SlideShare a Scribd company logo
1 of 36
Download to read offline
Grab some
coffee and
enjoy the
pre-show
banter
before the
top of the
hour! !
The Briefing Room
Solving the Really Big Tech Problems with IoT
Welcome
Host:
Eric Kavanagh
eric.kavanagh@bloorgroup.com
@eric_kavanagh
u  Reveal the essential characteristics of enterprise
software, good and bad
u  Provide a forum for detailed analysis of today s innovative
technologies
u  Give vendors a chance to explain their product to savvy
analysts
u  Allow audience members to pose serious questions…and
get answers!
Mission
Topics
January: ANALYTICS
February: BIG DATA
March: CLOUD
The Rosetta Stone
u  MapReduce wasn’t enough
u  Spark is awesome, but still…
u  Kafka changed the game
u  NiFi is the capstone for
Hadoop!
Analyst
Robin Bloor is
Chief Analyst at
The Bloor Group
robin.bloor@bloorgroup.com
@robinbloor
HPE Security
u  HPE offers comprehensive data security and privacy
solutions for big data, the cloud and the Internet of
Things
u  Its solution features data encryption, tokenization and
key management
u  HPE partnered with Hortonworks to enhance its
DataFlow solution (powered by Apache NiFi) with data
protection
Guest
Reiner Kappenberger,
Global Product Management, Big Data
HPE Security – Data Security
Reiner Kappenberger has over 20 years of
computer software industry experience
focusing on encryption and security for Big
Data environments. His background ranges
from Device management in the
telecommunications sector to GIS and
database systems. He holds a Diploma from
the FH Regensburg, Germany in computer
science.
Solving the Really Big
Tech Problems with IoT
HPE Security – Data Security
January 17, 2017
2
HPE Security - Data Security
We protect the world’s most sensitive data
–  Protect the world’s largest brands & neutralize breach impact by securing
sensitive data-at-rest, in-use and in-motion.
–  Over 80 patents & 51 years of expertise
Our Solutions
–  Provide advanced encryption, tokenization & key management
Market leadership
–  Data-centric security solutions used by eight of the top ten U.S. payment
processors, nine of the top ten U.S. banks.
–  Thousands of enterprise customers across all industries including
transportation, retail, financial services, payment processing, banking,
insurance, high tech, healthcare, energy, telecom & public sector.
–  Email solution used by millions of users and thousands of enterprise & mid-
sized businesses including healthcare organizations, regional banks &
insurance providers.
–  Contribute technology to multiple standards organizations.
Why is securing Hadoop difficult?
Rapid innovation in a well
funded open source community
Multiple feeds of data in real time
from different sources with different
protection needs
Mainframe
MQ
RDBMs
XML
Salesforce
Flat
Files
Multiple types of data combined
in a Hadoop “Data Lake”
3
Why is securing Hadoop difficult?
4
Reduced control if Hadoop
clusters are deployed in a cloud
environment
Automatic replication of data across
multiple nodes once entered into
the HDFS data store
Access by many different users
with varying analytic needs
Introducing “Data-centric” security
5
Traditional IT
Infrastructure Security
Disk encryption
Database encryption
SSL/TLS/firewalls
Authentication
Management
Threats to
Data
Malware,
Insiders
SQL injection,
Malware
Traffic
Interceptors
Malware,
Insiders
Credential
Compromise
Security
Gaps
HPE SecureData
Data-centric Security
SSL/TLS/firewalls
Datasecuritycoverage
End-to-endProtection
Data
Ecosystem
Storage
File systems
Databases
Data and applications
Security gap
Security gap
Security gap
Security gap
Middleware
HPE Format-Preserving Encryption (FPE)
6
– Supports data of any format: name, address, dates, numbers, etc.
– Preserves referential integrity
– Only applications that need the original value need change
– Used for production protection and data masking
– NIST-standard using FF1 AES Encryption
AES - CBC
AES - FPE 253- 67-2356
8juYE%Uks&dDFa2345^WFLERG
First Name: Uywjlqo Last Name: Muwruwwbp
SSN: 253- 67-2356
DOB: 18-06-1972
Ija&3k24kQotugDF2390^32 0OWioNu2(*872weW
Oiuqwriuweuwr%oIUOw1@
First Name: Gunther
Last Name: Robertson
SSN: 934-72-2356
DOB: 20-07-1966
Tax ID
934-72-2356
Hyper Secure Stateless Tokenization (SST)
Credit Card
4171 5678 8765 4321
– Tokenization for PCI scope reduction
– Replaces token database with a smaller token mapping table
– Token values mapped using random numbers
– Lower costs
− No database hardware, software, replication problems, etc.
– Hyper SST technology is architected to leverage the latest compute-platform advances
7
SST 8736 5533 4678 9453
Partial SST 4171 5633 4678 4321
Obvious SST 4171 56AZ UYTZ 4321
BIN Mapping 1236 5533 4678 4321
Granular Policy Managed by HPE SecureData
– A policy consists of Data Formats, Protection, and Data Access Rules
8
Data Format Name – Field or Object
Type Alphabets, Formats
Logic Rules – Meaning Preservation Rules
Protection Method
Authentication Policy
