Big Data // Big Data Analytics
News
6/4/2014
09:56 AM
50%
50%

Cloudera Buys Data Security Firm Gazzang

Commercial Hadoop vendors step up big data security pitch to would-be enterprise adopters.

protection, or they're in industries that are regulated like financial services, healthcare, and retail."

As InformationWeek's Doug Henschen noted last month, the open-source Hadoop platform already includes several security features, such as Kerberos authentication. But the new security push by commercial vendors such as Cloudera and Hortonworks appears to address one of the barriers to enterprise Hadoop adoption by offering an A-to-Z approach to big data security. Cloudera, for instance, touted the Gazzang addition as a win for would-be Hadoop users burdened by compliance concerns, thanks to its combination of at-rest data encryption and key management features for keeping encryption keys separate from encrypted data, a necessary step for regulations such as HIPAA and PCI.

Zedlewski said that, to date, many of the company's regulated customers have kept their regulated data out of Cloudera's systems because of compliance concerns. "That regulated data might not be a petabyte of data, but it's oftentimes the most valuable data, and it's the data you need to unlock a lot of the analyses or applications that they're building," he said. "It's really about growing the value of the deployment as a whole by trusting the system to hold the regulated data."

Information security's not just a regulatory compliance concern, not by a long shot, and that's another factor in growing interest not just in big data but in secure big data. Marketing departments, for instance, must consider the long-term fallout of a potential breach, even if they're not necessarily bound by government agencies or other rules.

"In this world of big data, people are ever more concerned about privacy and how all this data and people are being tracked and how that can be misused," Zedlewski said. "A lot of the non-regulated industries have created internal policies that are effectively like regulations, that have the same requirements for data protection. While there's tremendous potential in big data, it also represents a big opportunity for reputation risk."

You can use distributed databases without putting your company's crown jewels at risk. Here's how. Also in the Data Scatter issue of InformationWeek: A wild-card team member with a different skill set can help provide an outside perspective that might turn big data into business innovation. (Free registration required.)

Kevin Casey is a writer based in North Carolina who writes about technology for small and mid-size businesses. View Full Bio

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
rahulatekchandani
50%
50%
rahulatekchandani,
User Rank: Apprentice
6/6/2014 | 10:47:17 AM
Strategic investment for sure
With the focus on information security and the need to cater to regulated industries (banking, healthcare etc) this capability was required for hadoop to transition from an R&D platform to a strategic data management platform.
Laurianne
50%
50%
Laurianne,
User Rank: Author
6/4/2014 | 12:07:54 PM
More coming
Data security could not be more top of mind for CIOs right now.  Expect more acquisitions around big data security IP -- and talent -- in the months ahead.
Stratustician
50%
50%
Stratustician,
User Rank: Ninja
6/4/2014 | 11:50:15 AM
Big Data Needs Security Too
Good move for Cloudera to make a solid investment in security with the purchase of Gazzang.  Like any cloud service, the ability for customers to be able to trust that their provider has the right security controls in place, especially with functions like Big Data which has the potential to contain tons of personal information, it makes sense that Cloudera would opt to purchase a partner with a strong value proposition rather than try to build and manage in-house.  Great news.
6 Tools to Protect Big Data
6 Tools to Protect Big Data
Most IT teams have their conventional databases covered in terms of security and business continuity. But as we enter the era of big data, Hadoop, and NoSQL, protection schemes need to evolve. In fact, big data could drive the next big security strategy shift.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest, Dec. 9, 2014
Apps will make or break the tablet as a work device, but don't shortchange critical factors related to hardware, security, peripherals, and integration.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of December 14, 2014. Be here for the show and for the incredible Friday Afternoon Conversation that runs beside the program.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.