SlideShare a Scribd company logo
Redefining
Security for
Big Data
Joey Jablonski
Product Management
Dell, Inc.
linkedin.com/in/joeyjablonski
@jrjablo
jrjablo@gmail.com
The Problem Today
Movement, Analysis, Presentation
Security Magic
Security
context needs
to be sent with
the data
Identities
need to be
consistent
Data + Data
has to be
managed
Public Data Public Data Restricted
Data

More Related Content

PPTX
Cybersecurity1
PDF
Case study: ISO 27001 Certification Readiness - Happiest Minds
PDF
Case study: Managed Services for Network and Security Devices - Happiest Minds
PDF
Data-Ed Online: How Safe is Your Data? Data Security
PDF
Data Governance, understand what you already know (IBM Global Business Services)
PDF
8 Experts on Flawless App Delivery
PDF
Starting data governance
PPTX
Technologies and Innovation – Ethics
Cybersecurity1
Case study: ISO 27001 Certification Readiness - Happiest Minds
Case study: Managed Services for Network and Security Devices - Happiest Minds
Data-Ed Online: How Safe is Your Data? Data Security
Data Governance, understand what you already know (IBM Global Business Services)
8 Experts on Flawless App Delivery
Starting data governance
Technologies and Innovation – Ethics

More from Joey Jablonski (9)

PDF
PCA26 - Product Management in IT
PPTX
Feeding 10 Billion People with Cloud-Scale Compute and Analytics
PDF
Security for Big Data
PDF
Big Data for Security
PDF
Virtualized Hadoop
PPT
SNIA 2012 - Creating an Enterprise Hadoop Platform
PDF
Hadoop Business Cases
PDF
Hadoop in the Enterprise
PDF
Introduction to Hadoop
PCA26 - Product Management in IT
Feeding 10 Billion People with Cloud-Scale Compute and Analytics
Security for Big Data
Big Data for Security
Virtualized Hadoop
SNIA 2012 - Creating an Enterprise Hadoop Platform
Hadoop Business Cases
Hadoop in the Enterprise
Introduction to Hadoop
Ad

Redefining Security for Big Data - Cassandra Summit 2013

Editor's Notes

  • #3: Todays security environment for Big Data has several characteristics:Grown organicallyLimited consistency in authentication, authorization and auditingEvery time data is migrated, ACLs and context is lostData can easily be combined in ways never expected
  • #4: The solution to the growing challenge has three components:Security context needs to be sent with the data – When ETL or ELT operations move data between environments, the context and permissions should be sent with the data, in a standard format to allow other applications to enforce policies already in placeIdentities need to be consistent for both access and auditing of dataData needs to be managed to ensure that if combined with other silos, access and policies are enforced with the newly combined data which could have alternate policies for access and control