FPE SST IBSE
Dynamic Masking Policy Mask Type, Mask
System Auth
Key Rotation Policy for Encryption, Caching Policy
Authorization Groups, Roles – No Access, Access, Masked Access
App Auth
App Permissions – Encrypt, Tokenization, Detokenize, Decrypt
Note: Some features vary by platform, use of LDAP, IAM, IDM
LDAP, Groups
PKI, Secret, IP
ranges, custom
adapters/Java
Securing Sensitive Data in Big Data Platforms and Hadoop
9
Public
data
Big Data Platform
Teradata, Vertica, Hadoop
Sqoop
Hive
UDFs
Map
Reduce
“Landing
zone”
TDE
SQL Spark
Sensor
Data
Power
user re-
identifies
data
BI tools
work on
protected
data
Business
processes
use
protected
data
Laptop
log files
Server
log files
Any data
Source
Flume
NiFi
Storm
Kafka
60 Data Sources
20 Million records
per day = 1TB
250 Nodes
LDAP
Sensitive
structured
sources
Hadoop Cluster
Sqoop
Flume
Storm
Hive
UDFs
Map Reduce
Staging Area
HPE SecureData
File Processor
Teradata EDW
UDFs
Data
Virtualization
layer
Tableau
Analytics &
Data Science
HPE SecureData
Key Servers & WS
API’s
Leading Telecoms Provider – Big Data Primary Data Flow
Data
Cleansing
22
Threats in the IoT Space
11
Public
data
Sqoop
Hive
UDFs
Map
Reduce
“Landing
zone”
TDE
SQL Spark
Sensor
Data
Power
user re-
identifies
data
BI tools
work on
protected
data
Business
processes
use
protected
data
Laptop
log files
Server
log files
Any data
Source
Flume
NiFi
Storm
Kafka
Back-end infrastructure
Leading car manufacturer – Big Data primary data flow
12
Sensitive
structured data
Hadoop Edge
Nodes
HPE SecureData
Hadoop Tools
Hadoop Cluster Data Warehouse
Sensitive
structured
sources
Cognos
Analytics &
Data Science
HPE SecureData
Key Servers &
WS API’s
~2 Billion real time
transactions/day
Other real-time data
feeds – customer
data from
dealerships,
manufacturers
Sqoop
Hive
UDFs
Map Reduces
“Landing
zone”
“Integration
Controls”
Flume real
time ingest
Existing data sets
and 3rd party data,
e.g.. accident data
UDFs
IBM DataStage
Thank you
13
Perceptions & Questions
Analyst:
Robin Bloor
The Nature of Data in
Motion
Robin Bloor, PhD
Event Management and Processing
We have gradually entered an event-
based IT world.
It brings with it new realities.
We need to consider “data in motion.”
New Realities
u  A good deal of (new) data is
now sourced from outside the
business
u  Data has to be governed
u  Provenance and lineage
matter
u  There is no perimeter
anywhere -- data access
permissions and encryption
apply everywhere
§  Time
§  Geographic location
§  Virtual/logical
location
§  Source device
§  Device ID
§  Ownership and actors
§  Data
Events and Event Data
§  Apache project from
NSA (2015)
§  Highly scalable
§  Parallel operation
§  A distributed data
flow platform
§  Point to point (pull-
push)
§  IoT
§  Apache Project from
LinkedIn (2015)
§  Highly scalable
§  Parallel operation
§  A distributed streaming
platform
§  Publish Subscribe
(push-pull)
§  Not so much IoT
NiFi v Kafka
NiFi Kafka
A View of a Coherent Data Lake
u  Data Lakes are complex -
more complex, for
example, than a data
warehouse
u  It’s becoming obvious that
streaming and data flow
are inherent to the data
lake
u  It is the primary place of
governance
u  There needs to be a
strategy for data
Secure
Transform &
Aggregate
Ingest
Extracts
Network Devices IoTMobileServers Desktops
Embedded Chips RFID The Cloud Log Files
OSes VMsESB/Messaging Software Sys Mgt Apps
Social Network DataWeb Services Data Streams
WorkflowBI & Office AppsBusiness AppsSaaS
To
Databases
Data Marts
Other Apps
Search &
Query
BI, Visual'n
& Analytics
Other
Apps
ETL
D
A
T
A
S
T
O
R
A
G
E
A
R
C
H
I
V
E
Real-Time
Apps
Metadata
MGT
Data
Cleansing
Life
Cycle
Compliance and Regulations
u  Aside from sector initiatives there
are many official regulations:
HIPAA, SOX, FISMA, FERPA, GLBA
(mainly US legislation)
u  Standards (Global): PCI-DSS, ISO/
IEC 17799 (data should be owned)
u  National regulations differ
country to country (even in
Europe)
u  GDPR being negotiated
The Challenges
It is ceasing to be possible to include
security as an afterthought.
Security needs to be designed in from
the get go.
u  How many companies doing big data projects
do you believe have security properly
organized? Is anything happening that is likely
to complicate the situation even more?
u  Security often comes with performance
penalties. What is the performance cost of
the solutions you are advocating?
u  Costs? How much budget needs to be
allocated? Can you give a feel for this?
u  Where do you tend to see NiFi and Kafka (Storm,
Flume, Flink…) being used?
u  Security needs to be integrated, so encryption
needs to shake hands with authentication. How
does HPE make this work?
u  Are there any environments/applications to
which HPE’s security technology is inapplicable:
OLTP, Data Streaming & Streaming Analytics, BI,
Mobile, Cloud, etc.…
Upcoming Topics
www.insideanalysis.com
January: ANALYTICS
February: BIG DATA
March: CLOUD
THANK YOU
for your
ATTENTION!
Some images provided courtesy of Wikimedia Commons

More Related Content

What's hot

3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data securityKeith Braswell
 
Big Data & Oracle Technologies
Big Data & Oracle TechnologiesBig Data & Oracle Technologies
Big Data & Oracle TechnologiesOleksii Movchaniuk
 
Enterprise Apache Hadoop: State of the Union
Enterprise Apache Hadoop: State of the UnionEnterprise Apache Hadoop: State of the Union
Enterprise Apache Hadoop: State of the UnionHortonworks
 
Data Science at Speed. At Scale.
Data Science at Speed. At Scale.Data Science at Speed. At Scale.
Data Science at Speed. At Scale.DataWorks Summit
 
Big Data Analytics with Hadoop
Big Data Analytics with HadoopBig Data Analytics with Hadoop
Big Data Analytics with HadoopPhilippe Julio
 
Organising the Data Lake - Information Management in a Big Data World
Organising the Data Lake - Information Management in a Big Data WorldOrganising the Data Lake - Information Management in a Big Data World
Organising the Data Lake - Information Management in a Big Data WorldDataWorks Summit/Hadoop Summit
 
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...DataWorks Summit
 
RDBMS vs Hadoop vs Spark
RDBMS vs Hadoop vs SparkRDBMS vs Hadoop vs Spark
RDBMS vs Hadoop vs SparkLaxmi8
 
Spark and Hadoop Perfect Togeher by Arun Murthy
Spark and Hadoop Perfect Togeher by Arun MurthySpark and Hadoop Perfect Togeher by Arun Murthy
Spark and Hadoop Perfect Togeher by Arun MurthySpark Summit
 
Open source stak of big data techs open suse asia
Open source stak of big data techs   open suse asiaOpen source stak of big data techs   open suse asia
Open source stak of big data techs open suse asiaMuhammad Rifqi
 
Voltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in HadoopVoltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in HadoopHPE Security - Data Security
 
Oil and gas big data edition
Oil and gas  big data editionOil and gas  big data edition
Oil and gas big data editionMark Kerzner
 
IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET Journal
 
Rob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoopRob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoopGhassan Al-Yafie
 
Continuous Data Ingestion pipeline for the Enterprise
Continuous Data Ingestion pipeline for the EnterpriseContinuous Data Ingestion pipeline for the Enterprise
Continuous Data Ingestion pipeline for the EnterpriseDataWorks Summit
 
IT @ Intel: Preparing the Future Enterprise with the Internet of Things
IT @ Intel: Preparing the Future Enterprise with the Internet of ThingsIT @ Intel: Preparing the Future Enterprise with the Internet of Things
IT @ Intel: Preparing the Future Enterprise with the Internet of ThingsIntel IT Center
 
Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Hortonworks
 
Big Data, Hadoop, Hortonworks and Microsoft HDInsight
Big Data, Hadoop, Hortonworks and Microsoft HDInsightBig Data, Hadoop, Hortonworks and Microsoft HDInsight
Big Data, Hadoop, Hortonworks and Microsoft HDInsightHortonworks
 

What's hot (20)

3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 
Big Data & Oracle Technologies
Big Data & Oracle TechnologiesBig Data & Oracle Technologies
Big Data & Oracle Technologies
 
Enterprise Apache Hadoop: State of the Union
Enterprise Apache Hadoop: State of the UnionEnterprise Apache Hadoop: State of the Union
Enterprise Apache Hadoop: State of the Union
 
Data Science at Speed. At Scale.
Data Science at Speed. At Scale.Data Science at Speed. At Scale.
Data Science at Speed. At Scale.
 
Big Data Analytics with Hadoop
Big Data Analytics with HadoopBig Data Analytics with Hadoop
Big Data Analytics with Hadoop
 
Big Data Tech Stack
Big Data Tech StackBig Data Tech Stack
Big Data Tech Stack
 
Organising the Data Lake - Information Management in a Big Data World
Organising the Data Lake - Information Management in a Big Data WorldOrganising the Data Lake - Information Management in a Big Data World
Organising the Data Lake - Information Management in a Big Data World
 
BIG DATA
BIG DATABIG DATA
BIG DATA
 
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
 
RDBMS vs Hadoop vs Spark
RDBMS vs Hadoop vs SparkRDBMS vs Hadoop vs Spark
RDBMS vs Hadoop vs Spark
 
Spark and Hadoop Perfect Togeher by Arun Murthy
Spark and Hadoop Perfect Togeher by Arun MurthySpark and Hadoop Perfect Togeher by Arun Murthy
Spark and Hadoop Perfect Togeher by Arun Murthy
 
Open source stak of big data techs open suse asia
Open source stak of big data techs   open suse asiaOpen source stak of big data techs   open suse asia
Open source stak of big data techs open suse asia
 
Voltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in HadoopVoltage Security, Protecting Sensitive Data in Hadoop
Voltage Security, Protecting Sensitive Data in Hadoop
 
Oil and gas big data edition
Oil and gas  big data editionOil and gas  big data edition
Oil and gas big data edition
 
IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop Environment
 
Rob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoopRob peglar introduction_analytics _big data_hadoop
Rob peglar introduction_analytics _big data_hadoop
 
Continuous Data Ingestion pipeline for the Enterprise
Continuous Data Ingestion pipeline for the EnterpriseContinuous Data Ingestion pipeline for the Enterprise
Continuous Data Ingestion pipeline for the Enterprise
 
IT @ Intel: Preparing the Future Enterprise with the Internet of Things
IT @ Intel: Preparing the Future Enterprise with the Internet of ThingsIT @ Intel: Preparing the Future Enterprise with the Internet of Things
IT @ Intel: Preparing the Future Enterprise with the Internet of Things
 
Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25
 
Big Data, Hadoop, Hortonworks and Microsoft HDInsight
Big Data, Hadoop, Hortonworks and Microsoft HDInsightBig Data, Hadoop, Hortonworks and Microsoft HDInsight
Big Data, Hadoop, Hortonworks and Microsoft HDInsight
 

Viewers also liked

Test your taste buds
Test your taste budsTest your taste buds
Test your taste budskelsey-jane
 
Auto bodies
Auto bodiesAuto bodies
Auto bodiesM-droid
 
Warsztaty PR-u i komunikacji | Opinie
Warsztaty PR-u i komunikacji | OpinieWarsztaty PR-u i komunikacji | Opinie
Warsztaty PR-u i komunikacji | Opiniesawares
 
Warsztaty Active Image | Opinie
Warsztaty Active Image | OpinieWarsztaty Active Image | Opinie
Warsztaty Active Image | Opiniesawares
 
Presentation dual inversion-index
Presentation dual inversion-indexPresentation dual inversion-index
Presentation dual inversion-indexmahi_uta
 
Arcadian Landscapes
Arcadian LandscapesArcadian Landscapes
Arcadian LandscapesM-droid
 
