SlideShare a Scribd company logo
Grab some
coffee and
enjoy the
pre-­show
banter
before the
top of the
hour!
The Briefing Room
To Serve and Protect: Making Sense of Hadoop Security
Twitter Tag: #briefr The Briefing Room
Welcome
Host:
Eric Kavanagh
eric.kavanagh@bloorgroup.com
@eric_kavanagh
Twitter Tag: #briefr The Briefing Room
  Reveal the essential characteristics of enterprise
software, good and bad
  Provide a forum for detailed analysis of today s innovative
technologies
  Give vendors a chance to explain their product to savvy
analysts
  Allow audience members to pose serious questions... and
get answers!
Mission
Twitter Tag: #briefr The Briefing Room
Topics
September: HADOOP 2.0
October: DATA MANAGEMENT
November: ANALYTICS
Twitter Tag: #briefr The Briefing Room
Twitter Tag: #briefr The Briefing Room
Analyst: Robin Bloor
Robin Bloor is
Chief Analyst at
The Bloor Group
robin.bloor@bloorgroup.com
@robinbloor
Twitter Tag: #briefr The Briefing Room
HP Security Voltage
  HP recently acquired Voltage Security (now HP Security
Voltage) to expand its data security solutions for big data
and the cloud
  HP Security Voltage provides data and email protection
  Its security product features data encryption, tokenization
and key management over structured and unstructured
data, including data in Hadoop
Twitter Tag: #briefr The Briefing Room
Guest: Sudeep Venkatesh
Sudeep Venkatesh is a noted expert in data
protection solutions, bringing over a decade of
industry and technology experience in this area to
HP Security Voltage. His expertise spans data
protection, security infrastructures, cloud
security, identity and access management,
encryption, and the PCI standards both for the
commercial and government sectors. He has
worked on numerous global security projects with
Fortune 500 firms in the United States and
globally. At HP Security Voltage, Sudeep serves in
the position of Vice President of Solution
Architecture, with responsibility over designing
solutions for some of HP Security Voltage's largest
customers in the end-to-end data protection
portfolio. This includes email, file and document
encryption, as well as the protection of sensitive
data in databases, applications and payments
systems.
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.© Copyright 2015Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP
Restricted
HP Security
Voltage
Data-Centric Security & Encryption Solutions
Sudeep Venkatesh
September 22, 2015
Monetization
Data Sold on Black Market
Research Potential Targets
Research Infiltration
Phishing Attack and Malware
Discovery
Mapping Breached Environment
Capture
Obtain data
Attack Life Cycle
Exfiltration/Damage
Exfiltrate/Destroy Stolen Data
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Why is Securing Hadoop Difficult?
• Multiple sources of data from multiple
enterprise systems, and real-time feeds
with varying (or unknown) protection
requirements
• Rapid innovation in a well-funded
open-source developer community
• Multiple types of data combined
together in the Hadoop “data lake”
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Why is Securing Hadoop Difficult?
• Automatic replication of data across
multiple nodes once entered into the
HDFS data store
• Access by many different users with
varying analytic needs
• Reduced control if Hadoop clusters are
deployed in a cloud environment
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Existing Ways to Secure Hadoop
•  Existing IT security
− Network firewalls
− Logging and monitoring
− Configuration management
Need to augment these with “data-centric” protection of data in use,
in motion and at rest
•  Enterprise-scale security for Apache Hadoop
− Apache Knox: Perimeter security
− Kerberos: Strong authentication
− Apache Ranger: Monitoring and Management
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
What is Data-Centric Protection?
Storage
File Systems
Databases
Data & Applications
Traditional IT
Infrastructure Security
Disk Encryption
Database Encryption
SSL/TLS/Firewalls
Security Gap
Security Gap
Security Gap
Security Gap
SSL/TLS/Firewalls
Authentication
Management
Middleware
Threats to
Data
Malware,
Insiders
SQL Injection,
Malware
Traffic
Interceptors
Malware,
Insiders
Credential
Compromise
Data
Ecosystem
DataSecurityCoverage
Security
Gaps
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
What Kind of Protection Closes the Security Gap?
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
End-to-End Sensitive Data Protection at Rest, in Motion, and in
Use
Storage
File Systems
Databases
Data & Applications
Traditional IT
Infrastructure Security
Disk Encryption
Database Encryption
SSL/TLS/Firewalls
Security Gap
Security Gap
Security Gap
Security Gap
SSL/TLS/Firewalls
Authentication
Management
Middleware
Threats to
Data
Malware,
Insiders
SQL Injection,
Malware
Traffic
Interceptors
Malware,
Insiders
Credential
Compromis
e
Data
Ecosystem
DataSecurityCoverage
Security
Gaps
HP Security Voltage
Data-centric Security
End-to-end
DataProtection
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
How to Protect Your Data
Credit Card
1234 5678 8765
4321
SSN
934-72-2356
Email
bob@voltage.com
DOB
31-07-1966
AES
FIWUYBw3Oiuqwri
uweuwr
%oIUOw1DF^
8juYE
%Uks&dDFa2
345^WFLERG
lja&3k24kQotugD
F2390^32
OOWioNu2(*872
weWOiuqwriuwe
uwr%oIUOw1@
3k24kQotugDF
2390^320OW
%i
Full 8736 5533 4678
9453
347-98-8309 hry@ghohawd.jiw 20-05-1972
Partial 1234 5681 5310
4321
634-34-2356 hry@ghohawd.jiw 20-05-1972
Obvious 8736 5533 4678
