Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Big Data technologies were invented to store and rapidly process the vast amount of data available today into useful “Smart” Information. What is common across these technologies is that their initial aims are focused on data processing capabilities rather than security and compliance. One particular concern is the lack of control over identity and access especially in the area of administration. This was fine when the application of the tools was confined to experimental or small scale usage. Now that they are being widely deployed for commercial purposes this is no longer satisfactory.
Big Data technologies need to be managed and secured in the same way as the other components in the IT infrastructure.
Language: English • Duration: 59:07 • Resolution: 1280x720
Thales SafeNet Trusted Access Platform
Providers of Verified Identity
NRI SecureTechnologies: Uni-ID Libra 2.4
IaaS Tenant Security Controls
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
AI/ML in Cybersecurity