Upload
steven-meister
View
40
Download
1
Embed Size (px)
Citation preview
Data Sequester/Encryption - The Intelligent Catalog / for Your Data Lake to improve results and protectsensitive customer and corporate data assets
Congratulations, you have a data lake, and you even have some successes using it
Are you protecting Customer’s data from hackers? If it’s installed in your data lake you probably are not!!!
2016 was a record year for data breaches, the number of exposed records exceeded 4.2 billion, nearly four times the previous high.
> BigDataRevealed can identify and encrypt Personally Identifiable Information and other sensitive data as it enters your data lake giving hackers no window of opportunity to corral your customers most valuable information. After this 4 page PowerPoint see a short video demo of BigDataRevealed’s Sequester/Encryption Protector.
> BigDataRevealed can identify and encrypt Personally Identifiable Information and other sensitive data as it enters your data lake giving hackers no window of opportunity to corral your customers most valuable information.
> As we inform you of the facts of the major breaches of 2016 you will see in the background how BigDataRevealed will Discover, Isolate, Sequester and Encrypt sensitive data while it builds, on the fly, an Intelligent Catalogue with complete Metadata. Sequestering and Encrypting data is still not enough to manage the wealth of knowledge locked up in your data lake. You still need BigDataRevealed’s remediation process to free up the data for scheduled Predictive and Marketing Analytics while protecting your Customers trusted Personal Information.
> The latest release of Risk Based Security’s annual Data Breach Quick View report shows that there were 4,149 data breaches reported during 2016 exposed over 4 billion unique records of information, four times the breached records from only two years earlier. Some highlight breaches are 1.5 Billion customer records exposed at Yahoo, which had a direct impact on their valuation and potential derailing of an acquisition by Verizon. Even the IRS, the NSA, the Democratic caucus and the White House were hacked. Yes, the NSA, had the hacking software they wrote hacked. Cyber-Security is something you cannot avoid. And if you use big data, you need to prioritize your efforts.
Your Data Lake – Your Data Risks and Exposures
Your Data Lake – Your Data Risks and Exposures
> We developed a Personal Identifying Information detection and sequestering capability to augment our one of a kind Hadoop intelligent catalog because of recent issues reported by our partnering organizations and their concerns about the security of their Hadoop environments.
We believe it is imperative this capability lives in the big data environment, and that any information identified as being a candidate for sequestering be parked into an area with more strenuous security attributes than is normally associated with big data. We invite you to challenge our approach, we believe that you will be very happy to invest a small amount of your time to learn about this very critical capability.
> Cyber-Security is no longer something that just your CIO worries about, it is a risk that deserves the attention of your risk organization, particularly if you market services through digital interfaces like the web or mobile platforms or have sensorslike proximity beacons integrated into your network.
You do not want to learn that you were exposed in one of the national newspapers or through a visit from the Federal Trade Commission or Securities and Exchange Commission.
Native Hadoop File System
HBASE
Hive or Impala
MAPREDUCE
HadoopComponents
HiveSparkPigDrillAnalytic LibrariesImpalaTIKAHbaseSpark Stream
D3.JS Interactive GUI BigDataRevealed
Callable Java Modules Map/Reduce, Spark,
NLP, Deep Learning Externalized Callable Modules
Departmentalized BDR-Apache-VMWare
CLOUD
MySQL
Databases(Oracle, DB2, SQL)
Teradata
BDR Architecture - Powered with Apache™ Hadoop®
BDR Lineage
( For the technicians, how we reside in the data lake )
KER
BER
OS SEC
UR
ITY FRA
MEW
OR
K
AP
I FRA
MEW
OR
K
BD
REX
ECU
TAB
LES
BDR Workflow
BDR Catalog Metadata
BDR Alert
Intelligen
t Catalo
g
BDR Learning
KER
BER
OS SEC
UR
ITY FRA
MEW
OR
K
AP
I FRA
MEW
OR
K
Optional VMWarePortable
Environment
WIZA
RD
WIZA
RD
RulesEngine & Scheduler Wizards
BDR Sequester / Encryption Protector
BigDataRevealed Discovers and Isolates Personally Identifiable & Potentially Risky(Outlier/Anomaly) information/data in your Hadoop ecosystem!
Q & A
BigDataRevealed Data Discovery for Big Data Hadoop
Steven MeisterCTO & Founder, BigDataRevealedsteven.meister@bigdatarevealed.com847-791-7838www.bigdatarevealed.com