9453
347-98-8309 hry@ghohawd.jiw 20-05-1972
Field Level, Format-Preserving, Reversible Data De-Identification
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Solution
Use Case: Global Financial Services Company
•  Customer is rapidly moving to adopt open source
storage and data analysis platforms
•  Use cases: Fraud detection, marketing (360
degree view of what the customer is doing, to
provide more relevant marketing), creating data
sets or reports to sell or provide to other
companies, financial modeling
•  Invested in multiple data warehouse and big data
platforms
•  Using complex ETL tools to import data into
Hadoop from sources including mainframe,
distributed databases, flat files, etc.
•  Protection in Hadoop is the first step in an
enterprise wide data protection strategy
Need
•  Protect sensitive PCI and PII data as it is being
imported into Hadoop. Fields protected include
PAN, Bank Account, SSN, Address, City, Zip
Code, Date of Birth
•  HP Secure Stateless Tokenization (SST) offers
PCI audit scope reduction for the Hadoop
environment
•  Central key and policy management
infrastructure can scale enterprise wide to
mainframe and distributed platforms
•  Data can be protected at ingestion through
integration with Sqoop and MapReduce
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Solution
•  Better health analysis to customers: One of their
use cases for Hadoop is to provide better analysis
of health status to customers on their web site
•  Catch prescription fraud: Fraudsters collect
prescriptions from 5-6 doctors and get them filled
by 5-6 pharmacies. The manual process takes
several weeks to track. Hadoop will enable them to
do this almost instantly
•  Reverse claim overpayment: Often times claims
are overpaid based on errors and mistakes. They
hope to catch this as it happens with Hadoop
•  Developer hackathons: Open the system up to
their Hadoop developers as a sandbox, enabling
innovation, discovery and competitive advantage –
without risk
Use Case: Health Care Insurance Company
Need
•  Utilized the massive un-tapped data sets for
analysis that were hampered by compliance
and risk
•  Integrated HP SecureData in Sqoop so data is
de-identified as it is copied from databases
•  Ability to initially scale to 1000 Hadoop nodes
•  Currently investigating the use of HP
SecureData enterprise wide for open systems
and mainframe platforms
•  Enabling innovation through data access
without risk with HIPAA/HITECH regulated
data sets
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Use Case : Global Telecommunications Leader
Protecting PII Throughout Large Scale Legacy and New Applications
•  Protect 26 data types
constituting PII, 500 Apps,
mainframe, Teradata,
Windows, Unix
•  Secure data types
regardless of platform
•  Support wide variety of
platforms including
mainframe, open systems
and big data platforms
•  Reduce costs of having to
protect data in each app
and each database
Need
•  HP SecureData with HP
Format-Preserving
Encryption applied to
hundreds of apps and
databases
•  Preservation of data
formats and relationships
•  Native support for z/OS,
Teradata, Hadoop and
Open Systems
Solution
•  Created SaaS, leveraged
company-wide
•  Protected 26 data types in
over 700 applications
•  Solution management
required less than 1 FTE
Results
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Security Voltage, a
Leader in Data-Centric Security
safeguarding data throughout its entire
lifecycle –
at rest, in motion, in use – across big data,
cloud,
on-premise and mobile environments with
continuous protection
www.voltage.com/hadoop
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Questions?
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Thank you
Twitter Tag: #briefr The Briefing Room
Perceptions & Questions
Analyst:
Robin Bloor
Securing
Hadoop
Robin Bloor, PhD
The Sorry Truth
Security was never engineered into
IT systems
It was always an afterthought
So it is with Hadoop
Windows of Opportunity…
u  The “security surface”
that needs protection is
always growing
u  Security solutions tend to
be fragmented
u  The value targets are
health and credit card data
u  Big data is just another
opportunity for the cyber
thief – only bigger
Hadoop Staging
Hadoop In Use
Hadoop Security
u  Hadoop presents a wide
area of vulnerability
u  Role-based access is
required (for self-service)
u  Encryption is probably a
necessity
u  Format-preserving
encryption is preferable
The Net Net
IT security is STRATEGIC
Encryption is a primary plank of this
u  How “inconvenient” is HP Voltage Security?
Please describe an implementation.
What does the user experience?
u  Security often comes with performance
penalties. What is the performance cost of HP
Security Voltage?
u  Security needs to be integrated, so encryption
needs to shake hands with authentication.
How does this work with HP Voltage?
u  Costs?
u  Are there any environments to which HP Security
Voltage’s technology is inapplicable:
OLTP, Data Streaming & Streaming Analytics, BI,
Mobile, Cloud,…
u  Which platforms/environments are supported?
u  Which other security vendors/technologies does
HP partner with for data center solutions?
Twitter Tag: #briefr The Briefing Room
Twitter Tag: #briefr The Briefing Room
Upcoming Topics
www.insideanalysis.com
September: HADOOP 2.0
October: DATA MANAGEMENT
November: ANALYTICS
Twitter Tag: #briefr The Briefing Room
THANK YOU
for your
ATTENTION!
Some images provided courtesy of Wikimedia Commons

