning Strategy for the Digital EconomyA Winning Strategy for the Digital Economy
A Winning Strategy for the Digital Economy
 
Discovering Big Data in the Fog: Why Catalogs Matter
 Discovering Big Data in the Fog: Why Catalogs Matter Discovering Big Data in the Fog: Why Catalogs Matter
Discovering Big Data in the Fog: Why Catalogs Matter
 
Health Check: Maintaining Enterprise BI
Health Check: Maintaining Enterprise BIHealth Check: Maintaining Enterprise BI
Health Check: Maintaining Enterprise BI
 
Rapid Response: Debugging and Profiling to the Rescue
Rapid Response: Debugging and Profiling to the RescueRapid Response: Debugging and Profiling to the Rescue
Rapid Response: Debugging and Profiling to the Rescue
 
Beyond the Platform: Enabling Fluid Analysis
Beyond the Platform: Enabling Fluid AnalysisBeyond the Platform: Enabling Fluid Analysis
Beyond the Platform: Enabling Fluid Analysis
 
Protect Your Database: High Availability for High Demand Data
 Protect Your Database: High Availability for High Demand Data Protect Your Database: High Availability for High Demand Data
Protect Your Database: High Availability for High Demand Data
 
Application Acceleration: Faster Performance for End Users
Application Acceleration: Faster Performance for End Users	Application Acceleration: Faster Performance for End Users
Application Acceleration: Faster Performance for End Users
 
Time's Up! Getting Value from Big Data Now
Time's Up! Getting Value from Big Data NowTime's Up! Getting Value from Big Data Now
Time's Up! Getting Value from Big Data Now
 
The New Normal: Dealing with the Reality of an Unsecure World
The New Normal: Dealing with the Reality of an Unsecure WorldThe New Normal: Dealing with the Reality of an Unsecure World
The New Normal: Dealing with the Reality of an Unsecure World
 
A Bigger Magnifying Glass: Analyzing the Internet of Things
A Bigger Magnifying Glass: Analyzing the Internet of Things	A Bigger Magnifying Glass: Analyzing the Internet of Things
A Bigger Magnifying Glass: Analyzing the Internet of Things
 

Recently uploaded

Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
ScyllaDB
 
Tracking Millions of Heartbeats on Zee's OTT Platform
Tracking Millions of Heartbeats on Zee's OTT PlatformTracking Millions of Heartbeats on Zee's OTT Platform
Tracking Millions of Heartbeats on Zee's OTT Platform
ScyllaDB
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
anilsa9823
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
Larry Smarr
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
An Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise IntegrationAn Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise Integration
Safe Software
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
ScyllaDB Kubernetes Operator Goes Global
ScyllaDB Kubernetes Operator Goes GlobalScyllaDB Kubernetes Operator Goes Global
ScyllaDB Kubernetes Operator Goes Global
ScyllaDB
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
dipikamodels1
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 

Recently uploaded (20)

Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
 
Tracking Millions of Heartbeats on Zee's OTT Platform
Tracking Millions of Heartbeats on Zee's OTT PlatformTracking Millions of Heartbeats on Zee's OTT Platform
Tracking Millions of Heartbeats on Zee's OTT Platform
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
Call Girls Chennai ☎️ +91-7426014248 😍 Chennai Call Girl Beauty Girls Chennai...
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
From NCSA to the National Research Platform
From NCSA to the National Research PlatformFrom NCSA to the National Research Platform
From NCSA to the National Research Platform
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
An Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise IntegrationAn Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise Integration
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
ScyllaDB Kubernetes Operator Goes Global
ScyllaDB Kubernetes Operator Goes GlobalScyllaDB Kubernetes Operator Goes Global
ScyllaDB Kubernetes Operator Goes Global
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
Call Girls Kochi 💯Call Us 🔝 7426014248 🔝 Independent Kochi Escorts Service Av...
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 

