The information provided in this document constitutes confidential and proprietary information of Zettaset, Inc. You may not disclose, use, reproduce or distribute this document (or any portion thereof) without Zettaset's prior written authorization. Further, as between you and Zettaset, Zettaset owns all right, title and interest in and to this document (together with any and all related intellectual property rights). Zettaset Elastic Big Data Security for Enterprises October 2016
21
Embed
Zettaset Elastic Big Data Security for Greenplum Database
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
The information provided in this document constitutes confidential and proprietary information of Zettaset, Inc. You may not disclose, use, reproduce or distribute this document (or any portion thereof) without Zettaset's prior written authorization. Further, as between you and Zettaset, Zettaset owns all right, title and interest in and to this document (together with any and all related intellectual property rights).
Zettaset Elastic Big Data Security for Enterprises
Specifically designed for optimized scalability and performance in today’s distributed computing systems and Big Data environments
Ideally suited for elastic cloud deployments, massive volumes of structured / unstructured content
Software-based approach to encryption key management and hardware security modules sets new bar for ease of administration combined with significant TCO advantages
4
Data-centric security solutions for Big Data and Cloud environments must not suffer the same drawbacks that make legacy solutions irrelevant, namely:
What Problems with Existing Technology Does Zettaset Address?
• Inability to adapt to elastic environments• Inability to adapt to distributed
architectures• Lack of automation• Scalability issues• Performance issues• Inability to adapt to multiple databases,
• In today’s competitive economy, data is the primary asset enterprises and individuals possess
• In cloud computing, foremost concern is about data integrity, confidentiality and privacy
• The only way to secure databases on virtual machines or in cloud environments, without sacrificing the huge benefits of these new architectures, is to use software-based solutions that share the elasticity of virtual machines and cloud computing
• Basic roles of key manager and hardware security module (HSM) no longer sufficient
– Provide secure storage
– Protect and retrieve keys
Scale and volume of Big Data and complexity of cloud requires more comprehensive approach to key management and administration• Automation of features, like node removal and
key revocation
• Policy creation and enforcement
• Key rotation without re-encryption
• Per-user granularity
Key Management for Big Data: Old Rules Don’t Apply
• Advanced, automated key management• Certificates generated automatically during install• Admin can revoke all certificates on a node to securely remove that node
Data-at-Rest Measured 3% performance impact Encrypts all existing data regardless of media Encrypts data on any disks – avoids premium
SED costs and offers integrated key management
Standalone, turnkey solution or can integrate and leverage existing infrastructure
Transparent to the file system AES 256-bit standard for optimum security
Data-in-Motion Measured 7% performance impact Secures all connections between cluster
nodes, and between cluster and management console
Eliminates possibility of unauthorized access by anyone within corporate network or server cluster
Ensures networking connections are secure within encrypted and authenticated tunnel