Title: Simplify Big Data Security & Management with Vormetric
1Securing Big Data is a business imperative.
www.vormetric.com/bigdata82
2Perimeter Security is Failing
100
63
of victims have up-to-date antivirus software
of breaches are reported by third parties
100
243
median number of days advanced attackers are on
the network before being detected
of breaches involved stolen credentials
Source mandiant.com/threat-landscape/
3 Big Data is NOW a Reality
65
Of Companies deployed/expect to deploy BIG DATA
PROJECTS
Source CIO Magazine 2012 Big Data Survey
4Do Organizations Understand the Risks?
!
Organizations have pushed vast amounts of data
into these big data clusters, but most have
implemented virtually zero security measures.
Securing Big Data Security Recommendations for
Hadoop and NoSQL Environments. Securosis -
October, 2012
5All Data Sources are at Risk inBig Data
Architectures
6Four Steps to Consider whenImplementing A Big
Data Project
View big data as an extension of the enterprise
Minimize points of integration
Choose and implement a primary platform
Evaluate service providers carefully
Incorporate security plan in the Beginning of
Big Data planning stage
7Vormetric Data-Centric Security Elements
Data Firewall
Access Policies
Encryption and Key Management
Security Intelligence
Automation
Performance Impact can be minimal for Big Data
Security Project
8Vormetric Data Security Certified on CDH4
Clouderas Distribution Including Apache Hadoop
Version 4
i
The completion of Vormetric Data Securitys
certification on CDH4 further solidifies
Vormetric as a leading company in todays growing
big data and open-source space.
Tim Stevens VP, Corporate and Business
Development,
9Data-Centric Security Is An IssueBig Data,
Global Compliance, Cloud Adoption, Data Breaches
- Global State of Information Security Survey by
PwC, CIO magazine, and CSO magazine October
2012 - Verizon Data Breach Investigation Report March
2012
10Securing Big Data is a business imperative.
www.vormetric.com/bigdata82