Solving the Really Big Tech Problems with IoT

  • 1. Grab some coffee and enjoy the pre-show banter before the top of the hour! !
  • 2. The Briefing Room Solving the Really Big Tech Problems with IoT
  • 4. u  Reveal the essential characteristics of enterprise software, good and bad u  Provide a forum for detailed analysis of today s innovative technologies u  Give vendors a chance to explain their product to savvy analysts u  Allow audience members to pose serious questions…and get answers! Mission
  • 6. The Rosetta Stone u  MapReduce wasn’t enough u  Spark is awesome, but still… u  Kafka changed the game u  NiFi is the capstone for Hadoop!
  • 7. Analyst Robin Bloor is Chief Analyst at The Bloor Group robin.bloor@bloorgroup.com @robinbloor
  • 8. HPE Security u  HPE offers comprehensive data security and privacy solutions for big data, the cloud and the Internet of Things u  Its solution features data encryption, tokenization and key management u  HPE partnered with Hortonworks to enhance its DataFlow solution (powered by Apache NiFi) with data protection
  • 9. Guest Reiner Kappenberger, Global Product Management, Big Data HPE Security – Data Security Reiner Kappenberger has over 20 years of computer software industry experience focusing on encryption and security for Big Data environments. His background ranges from Device management in the telecommunications sector to GIS and database systems. He holds a Diploma from the FH Regensburg, Germany in computer science.
  • 10. Solving the Really Big Tech Problems with IoT HPE Security – Data Security January 17, 2017
  • 11. 2 HPE Security - Data Security We protect the world’s most sensitive data –  Protect the world’s largest brands & neutralize breach impact by securing sensitive data-at-rest, in-use and in-motion. –  Over 80 patents & 51 years of expertise Our Solutions –  Provide advanced encryption, tokenization & key management Market leadership –  Data-centric security solutions used by eight of the top ten U.S. payment processors, nine of the top ten U.S. banks. –  Thousands of enterprise customers across all industries including transportation, retail, financial services, payment processing, banking, insurance, high tech, healthcare, energy, telecom & public sector. –  Email solution used by millions of users and thousands of enterprise & mid- sized businesses including healthcare organizations, regional banks & insurance providers. –  Contribute technology to multiple standards organizations.
  • 12. Why is securing Hadoop difficult? Rapid innovation in a well funded open source community Multiple feeds of data in real time from different sources with different protection needs Mainframe MQ RDBMs XML Salesforce Flat Files Multiple types of data combined in a Hadoop “Data Lake” 3
  • 13. Why is securing Hadoop difficult? 4 Reduced control if Hadoop clusters are deployed in a cloud environment Automatic replication of data across multiple nodes once entered into the HDFS data store Access by many different users with varying analytic needs
  • 14. Introducing “Data-centric” security 5 Traditional IT Infrastructure Security Disk encryption Database encryption SSL/TLS/firewalls Authentication Management Threats to Data Malware, Insiders SQL injection, Malware Traffic Interceptors Malware, Insiders Credential Compromise Security Gaps HPE SecureData Data-centric Security SSL/TLS/firewalls Datasecuritycoverage End-to-endProtection Data Ecosystem Storage File systems Databases Data and applications Security gap Security gap Security gap Security gap Middleware
  • 15. HPE Format-Preserving Encryption (FPE) 6 – Supports data of any format: name, address, dates, numbers, etc. – Preserves referential integrity – Only applications that need the original value need change – Used for production protection and data masking – NIST-standard using FF1 AES Encryption AES - CBC AES - FPE 253- 67-2356 8juYE%Uks&dDFa2345^WFLERG First Name: Uywjlqo Last Name: Muwruwwbp SSN: 253- 67-2356 DOB: 18-06-1972 Ija&3k24kQotugDF2390^32 0OWioNu2(*872weW Oiuqwriuweuwr%oIUOw1@ First Name: Gunther Last Name: Robertson SSN: 934-72-2356 DOB: 20-07-1966 Tax ID 934-72-2356
  • 16. Hyper Secure Stateless Tokenization (SST) Credit Card 4171 5678 8765 4321 – Tokenization for PCI scope reduction – Replaces token database with a smaller token mapping table – Token values mapped using random numbers – Lower costs − No database hardware, software, replication problems, etc. – Hyper SST technology is architected to leverage the latest compute-platform advances 7 SST 8736 5533 4678 9453 Partial SST 4171 5633 4678 4321 Obvious SST 4171 56AZ UYTZ 4321 BIN Mapping 1236 5533 4678 4321
