The Future of Data-Centric Security
- LANGUAGE: English DATE: Tuesday, October 18, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Enforcing Access Control for Relational and Hadoop Big Data Systems
Data-centric security solutions control access via a fine-grained policy approach and focus on securing this content via dynamic and scalable authorization. The data access filtering approach signifies a new generation of database security techniques, based on a combination of two robust and proven technologies: data-centric security and standards-based Attribute Based Access Control (ABAC). On the whole, this method brings database security to a new level.
In this KuppingerCole webinar, you will hear about
- Attribute-based data filtering and dynamic masking;
- The key benefits of data filtering products and their feature evolution;
- Big data governance, especially with regard to sensitive enquiries;
- The shift from “need-to-know” access control towards “need-to-share”-based principles;
- Future ABAC security without SQL interfaces and NoSQL implementations.
In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will give an overview of today’s data-centric security solutions as well as their individual benefits and challenges. He will also pose the question on how organizations deal with big data and its governance concerning sensitive queries.
In the second part, Gerry Gebel, President of Axiomatics Americas, will describe the latest version of Axiomatics relational database security product, the Axiomatics Data Access Filter for Multiple Databases, and the main benefits compared to previous versions. He will also introduce a new product release, which applies the same data filtering functionality to Hadoop big data deployments.
Axiomatics provides externalized authorization management for databases, Big Data, applications and APIs. Our Attribute Based Access Control (ABAC) solutions are ideal for enterprises and government agencies moving away from role-based frameworks, and into more context-aware policy-based access control models. The Axiomatics authorization suite is ideal for these organizations that must securely share information while complying with complex and ever-evolving regulations.
Most organizations now use multiple cloud services as well as retaining some IT services on-premises, this multi-cloud hybrid environment creates many challenges for security and governance.
The Consumer Identity World USA is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.