(Big) Data Security: Protecting Information at the Source
- LANGUAGE: English DATE: Thursday, June 01, 2017 TIME: 4:00pm CEST, 10:00am ET, 7:00am PT
The ongoing Digital Transformation has profoundly changed not just IT infrastructures, but in many cases, entire business models and processes for many organizations. Digital information has become one of the most precious assets of nearly every company, and for many, it is no longer just another means of improving their business process efficiency – data has become their core competence and most valuable intellectual property.
With the growing adoption of cloud computing, Big Data or open APIs, managing, securing and sharing massive amounts of digital data across heterogeneous and increasingly interconnected infrastructures is becoming increasingly difficult. From file servers to relational databases and big data frameworks, to the Internet of Things and entire API ecosystems – each data model imposes its own security controls and separate technology stack for enforcing them.
An alternative approach – data-centric security – is in fact nothing new and quite simple in theory: instead of managing access to each individual infrastructure, just focus on protecting the data itself, regardless of its type and location. However, practical implementations of this concept depend heavily on two things: standards and policies. A solution that manages to successfully implement them in a unified, flexible and open manner, could surely be able to bring data security to a new level.
In this KuppingerCole webinar, you will learn about:
- Current challenges and trends that shape modern data protection solutions;
- Improving business agility and reducing complexity by redesigning traditional security models;
- Hardening against security breaches and ensuring GDPR compliance with dynamic Attribute-Based Access Control;
- Implementing policy-based security and privacy controls for Big Data infrastructures.
In the first part of the webinar, Alexei Balaganski, Lead Analyst at KuppingerCole, will present an overview of the security and compliance challenges of managing access to sensitive data across heterogeneous IT infrastructures. He will talk about the crucial role of standards in fighting complexity and improving the flexibility of access management.
In the second part, Gerry Gebel, Vice President of Business Development at Axiomatics, Inc., will present a deeper insight into the benefits and challenges of applying standard-based ABAC security and privacy controls to Big Data frameworks like Hadoop and will introduce his company’s new solution implementing this technology.
Axiomatics provides externalized authorization management for databases, Big Data, applications and APIs. Our Attribute Based Access Control (ABAC) solutions are ideal for enterprises and government agencies moving away from role-based frameworks, and into more context-aware policy-based access control models. The Axiomatics authorization suite is ideal for these organizations that must securely share information while complying with complex and ever-evolving regulations.
Consumers and employees are increasingly on-the-go, and that means that more transactions and more work originates from the mobile phone. Fraud and data loss rates have also been rising. A plethora of mobile-based digital identity technologies have entered the market over the last few years to help businesses and other organization meet these challenges.
At the Consumer Identity World you learn how to balance the user experience, privacy, and security of your connected customer and how to enhance the customers' journey by leveraging Artificial Intelligence (AI) and Machine Learning (ML) to provide a superior and customized experience.