(Big) Data Security: Protecting Information at the Source
- LANGUAGE: English DATE: Thursday, June 01, 2017 TIME: 4:00pm CEST, 10:00am ET, 7:00am PT
With the growing adoption of cloud computing, Big Data or open APIs, managing, securing and sharing massive amounts of digital data across heterogeneous and increasingly interconnected infrastructures is becoming increasingly difficult. From file servers to relational databases and big data frameworks, to the Internet of Things and entire API ecosystems – each data model imposes its own security controls and separate technology stack for enforcing them.
An alternative approach – data-centric security – is in fact nothing new and quite simple in theory: instead of managing access to each individual infrastructure, just focus on protecting the data itself, regardless of its type and location. However, practical implementations of this concept depend heavily on two things: standards and policies. A solution that manages to successfully implement them in a unified, flexible and open manner, could surely be able to bring data security to a new level.
In this KuppingerCole webinar, you will learn about:
- Current challenges and trends that shape modern data protection solutions;
- Improving business agility and reducing complexity by redesigning traditional security models;
- Hardening against security breaches and ensuring GDPR compliance with dynamic Attribute-Based Access Control;
- Implementing policy-based security and privacy controls for Big Data infrastructures.
In the first part of the webinar, Alexei Balaganski, Lead Analyst at KuppingerCole, will present an overview of the security and compliance challenges of managing access to sensitive data across heterogeneous IT infrastructures. He will talk about the crucial role of standards in fighting complexity and improving the flexibility of access management.
In the second part, Gerry Gebel, Vice President of Business Development at Axiomatics, Inc., will present a deeper insight into the benefits and challenges of applying standard-based ABAC security and privacy controls to Big Data frameworks like Hadoop and will introduce his company’s new solution implementing this technology.
Axiomatics provides externalized authorization management for databases, Big Data, applications and APIs. Our Attribute Based Access Control (ABAC) solutions are ideal for enterprises and government agencies moving away from role-based frameworks, and into more context-aware policy-based access control models. The Axiomatics authorization suite is ideal for these organizations that must securely share information while complying with complex and ever-evolving regulations.
As more and more consumers, businesses, public sector companies and even whole countries are embracing the Digital Transformation, smart devices of all types are proliferating in all areas of our daily lives. It is safe to say, however, that, after the initial rush of making every device in the world smart and connected, the Internet of Things has already passed the peak of inflated expectations, with both vendors and users of the technology finally starting to care more about such things as interoperability and security.
The Consumer Identity World Tour is the place where you can dive deeper into the world of CIAM. Learn more about privacy by design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.