The Future of Data-Centric Security
- LANGUAGE: English DATE: Tuesday, October 18, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Enforcing Access Control for Relational and Hadoop Big Data Systems
Data-centric security solutions control access via a fine-grained policy approach and focus on securing this content via dynamic and scalable authorization. The data access filtering approach signifies a new generation of database security techniques, based on a combination of two robust and proven technologies: data-centric security and standards-based Attribute Based Access Control (ABAC). On the whole, this method brings database security to a new level.
In this KuppingerCole webinar, you will hear about
- Attribute-based data filtering and dynamic masking;
- The key benefits of data filtering products and their feature evolution;
- Big data governance, especially with regard to sensitive enquiries;
- The shift from “need-to-know” access control towards “need-to-share”-based principles;
- Future ABAC security without SQL interfaces and NoSQL implementations.
In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will give an overview of today’s data-centric security solutions as well as their individual benefits and challenges. He will also pose the question on how organizations deal with big data and its governance concerning sensitive queries.
In the second part, Gerry Gebel, President of Axiomatics Americas, will describe the latest version of Axiomatics relational database security product, the Axiomatics Data Access Filter for Multiple Databases, and the main benefits compared to previous versions. He will also introduce a new product release, which applies the same data filtering functionality to Hadoop big data deployments.
Axiomatics provides externalized authorization management for databases, Big Data, applications and APIs. Our Attribute Based Access Control (ABAC) solutions are ideal for enterprises and government agencies moving away from role-based frameworks, and into more context-aware policy-based access control models. The Axiomatics authorization suite is ideal for these organizations that must securely share information while complying with complex and ever-evolving regulations.
The Internet of Things is disrupting all industries and use cases; from customer IoT, to Industrial IoT. Companies are forced to become more innovative with their products whilst their services are being, or will be, digitized. Top drivers of this digitization are eroding margins and changing customer behaviour, whereas new market disruptors face security challenges. The question now becomes: where do companies decide to focus their money and efforts, in order to capitalize on this disruption? Either on business optimization, by doing things better and more efficiently, or focusing on a business transformation, to move from CAPEX to OPEX.
The Consumer Identity World USA is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.