More Related Content

PDF
Pivotal Digital Transformation Forum: Data Science
PPTX
Perspectives on Ethical Big Data Governance
PDF
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
PDF
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
PPTX
Intel boubker el mouttahid
PPSX
Reddix Group - Quantum AI - Presentation
PPTX
Ciso round table on effective implementation of dlp & data security
PDF
Security and privacy of cloud data: what you need to know (Interop)
Pivotal Digital Transformation Forum: Data Science
Perspectives on Ethical Big Data Governance
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
Intel boubker el mouttahid
Reddix Group - Quantum AI - Presentation
Ciso round table on effective implementation of dlp & data security
Security and privacy of cloud data: what you need to know (Interop)

What's hot (20)

PDF
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
PDF
Best Practices for Implementing Data Loss Prevention (DLP)
PPTX
Interoperability and the Internet of Things – To standardize or not to standa...
PDF
All Together Now: Connected Analytics for the Internet of Everything
PDF
MT81 Keys to Successful Enterprise IoT Initiatives
PDF
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
PPTX
4 ways to cut your e discovery costs in half-webinar-exterro-druva
PPTX
Big data security
PPTX
Optimizing Regulatory Compliance with Big Data
PPTX
PDF
2. Enterprise and Business Architecture Cloud Video Data
PDF
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
PDF
MT85 Challenges at the Edge: Dell Edge Gateways
PPT
Big datacamp june14_alex_liu
PPTX
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
PDF
Predictive Analytics at the Speed of Business
PDF
HP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
PPTX
Foundational Strategies for Trusted Data: Getting Your Data to the Cloud
PDF
Cloud Services & the Development of ISO/IEC 27018
PPT
Robert Lecklin - BigData is making a difference
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Best Practices for Implementing Data Loss Prevention (DLP)
Interoperability and the Internet of Things – To standardize or not to standa...
All Together Now: Connected Analytics for the Internet of Everything
MT81 Keys to Successful Enterprise IoT Initiatives
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
4 ways to cut your e discovery costs in half-webinar-exterro-druva
Big data security
Optimizing Regulatory Compliance with Big Data
2. Enterprise and Business Architecture Cloud Video Data
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
MT85 Challenges at the Edge: Dell Edge Gateways
Big datacamp june14_alex_liu
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
Predictive Analytics at the Speed of Business
HP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
Foundational Strategies for Trusted Data: Getting Your Data to the Cloud
Cloud Services & the Development of ISO/IEC 27018
Robert Lecklin - BigData is making a difference
Ad

Viewers also liked (20)

PPTX
Generating Insight from Big Data in Energy and the Environment
PDF
Real time big data analytical architecture for remote sensing application
PPT
Big Data, Security Intelligence, (And Why I Hate This Title)
PPTX
Hdp security overview
PDF
Building Hadoop Data Applications with Kite by Tom White
PPTX
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...
PPTX
Hadoop and Data Access Security
DOCX
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION
PDF
Big Data: Opportunities, Strategy and Challenges
PPTX
BigDataEurope - Big Data & Energy
PPTX
Kerberos, Token and Hadoop
PPTX
Building hadoop based big data environment
PPTX
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
PDF
Smart Analytics For The Utility Sector
PDF
Open-BDA - Big Data Hadoop Developer Training 10th & 11th June
PPTX
Big Data, Big Content, and Aligning Your Storage Strategy
PPTX
Hadoop security
PDF
Demystify big data data science
PPT
Mr. satish kumar, schnieder electric
Generating Insight from Big Data in Energy and the Environment
Real time big data analytical architecture for remote sensing application
Big Data, Security Intelligence, (And Why I Hate This Title)
Hdp security overview
Building Hadoop Data Applications with Kite by Tom White
MATATABI: Cyber Threat Analysis and Defense Platform using Huge Amount of Dat...
Hadoop and Data Access Security
REAL-TIME BIG DATA ANALYTICAL ARCHITECTURE FOR REMOTE SENSING APPLICATION
Big Data: Opportunities, Strategy and Challenges
BigDataEurope - Big Data & Energy
Kerberos, Token and Hadoop
Building hadoop based big data environment
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Smart Analytics For The Utility Sector
Open-BDA - Big Data Hadoop Developer Training 10th & 11th June
Big Data, Big Content, and Aligning Your Storage Strategy
Hadoop security
Demystify big data data science
Mr. satish kumar, schnieder electric
Ad

Similar to To Serve and Protect: Making Sense of Hadoop Security (20)

PDF
Hortonworks and Voltage Security webinar
PDF
Voltage Security, Protecting Sensitive Data in Hadoop
PDF
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
PPTX
Hadoop and Big Data Security
PDF
Protecting your data against cyber attacks in big data environments
PDF
Protecting your data against cyber attacks in big data environments
PDF
Isaca journal - bridging the gap between access and security in big data...
PPTX
New york oracle users group 2013 spring general meeting ulf mattsson
PDF
Solving the Really Big Tech Problems with IoT
PPTX
HPE Security Keynote from Istanbul 20th Jan 2016
PDF
Five steps to secure big data
PPTX
Hadoop: Making it work for the Business Unit
PDF
Dataguise hortonworks insurance_feb25
PDF
Isaca new delhi india privacy and big data
PPTX
HP Software Performance Tour 2014 - Guarding against the Data Breach
PDF
Data Breaches: The Untold Story
PDF
Hortonworks Protegrity Webinar: Leverage Security in Hadoop Without Sacrifici...
PDF
Meetup presenation 06192013
PDF
Five_Big_Data_Security_Pitfalls
PPTX
Big data in term of security measure
Hortonworks and Voltage Security webinar
Voltage Security, Protecting Sensitive Data in Hadoop
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Hadoop and Big Data Security
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
Isaca journal - bridging the gap between access and security in big data...
New york oracle users group 2013 spring general meeting ulf mattsson
Solving the Really Big Tech Problems with IoT
HPE Security Keynote from Istanbul 20th Jan 2016
Five steps to secure big data
Hadoop: Making it work for the Business Unit
Dataguise hortonworks insurance_feb25
Isaca new delhi india privacy and big data
HP Software Performance Tour 2014 - Guarding against the Data Breach
Data Breaches: The Untold Story
Hortonworks Protegrity Webinar: Leverage Security in Hadoop Without Sacrifici...
Meetup presenation 06192013
Five_Big_Data_Security_Pitfalls
Big data in term of security measure

More from Inside Analysis (20)

