Professional Documents
Culture Documents
Ron Miles
Tony Ward
Dejan Lozanovic
25 January 2017
COMPANY CONFIDENTIAL
Data is the biggest Asset
16%
Only 16% of the respondents believe they know where all
sensitive structured data is located.
79% 51%
79% said that not knowing where the 51% believes that securing
organizations sensitive information and/or protecting data is a high
is represents a significant security priority in their organizations.
risk.
Source: Ponemon.org 2015
2016 Dataguise, Inc. Confidential and Proprietary
DATAGUISE DgSECURE
Seamless Integration with Hadoop, Databases or File System
RISKS VALUE
BREACH REVENUE
Key Partnerships
CENTRALLY MANAGED
&
VIEWED
Or On Premise
COMPANY CONFIDENTIAL
Big Data Protective Intelligence
Data-centric security is the preferred Hadoop
security strategy for customers seeking
the strongest data protection in Hadoop
The proposed new EU data protection regime extends the scope of the EU
data protection law to all foreign companies processing data of EU residents.
It provides for a harmonization of the data protection regulations
throughout the EU, thereby making it easier for non-European companies to
comply with these regulations;
The Commission's primary objectives of the GDPR are to give citizens back
the control of their personal data and to simplify the regulatory environment
for international business by unifying the regulation within the EU. When
the GDPR takes effect it will replace the Data Protection Directive (officially
Directive 95/46/EC) from 1995.
9 COMPANY CONFIDENTIAL
Any structured/delimited file (csv, etc.)
RC Files (compressed / uncompressed)
Whats Happening in Data
ORC Files (compressed / uncompressed)
TXT Files
Discovery is now critical for
SEQ Files
AVRO Files
protecting sensitive data
Log Files
XML Files
JSON Files
Parquet Files
COMPANY CONFIDENTIAL 10
Whats Happening in Hadoop Data Today
Data Feeds HDFS
Batch
9351SD878 Processing
Steve Johnson Hive Tables
95 Dean Street
Norwood, MA 02062 etc.. Steve Johnson
95 Dean Street Norwood, Processing
6745RT334 MA 02062 Framework
6745RT334
Paula Scott 6745RT334 Spark / Storm
Paula Scott
2201 Walnut AvePaula Scott Johnson Norwood
2201 Walnut Ave
Fremont, CA 94538
2201etc.
Walnut Ave MA 02062
Fremont, CA 94538 etc.
Fremont, CA 94538 etc. 9351SD878
Steve Johnson Analytics
CC 5413 5675 3345 2213 Hive / Pig /
EXP 08/2016 etc Steve Johnson
Cancer 02062
SQL
Score 566
Paula Scott
Paula Scott Steve Johnson
CC 4522 6766 Paula
2300 3498
Scott
CC 4522 6766 2300 3498
EXP 04/2015 CCetc
4522 6766 2300 3498
Cancer 02062 BI &
EXP 04/2015 etc Score 566
EXP 04/2015 etc Reporting
Steve Johnson
Doctor Notes: Cancer 02062
Tools
Steve Johnson Score 566
Condition and Treatment
Apps
R / Python /
Credit Rating
Paula Scott Scala / Java
566
2014 Dataguise Inc. All rights reserved. COMPANY CONFIDENTIAL 2015 Dataguise, Inc.
Confidential and 12
Complex Data
DATA DETECTION
Discovery
A A A
B B B
C1 C2 C1 C2 C1 C2
D1 E1 D1 E1 D1 E1
F1 F1 F1
2014 Dataguise Inc. All rights reserved. COMPANY CONFIDENTIAL 31
Step 3: Encryption or Masking Directory Management
Protect
A A
B B
C1 C2 C1 C2
D1 E1 D1 E1
Ongoing Feeds:
F1 FTP / Flume / Sqoop F1
2014 Dataguise Inc. All rights reserved. COMPANY CONFIDENTIAL 32
DATAGUISE DgSECURE
Seamless Integration with Hadoop, Databases or File System
2014 Dataguise Inc. All rights reserved. COMPANY CONFIDENTIAL 2015 Dataguise, Inc.
Confidential and 33
DATAGUISE
Complete DgSECURE
visibility of access and use of an enterprises sensitive
assets
AUDIT
2014 Dataguise Inc. All rights reserved. COMPANY CONFIDENTIAL 2015 Dataguise, Inc.
Confidential and 34
DgSecure Monitor
Why DgSecure
Monitor
Alerting and Monitoring solutions today have no
knowledge of sensitivity of data
Dataguise Discovery can detect sensitive data
within files and directories
Combining Discovery with Alerting & Monitoring
o Discovery provides sensitivity of files and directories
o Alerting and Monitoring on Hadoop events
o Combining ONLY alerting and Monitoring on sensitive files and
directories is extremely powerful
o Focused and actionable alerts
Log Appender
List DgSecure Monitor
Copy
Execute
Engine
Delete
Update
DG
Metadat
Users generate events a