  • 17. Granular Policy Managed by HPE SecureData – A policy consists of Data Formats, Protection, and Data Access Rules 8 Data Format Name – Field or Object Type Alphabets, Formats Logic Rules – Meaning Preservation Rules Protection Method Authentication Policy FPE SST IBSE Dynamic Masking Policy Mask Type, Mask System Auth Key Rotation Policy for Encryption, Caching Policy Authorization Groups, Roles – No Access, Access, Masked Access App Auth App Permissions – Encrypt, Tokenization, Detokenize, Decrypt Note: Some features vary by platform, use of LDAP, IAM, IDM LDAP, Groups PKI, Secret, IP ranges, custom adapters/Java
  • 18. Securing Sensitive Data in Big Data Platforms and Hadoop 9 Public data Big Data Platform Teradata, Vertica, Hadoop Sqoop Hive UDFs Map Reduce “Landing zone” TDE SQL Spark Sensor Data Power user re- identifies data BI tools work on protected data Business processes use protected data Laptop log files Server log files Any data Source Flume NiFi Storm Kafka
  • 19. 60 Data Sources 20 Million records per day = 1TB 250 Nodes LDAP Sensitive structured sources Hadoop Cluster Sqoop Flume Storm Hive UDFs Map Reduce Staging Area HPE SecureData File Processor Teradata EDW UDFs Data Virtualization layer Tableau Analytics & Data Science HPE SecureData Key Servers & WS API’s Leading Telecoms Provider – Big Data Primary Data Flow Data Cleansing 22
  • 20. Threats in the IoT Space 11 Public data Sqoop Hive UDFs Map Reduce “Landing zone” TDE SQL Spark Sensor Data Power user re- identifies data BI tools work on protected data Business processes use protected data Laptop log files Server log files Any data Source Flume NiFi Storm Kafka Back-end infrastructure
  • 21. Leading car manufacturer – Big Data primary data flow 12 Sensitive structured data Hadoop Edge Nodes HPE SecureData Hadoop Tools Hadoop Cluster Data Warehouse Sensitive structured sources Cognos Analytics & Data Science HPE SecureData Key Servers & WS API’s ~2 Billion real time transactions/day Other real-time data feeds – customer data from dealerships, manufacturers Sqoop Hive UDFs Map Reduces “Landing zone” “Integration Controls” Flume real time ingest Existing data sets and 3rd party data, e.g.. accident data UDFs IBM DataStage
  • 24. The Nature of Data in Motion Robin Bloor, PhD
  • 25. Event Management and Processing We have gradually entered an event- based IT world. It brings with it new realities. We need to consider “data in motion.”
  • 26. New Realities u  A good deal of (new) data is now sourced from outside the business u  Data has to be governed u  Provenance and lineage matter u  There is no perimeter anywhere -- data access permissions and encryption apply everywhere
  • 27. §  Time §  Geographic location §  Virtual/logical location §  Source device §  Device ID §  Ownership and actors §  Data Events and Event Data
  • 28. §  Apache project from NSA (2015) §  Highly scalable §  Parallel operation §  A distributed data flow platform §  Point to point (pull- push) §  IoT §  Apache Project from LinkedIn (2015) §  Highly scalable §  Parallel operation §  A distributed streaming platform §  Publish Subscribe (push-pull) §  Not so much IoT NiFi v Kafka NiFi Kafka
  • 29. A View of a Coherent Data Lake u  Data Lakes are complex - more complex, for example, than a data warehouse u  It’s becoming obvious that streaming and data flow are inherent to the data lake u  It is the primary place of governance u  There needs to be a strategy for data Secure Transform & Aggregate Ingest Extracts Network Devices IoTMobileServers Desktops Embedded Chips RFID The Cloud Log Files OSes VMsESB/Messaging Software Sys Mgt Apps Social Network DataWeb Services Data Streams WorkflowBI & Office AppsBusiness AppsSaaS To Databases Data Marts Other Apps Search & Query BI, Visual'n & Analytics Other Apps ETL D A T A S T O R A G E A R C H I V E Real-Time Apps Metadata MGT Data Cleansing Life Cycle
  • 30. Compliance and Regulations u  Aside from sector initiatives there are many official regulations: HIPAA, SOX, FISMA, FERPA, GLBA (mainly US legislation) u  Standards (Global): PCI-DSS, ISO/ IEC 17799 (data should be owned) u  National regulations differ country to country (even in Europe) u  GDPR being negotiated
  • 31. The Challenges It is ceasing to be possible to include security as an afterthought. Security needs to be designed in from the get go.
  • 32. u  How many companies doing big data projects do you believe have security properly organized? Is anything happening that is likely to complicate the situation even more? u  Security often comes with performance penalties. What is the performance cost of the solutions you are advocating? u  Costs? How much budget needs to be allocated? Can you give a feel for this?
  • 33. u  Where do you tend to see NiFi and Kafka (Storm, Flume, Flink…) being used? u  Security needs to be integrated, so encryption needs to shake hands with authentication. How does HPE make this work? u  Are there any environments/applications to which HPE’s security technology is inapplicable: OLTP, Data Streaming & Streaming Analytics, BI, Mobile, Cloud, etc.…
  • 34.
  • 36. THANK YOU for your ATTENTION! Some images provided courtesy of Wikimedia Commons
  翻译: