SlideShare a Scribd company logo
1 of 9
Download to read offline
Securely explore your data

SQRRL
OVERVIEW
Ely Kahn
VP Business Development
ely@sqrrl.com
WHO WE ARE

Sqrrl’s team has worked with the world’s largest
and most sensitive datasets for the last decade
!  Over 20 years of combined
Accumulo experience
!  Team includes former Technical
Director of Accumulo at NSA and
6 committers/contributors

Google’s
BigTable Paper
2006

NSA Builds
Accumulo
2008

NSA Open
Sources
Accumulo
2011

Sqrrl Founded
2012

1st Sqrrl Release
and Customers
2013

Investors:

© 2013 Sqrrl | All Rights Reserved | Proprietary and Confidential

2
THE PROBLEM

Security is the number one hurdle for adopting
Big Data solutions

© 2013 Sqrrl | All Rights Reserved | Proprietary and Confidential

3
ACCUMULO DATA FORMAT
An Accumulo key is a 5-tuple, consisting of:
!
!
!
!
!

 
 
 
 
 

Row: Controls Atomicity
Column Family: Controls Locality
Column Qualifier: Controls Uniqueness
Visibility Label: Controls Access
Timestamp: Controls Versioning

Row

Col. Fam.

Col. Qual.

Visibility

Timestamp

Value

John Doe

Notes

PCP

PCP_JD

20120912

Patient suffers
from an acute …

John Doe

Test Results

Cholesterol

JD|PCP_JD

20120912

183

John Doe

Test Results

Mental Health

JD|PSYCH_JD

20120801

Pass

John Doe

Test Results

X-Ray

JD|PHYS_JD

20120513

1010110110100…

Accumulo	
  Key/Value	
  Example	
  
© 2013 Sqrrl | All Rights Reserved

4
INDEXES AND QFDS

Input

Indexes
QuestionFocused
Datasets

© 2013 Sqrrl | All Rights Reserved

Transformation

Logs/
Observations

•  Immutable
•  Append-Only
•  Simple Security Model

• 
• 
• 
• 
• 
• 

Real-Time
Online
Sorted
Grouped
Aggregated
Complex Security
Model
5
SECURITY
Sqrrl Enterprise has a powerful security model featuring
Cell-Level Security™, encryption, & RBAC/ABAC

© 2013 Sqrrl | All Rights Reserved | Proprietary and Confidential

6
USE CASE

Many orgs are using Sqrrl Enterprise to enable a
Secure Data Lake™ capability (i.e., multitenancy)

Real-Time
Big Apps

© 2013 Sqrrl | All Rights Reserved | Proprietary and Confidential

7
USE CASE

Sqrrl Enterprise can integrate with Stream
Processing Engines (SPEs)
SPE

DATA

Actions

Dashboards

Interactive
Analysis Tools
(Discovery + Forensics)

1. 
2. 
3. 
4. 

SPE queries Sqrrl to enrich streaming data
SPE persists results in Sqrrl for future query
SPE takes action automatically
SPE issues data-driven alerts

© 2013 Sqrrl | All Rights Reserved | Proprietary and Confidential

5.  Sqrrl provides context for dashboards
6.  Analysis tools query use Sqrrl to search and
manipulate historical data

8
USE CASE

Sqrrl Enterprise powers operational apps in the
financial services industry
Signals & Alerting
On Events

Intra-Day, Client Real Time Apps;
Front Office

Historical & Analytical Questions;
Middle/Back Office

Real-Time Operational Apps

BI-Reporting/Analytics
Analytical DB

FX
Messages

SPE
Equity
Trades
Messages

•  Complex/Multi-Structured Data
•  Fine grain Security
•  Multi Tenancy/High Concurrency
•  Operational Data Store
•  Continuous Data Ingest
•  Indexed
•  Full Text Search
•  Dynamic Schema

Pull
Relevant
Data

•  MPP
•  Ad Hoc Complex
Queries
•  Structured
Analytics
•  Medium to low
concurrency

Enterprise Data Bus
© 2013 Sqrrl | All Rights Reserved | Proprietary and Confidential

9

More Related Content

What's hot

Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
scoopnewsgroup
 
SplunkLive! Customer Presentation - Penn State Hershey Medical Center
SplunkLive! Customer Presentation - Penn State Hershey Medical CenterSplunkLive! Customer Presentation - Penn State Hershey Medical Center
SplunkLive! Customer Presentation - Penn State Hershey Medical Center
Splunk
 
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera, Inc.
 

What's hot (15)

Sqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, AnalyzeSqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, Analyze
 
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
 
Machine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting StartedMachine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting Started
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
 
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera CaresGrace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
 
Getting Started with Splunk Enterprises
Getting Started with Splunk EnterprisesGetting Started with Splunk Enterprises
Getting Started with Splunk Enterprises
 
Hadoop Hadoop & Spark meetup - Altiscale
Hadoop Hadoop & Spark meetup - AltiscaleHadoop Hadoop & Spark meetup - Altiscale
Hadoop Hadoop & Spark meetup - Altiscale
 
Hopper energyservices
Hopper energyservicesHopper energyservices
Hopper energyservices
 
SplunkLive! Customer Presentation - Penn State Hershey Medical Center
SplunkLive! Customer Presentation - Penn State Hershey Medical CenterSplunkLive! Customer Presentation - Penn State Hershey Medical Center
SplunkLive! Customer Presentation - Penn State Hershey Medical Center
 
Get full visibility and find hidden security issues
Get full visibility and find hidden security issuesGet full visibility and find hidden security issues
Get full visibility and find hidden security issues
 
Fighting cybersecurity threats with Apache Spot
Fighting cybersecurity threats with Apache SpotFighting cybersecurity threats with Apache Spot
Fighting cybersecurity threats with Apache Spot
 
Witsml data processing with kafka and spark streaming
Witsml data processing with kafka and spark streamingWitsml data processing with kafka and spark streaming
Witsml data processing with kafka and spark streaming
 
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
 
Get a "Farm to Table" View of Your Data: Tracking Data Quality and Lineage, o...
Get a "Farm to Table" View of Your Data: Tracking Data Quality and Lineage, o...Get a "Farm to Table" View of Your Data: Tracking Data Quality and Lineage, o...
Get a "Farm to Table" View of Your Data: Tracking Data Quality and Lineage, o...
 
9 facts about statice's data anonymization solution
9 facts about statice's data anonymization solution9 facts about statice's data anonymization solution
9 facts about statice's data anonymization solution
 

Similar to Sqrrl Overview for Stac Research

13 2792 big-data_keynote_presentation_finalpass_05_d_v02
13 2792 big-data_keynote_presentation_finalpass_05_d_v0213 2792 big-data_keynote_presentation_finalpass_05_d_v02
13 2792 big-data_keynote_presentation_finalpass_05_d_v02
Erin Kerrigan
 
K2 oracle big data at work transform your business with analytics
K2 oracle big data at work transform your business with analyticsK2 oracle big data at work transform your business with analytics
K2 oracle big data at work transform your business with analytics
Dr. Wilfred Lin (Ph.D.)
 
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirementsMySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
Olivier DASINI
 
Mission possible splunk+paloaltonetworks_6_2015
Mission possible splunk+paloaltonetworks_6_2015Mission possible splunk+paloaltonetworks_6_2015
Mission possible splunk+paloaltonetworks_6_2015
Splunk
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Erin Sweeney
 
A6 harnessing the power of big data and business analytics to transform bus...
A6   harnessing the power of big data and business analytics to transform bus...A6   harnessing the power of big data and business analytics to transform bus...
A6 harnessing the power of big data and business analytics to transform bus...
Dr. Wilfred Lin (Ph.D.)
 

Similar to Sqrrl Overview for Stac Research (20)

Big data oracle_introduccion
Big data oracle_introduccionBig data oracle_introduccion
Big data oracle_introduccion
 
Meetup presenation 06192013
Meetup presenation 06192013 Meetup presenation 06192013
Meetup presenation 06192013
 
Breakout: Operational Analytics with Hadoop
Breakout: Operational Analytics with HadoopBreakout: Operational Analytics with Hadoop
Breakout: Operational Analytics with Hadoop
 
Splunk sales presentation
Splunk sales presentationSplunk sales presentation
Splunk sales presentation
 
13 2792 big-data_keynote_presentation_finalpass_05_d_v02
13 2792 big-data_keynote_presentation_finalpass_05_d_v0213 2792 big-data_keynote_presentation_finalpass_05_d_v02
13 2792 big-data_keynote_presentation_finalpass_05_d_v02
 
Apouc 2014-business-analytics-and-big-data
Apouc 2014-business-analytics-and-big-dataApouc 2014-business-analytics-and-big-data
Apouc 2014-business-analytics-and-big-data
 
Adam Fuchs' Accumulo Talk at NoSQL Now! 2013
Adam Fuchs' Accumulo Talk at NoSQL Now! 2013Adam Fuchs' Accumulo Talk at NoSQL Now! 2013
Adam Fuchs' Accumulo Talk at NoSQL Now! 2013
 
Big Data: Myths and Realities
Big Data: Myths and RealitiesBig Data: Myths and Realities
Big Data: Myths and Realities
 
Sqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric Security
 
Hadoop and Manufacturing
Hadoop and ManufacturingHadoop and Manufacturing
Hadoop and Manufacturing
 
Splunk live! Customer Presentation – Wellsfargo
Splunk live! Customer Presentation – WellsfargoSplunk live! Customer Presentation – Wellsfargo
Splunk live! Customer Presentation – Wellsfargo
 
K2 oracle big data at work transform your business with analytics
K2 oracle big data at work transform your business with analyticsK2 oracle big data at work transform your business with analytics
K2 oracle big data at work transform your business with analytics
 
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirementsMySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
 
Expand a Data warehouse with Hadoop and Big Data
Expand a Data warehouse with Hadoop and Big DataExpand a Data warehouse with Hadoop and Big Data
Expand a Data warehouse with Hadoop and Big Data
 
Mission possible splunk+paloaltonetworks_6_2015
Mission possible splunk+paloaltonetworks_6_2015Mission possible splunk+paloaltonetworks_6_2015
Mission possible splunk+paloaltonetworks_6_2015
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 
The New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the CloudThe New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the Cloud
 
Impala Unlocks Interactive BI on Hadoop
Impala Unlocks Interactive BI on HadoopImpala Unlocks Interactive BI on Hadoop
Impala Unlocks Interactive BI on Hadoop
 
A6 harnessing the power of big data and business analytics to transform bus...
A6   harnessing the power of big data and business analytics to transform bus...A6   harnessing the power of big data and business analytics to transform bus...
A6 harnessing the power of big data and business analytics to transform bus...
 
Big Data Roundtable. Why, how, where, which, and when to start doing Big Data
Big Data Roundtable. Why, how, where, which, and when to start doing Big DataBig Data Roundtable. Why, how, where, which, and when to start doing Big Data
Big Data Roundtable. Why, how, where, which, and when to start doing Big Data
 

More from Sqrrl

Performance Models for Apache Accumulo
Performance Models for Apache AccumuloPerformance Models for Apache Accumulo
Performance Models for Apache Accumulo
Sqrrl
 

More from Sqrrl (20)

Transitioning Government Technology
Transitioning Government TechnologyTransitioning Government Technology
Transitioning Government Technology
 
Leveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your HuntsLeveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your Hunts
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphUser and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
 
Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)
 
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar Users
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker Activity
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert Triage
 
The Linked Data Advantage
The Linked Data AdvantageThe Linked Data Advantage
The Linked Data Advantage
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber Hunting
 
Benchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value StoreBenchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value Store
 
Scalable Graph Clustering with Pregel
Scalable Graph Clustering with PregelScalable Graph Clustering with Pregel
Scalable Graph Clustering with Pregel
 
What's Next for Google's BigTable
What's Next for Google's BigTableWhat's Next for Google's BigTable
What's Next for Google's BigTable
 
April 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlApril 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with Sqrrl
 
Sqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch Webinar
 
Performance Models for Apache Accumulo
Performance Models for Apache AccumuloPerformance Models for Apache Accumulo
Performance Models for Apache Accumulo
 
Sqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl November Webinar: Encryption and Security in AccumuloSqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl November Webinar: Encryption and Security in Accumulo
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Sqrrl Overview for Stac Research

  • 1. Securely explore your data SQRRL OVERVIEW Ely Kahn VP Business Development ely@sqrrl.com
  • 2. WHO WE ARE Sqrrl’s team has worked with the world’s largest and most sensitive datasets for the last decade !  Over 20 years of combined Accumulo experience !  Team includes former Technical Director of Accumulo at NSA and 6 committers/contributors Google’s BigTable Paper 2006 NSA Builds Accumulo 2008 NSA Open Sources Accumulo 2011 Sqrrl Founded 2012 1st Sqrrl Release and Customers 2013 Investors: © 2013 Sqrrl | All Rights Reserved | Proprietary and Confidential 2
  • 3. THE PROBLEM Security is the number one hurdle for adopting Big Data solutions © 2013 Sqrrl | All Rights Reserved | Proprietary and Confidential 3
  • 4. ACCUMULO DATA FORMAT An Accumulo key is a 5-tuple, consisting of: ! ! ! ! !           Row: Controls Atomicity Column Family: Controls Locality Column Qualifier: Controls Uniqueness Visibility Label: Controls Access Timestamp: Controls Versioning Row Col. Fam. Col. Qual. Visibility Timestamp Value John Doe Notes PCP PCP_JD 20120912 Patient suffers from an acute … John Doe Test Results Cholesterol JD|PCP_JD 20120912 183 John Doe Test Results Mental Health JD|PSYCH_JD 20120801 Pass John Doe Test Results X-Ray JD|PHYS_JD 20120513 1010110110100… Accumulo  Key/Value  Example   © 2013 Sqrrl | All Rights Reserved 4
  • 5. INDEXES AND QFDS Input Indexes QuestionFocused Datasets © 2013 Sqrrl | All Rights Reserved Transformation Logs/ Observations •  Immutable •  Append-Only •  Simple Security Model •  •  •  •  •  •  Real-Time Online Sorted Grouped Aggregated Complex Security Model 5
  • 6. SECURITY Sqrrl Enterprise has a powerful security model featuring Cell-Level Security™, encryption, & RBAC/ABAC © 2013 Sqrrl | All Rights Reserved | Proprietary and Confidential 6
  • 7. USE CASE Many orgs are using Sqrrl Enterprise to enable a Secure Data Lake™ capability (i.e., multitenancy) Real-Time Big Apps © 2013 Sqrrl | All Rights Reserved | Proprietary and Confidential 7
  • 8. USE CASE Sqrrl Enterprise can integrate with Stream Processing Engines (SPEs) SPE DATA Actions Dashboards Interactive Analysis Tools (Discovery + Forensics) 1.  2.  3.  4.  SPE queries Sqrrl to enrich streaming data SPE persists results in Sqrrl for future query SPE takes action automatically SPE issues data-driven alerts © 2013 Sqrrl | All Rights Reserved | Proprietary and Confidential 5.  Sqrrl provides context for dashboards 6.  Analysis tools query use Sqrrl to search and manipulate historical data 8
  • 9. USE CASE Sqrrl Enterprise powers operational apps in the financial services industry Signals & Alerting On Events Intra-Day, Client Real Time Apps; Front Office Historical & Analytical Questions; Middle/Back Office Real-Time Operational Apps BI-Reporting/Analytics Analytical DB FX Messages SPE Equity Trades Messages •  Complex/Multi-Structured Data •  Fine grain Security •  Multi Tenancy/High Concurrency •  Operational Data Store •  Continuous Data Ingest •  Indexed •  Full Text Search •  Dynamic Schema Pull Relevant Data •  MPP •  Ad Hoc Complex Queries •  Structured Analytics •  Medium to low concurrency Enterprise Data Bus © 2013 Sqrrl | All Rights Reserved | Proprietary and Confidential 9