PDF
An Ounce of Prevention: Forging Healthy BI
PDF
Agile, Automated, Aware: How to Model for Success
PDF
First in Class: Optimizing the Data Lake for Tighter Integration
PDF
Fit For Purpose: Preventing a Big Data Letdown
PDF
The Hadoop Guarantee: Keeping Analytics Running On Time
PDF
Introducing: A Complete Algebra of Data
PDF
The Role of Data Wrangling in Driving Hadoop Adoption
PDF
Ahead of the Stream: How to Future-Proof Real-Time Analytics
PDF
Goodbye, Bottlenecks: How Scale-Out and In-Memory Solve ETL
PDF
The Biggest Picture: Situational Awareness on a Global Level
PDF
Structurally Sound: How to Tame Your Architecture
PDF
SQL In Hadoop: Big Data Innovation Without the Risk
PDF
The Perfect Fit: Scalable Graph for Big Data
PDF
A Revolutionary Approach to Modernizing the Data Warehouse
PDF
The Maturity Model: Taking the Growing Pains Out of Hadoop
PDF
Rethinking Data Availability and Governance in a Mobile World
PDF
DisrupTech - Dave Duggal
PPTX
Modus Operandi
PPTX
Phasic Systems - Dr. Geoffrey Malafsky
PPT
Red Hat - Sarangan Rangachari
An Ounce of Prevention: Forging Healthy BI
Agile, Automated, Aware: How to Model for Success
First in Class: Optimizing the Data Lake for Tighter Integration
Fit For Purpose: Preventing a Big Data Letdown
The Hadoop Guarantee: Keeping Analytics Running On Time
Introducing: A Complete Algebra of Data
The Role of Data Wrangling in Driving Hadoop Adoption
Ahead of the Stream: How to Future-Proof Real-Time Analytics
Goodbye, Bottlenecks: How Scale-Out and In-Memory Solve ETL
The Biggest Picture: Situational Awareness on a Global Level
Structurally Sound: How to Tame Your Architecture
SQL In Hadoop: Big Data Innovation Without the Risk
The Perfect Fit: Scalable Graph for Big Data
A Revolutionary Approach to Modernizing the Data Warehouse
The Maturity Model: Taking the Growing Pains Out of Hadoop
Rethinking Data Availability and Governance in a Mobile World
DisrupTech - Dave Duggal
Modus Operandi
Phasic Systems - Dr. Geoffrey Malafsky
Red Hat - Sarangan Rangachari

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Cloud computing and distributed systems.
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Big Data Technologies - Introduction.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
cuic standard and advanced reporting.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Empathic Computing: Creating Shared Understanding
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Approach and Philosophy of On baking technology
PDF
Electronic commerce courselecture one. Pdf
NewMind AI Weekly Chronicles - August'25 Week I
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Cloud computing and distributed systems.
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
NewMind AI Monthly Chronicles - July 2025
Big Data Technologies - Introduction.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
cuic standard and advanced reporting.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Diabetes mellitus diagnosis method based random forest with bat algorithm
Empathic Computing: Creating Shared Understanding
Reach Out and Touch Someone: Haptics and Empathic Computing
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Network Security Unit 5.pdf for BCA BBA.
Unlocking AI with Model Context Protocol (MCP)
Approach and Philosophy of On baking technology
Electronic commerce courselecture one. Pdf

