Big Data – Bigger Risks?

  • LANGUAGE: English DATE: Thursday, October 13, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Big Data – Bigger Risks?

Securing Your Smart Information Infrastructure

Organizations are using Big Data to better understand their customers, to improve their products and to optimize their operations. However, Big Data technologies were conceived and designed for scalability and performance rather than security. You need to take steps to secure your Smart Information infrastructure.

Big Data technologies were invented to store and rapidly process the vast amount of data available today into useful “Smart” Information. What is common across these technologies is that their initial aims are focused on data processing capabilities rather than security and compliance. One particular concern is the lack of control over identity and access especially in the area of administration. This was fine when the application of the tools was confined to experimental or small scale usage. Now that they are being widely deployed for commercial purposes this is no longer satisfactory.

Big Data technologies need to be managed and secured in the same way as the other components in the IT infrastructure.

In this KuppingerCole Webinar you will hear about:

  • Big Data and Smart Information
  • How Big Data technologies are changing the risk landscape.
  • Why identity and access management is critical to managing these risks.

In the first part of this webinar, Mike Small, Senior Analyst at KuppingerCole, will describe the challenge that Big Data technologies poses to organizations. He will describe how Big Data technologies change the risk landscape, and how knowing who has access to what, is a key requirement to managing risk. He will describe identity and access management in the context of Big Data technologies and how it is important to address these risks.

In the second part, Barry Scott, CTO EMEA from Centrify will describe their approach to Big Data Security and how they can enable you to mitigate risks and increase security in your Big Data environments.


Speakers

Centrify’s Barry Scott has over 25 years of UNIX, Windows and Linux experience working for many major organisations in various Infrastructure Operations and Architecture roles, across different industry verticals. For the past 11 years, Barry has been helping organisations manage their...


Lead Sponsor

Centrify delivers Zero Trust Security through the power of Next-Gen Access. Centrify verifies every user, their devices, and limits access and privilege. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). 

Watch now

Downloads

Webinar Presentation, KuppingerCole

Webinar Presentation, Centrify

Webcast download

Popular Webcasts

Next Webinar

Webinar

Privileged Access Management - the Focal Point for Your IAM Today

PAM (Privileged Access Management) has grown over these years to become a crucial set of technologies that addresses some urgent cybersecurity issues today. 

Next Conference

Congress

European Identity & Cloud Conference 2019

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00