Subscribe / Log In
Subscribe / Log In
Profile

IT leader’s guide to big data security

Share

  • Provided by TechRepublic Premium
  • Published July 16, 2017
  • Topic TechRepublic Premium
  • Format PDF
Traditional data security practices aren’t sufficient to protect the massive quantities of big data pouring into the enterprise. Yet in the rush to reap the benefits of big data projects, companies often treat security as an afterthought. This guide offers advice and best practices for meeting the unique challenges of big data security.

From the guide:

As companies continue to redefine IT processes to cope with the semi-structured and unstructured data that characterize big data, they are also recognizing that the standard data security practices that grew up with fixed-record transactional data no longer address every big data security concern.

For starters, there are few controls on the mountains of big data that flow into companies on a daily basis. Big data can come from anywhere and in every form.

While companies can put controls in place to regulate the in-flow of this seemingly limitless data pipeline, there are acute security concerns that emerge once the data is in enterprise data repositories where it can be accessed or shared. Who should be authorized to see the data in its entirety and who within the organization needs to know some of the data but not all of it?

“We are seeing major transitions in the big data market now,” said Venkat Subramanian, CTO at Dataguise, a data protection and compliance vendor. “Companies are moving from traditional data services to the big data market, and they are beginning to move more of their standard and big data applications from on-premises data centers to the cloud. Whether big data is stored on premises or in a cloud environment, appropriate governance measures for this data are needed.”

People Also Downloaded