To Serve and Protect: Making Sense of Hadoop Security

  • 1. Grab some coffee and enjoy the pre-­show banter before the top of the hour!
  • 2. The Briefing Room To Serve and Protect: Making Sense of Hadoop Security
  • 3. Twitter Tag: #briefr The Briefing Room Welcome Host: Eric Kavanagh eric.kavanagh@bloorgroup.com @eric_kavanagh
  • 4. Twitter Tag: #briefr The Briefing Room   Reveal the essential characteristics of enterprise software, good and bad   Provide a forum for detailed analysis of today s innovative technologies   Give vendors a chance to explain their product to savvy analysts   Allow audience members to pose serious questions... and get answers! Mission
  • 5. Twitter Tag: #briefr The Briefing Room Topics September: HADOOP 2.0 October: DATA MANAGEMENT November: ANALYTICS
  • 6. Twitter Tag: #briefr The Briefing Room
  • 7. Twitter Tag: #briefr The Briefing Room Analyst: Robin Bloor Robin Bloor is Chief Analyst at The Bloor Group robin.bloor@bloorgroup.com @robinbloor
  • 8. Twitter Tag: #briefr The Briefing Room HP Security Voltage   HP recently acquired Voltage Security (now HP Security Voltage) to expand its data security solutions for big data and the cloud   HP Security Voltage provides data and email protection   Its security product features data encryption, tokenization and key management over structured and unstructured data, including data in Hadoop
  • 9. Twitter Tag: #briefr The Briefing Room Guest: Sudeep Venkatesh Sudeep Venkatesh is a noted expert in data protection solutions, bringing over a decade of industry and technology experience in this area to HP Security Voltage. His expertise spans data protection, security infrastructures, cloud security, identity and access management, encryption, and the PCI standards both for the commercial and government sectors. He has worked on numerous global security projects with Fortune 500 firms in the United States and globally. At HP Security Voltage, Sudeep serves in the position of Vice President of Solution Architecture, with responsibility over designing solutions for some of HP Security Voltage's largest customers in the end-to-end data protection portfolio. This includes email, file and document encryption, as well as the protection of sensitive data in databases, applications and payments systems.
  • 10. © Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.© Copyright 2015Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted HP Security Voltage Data-Centric Security & Encryption Solutions Sudeep Venkatesh September 22, 2015
  • 11. Monetization Data Sold on Black Market Research Potential Targets Research Infiltration Phishing Attack and Malware Discovery Mapping Breached Environment Capture Obtain data Attack Life Cycle Exfiltration/Damage Exfiltrate/Destroy Stolen Data
  • 12. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Why is Securing Hadoop Difficult? • Multiple sources of data from multiple enterprise systems, and real-time feeds with varying (or unknown) protection requirements • Rapid innovation in a well-funded open-source developer community • Multiple types of data combined together in the Hadoop “data lake”
  • 13. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Why is Securing Hadoop Difficult? • Automatic replication of data across multiple nodes once entered into the HDFS data store • Access by many different users with varying analytic needs • Reduced control if Hadoop clusters are deployed in a cloud environment
  • 14. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Existing Ways to Secure Hadoop •  Existing IT security − Network firewalls − Logging and monitoring − Configuration management Need to augment these with “data-centric” protection of data in use, in motion and at rest •  Enterprise-scale security for Apache Hadoop − Apache Knox: Perimeter security − Kerberos: Strong authentication − Apache Ranger: Monitoring and Management
  • 15. © Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. What is Data-Centric Protection? Storage File Systems Databases Data & Applications Traditional IT Infrastructure Security Disk Encryption Database Encryption SSL/TLS/Firewalls Security Gap Security Gap Security Gap Security Gap SSL/TLS/Firewalls Authentication Management Middleware Threats to Data Malware, Insiders SQL Injection, Malware Traffic Interceptors Malware, Insiders Credential Compromise Data Ecosystem DataSecurityCoverage Security Gaps
  • 16. © Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. What Kind of Protection Closes the Security Gap?
  • 17. © Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. End-to-End Sensitive Data Protection at Rest, in Motion, and in Use Storage File Systems Databases Data & Applications Traditional IT Infrastructure Security Disk Encryption Database Encryption SSL/TLS/Firewalls Security Gap Security Gap Security Gap Security Gap SSL/TLS/Firewalls Authentication Management Middleware Threats to Data Malware, Insiders SQL Injection, Malware Traffic Interceptors Malware, Insiders Credential Compromis e Data Ecosystem DataSecurityCoverage Security Gaps HP Security Voltage Data-centric Security End-to-end DataProtection
  • 18. © Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. How to Protect Your Data Credit Card 1234 5678 8765 4321 SSN 934-72-2356 Email bob@voltage.com DOB 31-07-1966 AES FIWUYBw3Oiuqwri uweuwr %oIUOw1DF^ 8juYE %Uks&dDFa2 345^WFLERG lja&3k24kQotugD F2390^32 OOWioNu2(*872 weWOiuqwriuwe uwr%oIUOw1@ 3k24kQotugDF 2390^320OW %i Full 8736 5533 4678 9453 347-98-8309 hry@ghohawd.jiw 20-05-1972 Partial 1234 5681 5310 4321 634-34-2356 hry@ghohawd.jiw 20-05-1972 Obvious 8736 5533 4678 9453 347-98-8309 hry@ghohawd.jiw 20-05-1972 Field Level, Format-Preserving, Reversible Data De-Identification
