The Future of Data-Centric Security
- LANGUAGE: English DATE: Tuesday, October 18, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Enforcing Access Control for Relational and Hadoop Big Data Systems
Business boundaries are dissolving as the ability to share information improves. For example, in agile and collaborative working environments, information has to be shared efficiently and securely between various internal and external business partners, mainly via cloud services and with mobile devices. This requires extensive access to what is often critical content, stored in well-protected databases. Sharing then presents a challenge: How can sensitive data be masked from people who are not permitted to see it and deliver it securely to those who are? And how can this be done dynamically, by removing access if necessary in real-time if user authorization rapidly changes?
Data-centric security solutions control access via a fine-grained policy approach and focus on securing this content via dynamic and scalable authorization. The data access filtering approach signifies a new generation of database security techniques, based on a combination of two robust and proven technologies: data-centric security and standards-based Attribute Based Access Control (ABAC). On the whole, this method brings database security to a new level.
In this KuppingerCole webinar, you will hear about
- Attribute-based data filtering and dynamic masking;
- The key benefits of data filtering products and their feature evolution;
- Big data governance, especially with regard to sensitive enquiries;
- The shift from “need-to-know” access control towards “need-to-share”-based principles;
- Future ABAC security without SQL interfaces and NoSQL implementations.
In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will give an overview of today’s data-centric security solutions as well as their individual benefits and challenges. He will also pose the question on how organizations deal with big data and its governance concerning sensitive queries.
In the second part, Gerry Gebel, President of Axiomatics Americas, will describe the latest version of Axiomatics relational database security product, the Axiomatics Data Access Filter for Multiple Databases, and the main benefits compared to previous versions. He will also introduce a new product release, which applies the same data filtering functionality to Hadoop big data deployments.
Axiomatics provides externalized authorization management for databases, Big Data, applications and APIs. Our Attribute Based Access Control (ABAC) solutions are ideal for enterprises and government agencies moving away from role-based frameworks, and into more context-aware policy-based access control models. The Axiomatics authorization suite is ideal for these organizations that must securely share information while complying with complex and ever-evolving regulations.
Strong authentication is one cornerstone of web security. However, account enrollment and account recovery processes are leaving gaps in the credential management lifecycle that allow bad actors to perform account takeover and get into our networks. Increasingly, these bad actors aren’t even real. Stolen identity information that is used to create new fake IDs, known as synthetic identity fraud, is a fast-growing form of fraud.
AImpact Summit held on November 27 – 28, 2019 in Munich, offers the unique opportunity to get a deep insight on the hottest topics of Artificial Intelligence, network with like-minded people, connect with peers who recognize that now is the time for AI, meet the people changing the perspectives and transforming the way we do business today. As AI increasingly permeates every aspect of our life, knowing how to apply the cutting-edge technology to one’s competitive advantage or how to avoid risks and threats become vastly important.