  • 19. © Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Solution Use Case: Global Financial Services Company •  Customer is rapidly moving to adopt open source storage and data analysis platforms •  Use cases: Fraud detection, marketing (360 degree view of what the customer is doing, to provide more relevant marketing), creating data sets or reports to sell or provide to other companies, financial modeling •  Invested in multiple data warehouse and big data platforms •  Using complex ETL tools to import data into Hadoop from sources including mainframe, distributed databases, flat files, etc. •  Protection in Hadoop is the first step in an enterprise wide data protection strategy Need •  Protect sensitive PCI and PII data as it is being imported into Hadoop. Fields protected include PAN, Bank Account, SSN, Address, City, Zip Code, Date of Birth •  HP Secure Stateless Tokenization (SST) offers PCI audit scope reduction for the Hadoop environment •  Central key and policy management infrastructure can scale enterprise wide to mainframe and distributed platforms •  Data can be protected at ingestion through integration with Sqoop and MapReduce
  • 20. © Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Solution •  Better health analysis to customers: One of their use cases for Hadoop is to provide better analysis of health status to customers on their web site •  Catch prescription fraud: Fraudsters collect prescriptions from 5-6 doctors and get them filled by 5-6 pharmacies. The manual process takes several weeks to track. Hadoop will enable them to do this almost instantly •  Reverse claim overpayment: Often times claims are overpaid based on errors and mistakes. They hope to catch this as it happens with Hadoop •  Developer hackathons: Open the system up to their Hadoop developers as a sandbox, enabling innovation, discovery and competitive advantage – without risk Use Case: Health Care Insurance Company Need •  Utilized the massive un-tapped data sets for analysis that were hampered by compliance and risk •  Integrated HP SecureData in Sqoop so data is de-identified as it is copied from databases •  Ability to initially scale to 1000 Hadoop nodes •  Currently investigating the use of HP SecureData enterprise wide for open systems and mainframe platforms •  Enabling innovation through data access without risk with HIPAA/HITECH regulated data sets
  • 21. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Use Case : Global Telecommunications Leader Protecting PII Throughout Large Scale Legacy and New Applications •  Protect 26 data types constituting PII, 500 Apps, mainframe, Teradata, Windows, Unix •  Secure data types regardless of platform •  Support wide variety of platforms including mainframe, open systems and big data platforms •  Reduce costs of having to protect data in each app and each database Need •  HP SecureData with HP Format-Preserving Encryption applied to hundreds of apps and databases •  Preservation of data formats and relationships •  Native support for z/OS, Teradata, Hadoop and Open Systems Solution •  Created SaaS, leveraged company-wide •  Protected 26 data types in over 700 applications •  Solution management required less than 1 FTE Results
  • 22. © Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Voltage, a Leader in Data-Centric Security safeguarding data throughout its entire lifecycle – at rest, in motion, in use – across big data, cloud, on-premise and mobile environments with continuous protection www.voltage.com/hadoop
  • 23. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Questions?
  • 24. © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Thank you
  • 25. Twitter Tag: #briefr The Briefing Room Perceptions & Questions Analyst: Robin Bloor
  • 27. The Sorry Truth Security was never engineered into IT systems It was always an afterthought So it is with Hadoop
  • 28. Windows of Opportunity… u  The “security surface” that needs protection is always growing u  Security solutions tend to be fragmented u  The value targets are health and credit card data u  Big data is just another opportunity for the cyber thief – only bigger
  • 31. Hadoop Security u  Hadoop presents a wide area of vulnerability u  Role-based access is required (for self-service) u  Encryption is probably a necessity u  Format-preserving encryption is preferable
  • 32. The Net Net IT security is STRATEGIC Encryption is a primary plank of this
  • 33. u  How “inconvenient” is HP Voltage Security? Please describe an implementation. What does the user experience? u  Security often comes with performance penalties. What is the performance cost of HP Security Voltage? u  Security needs to be integrated, so encryption needs to shake hands with authentication. How does this work with HP Voltage? u  Costs?
  • 34. u  Are there any environments to which HP Security Voltage’s technology is inapplicable: OLTP, Data Streaming & Streaming Analytics, BI, Mobile, Cloud,… u  Which platforms/environments are supported? u  Which other security vendors/technologies does HP partner with for data center solutions?
  • 35. Twitter Tag: #briefr The Briefing Room
  • 36. Twitter Tag: #briefr The Briefing Room Upcoming Topics www.insideanalysis.com September: HADOOP 2.0 October: DATA MANAGEMENT November: ANALYTICS
  • 37. Twitter Tag: #briefr The Briefing Room THANK YOU for your ATTENTION! Some images provided courtesy of Wikimedia Commons