See the Whole Story: The Case for a Visualization Platform
See the Whole Story: The Case for a Visualization PlatformSee the Whole Story: The Case for a Visualization Platform
See the Whole Story: The Case for a Visualization PlatformEric Kavanagh
 
Who, What, Where and How: Why You Want to Know
 Who, What, Where and How: Why You Want to Know Who, What, Where and How: Why You Want to Know
Who, What, Where and How: Why You Want to KnowEric Kavanagh
 
The Art of Visibility: Enabling Multi-Platform Management
The Art of Visibility: Enabling Multi-Platform ManagementThe Art of Visibility: Enabling Multi-Platform Management
The Art of Visibility: Enabling Multi-Platform ManagementEric Kavanagh
 
A Better Understanding: Solving Business Challenges with Data
A Better Understanding: Solving Business Challenges with DataA Better Understanding: Solving Business Challenges with Data
A Better Understanding: Solving Business Challenges with DataEric Kavanagh
 
The Key to Effective Analytics: Fast-Returning Queries
The Key to Effective Analytics: Fast-Returning QueriesThe Key to Effective Analytics: Fast-Returning Queries
The Key to Effective Analytics: Fast-Returning QueriesEric Kavanagh
 
Extracción-de-la-muestra-_ Clase Nº 2 Hematología
Extracción-de-la-muestra-_ Clase Nº 2  Hematología Extracción-de-la-muestra-_ Clase Nº 2  Hematología
Extracción-de-la-muestra-_ Clase Nº 2 Hematología gabriela aguilar
 
The Central Hub: Defining the Data Lake
The Central Hub: Defining the Data LakeThe Central Hub: Defining the Data Lake
The Central Hub: Defining the Data LakeEric Kavanagh
 
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 Mind Your Business: Why Privacy Matters to the Successful Enterprise Mind Your Business: Why Privacy Matters to the Successful Enterprise
Mind Your Business: Why Privacy Matters to the Successful EnterpriseEric Kavanagh
 
A Tight Ship: How Containers and SDS Optimize the Enterprise
 A Tight Ship: How Containers and SDS Optimize the Enterprise A Tight Ship: How Containers and SDS Optimize the Enterprise
A Tight Ship: How Containers and SDS Optimize the EnterpriseEric Kavanagh
 

Viewers also liked (16)

Test your taste buds
Test your taste budsTest your taste buds
Test your taste buds
 
Auto bodies
Auto bodiesAuto bodies
Auto bodies
 
Warsztaty PR-u i komunikacji | Opinie
Warsztaty PR-u i komunikacji | OpinieWarsztaty PR-u i komunikacji | Opinie
Warsztaty PR-u i komunikacji | Opinie
 
Warsztaty Active Image | Opinie
Warsztaty Active Image | OpinieWarsztaty Active Image | Opinie
Warsztaty Active Image | Opinie
 
Presentation dual inversion-index
Presentation dual inversion-indexPresentation dual inversion-index
Presentation dual inversion-index
 
Arcadian Landscapes
Arcadian LandscapesArcadian Landscapes
Arcadian Landscapes
 
See the Whole Story: The Case for a Visualization Platform
See the Whole Story: The Case for a Visualization PlatformSee the Whole Story: The Case for a Visualization Platform
See the Whole Story: The Case for a Visualization Platform
 
Who, What, Where and How: Why You Want to Know
 Who, What, Where and How: Why You Want to Know Who, What, Where and How: Why You Want to Know
Who, What, Where and How: Why You Want to Know
 
The Art of Visibility: Enabling Multi-Platform Management
The Art of Visibility: Enabling Multi-Platform ManagementThe Art of Visibility: Enabling Multi-Platform Management
The Art of Visibility: Enabling Multi-Platform Management
 
A Better Understanding: Solving Business Challenges with Data
A Better Understanding: Solving Business Challenges with DataA Better Understanding: Solving Business Challenges with Data
A Better Understanding: Solving Business Challenges with Data
 
My OS
My OSMy OS
My OS
 
The Key to Effective Analytics: Fast-Returning Queries
The Key to Effective Analytics: Fast-Returning QueriesThe Key to Effective Analytics: Fast-Returning Queries
The Key to Effective Analytics: Fast-Returning Queries
 
Extracción-de-la-muestra-_ Clase Nº 2 Hematología
Extracción-de-la-muestra-_ Clase Nº 2  Hematología Extracción-de-la-muestra-_ Clase Nº 2  Hematología
Extracción-de-la-muestra-_ Clase Nº 2 Hematología
 
The Central Hub: Defining the Data Lake
The Central Hub: Defining the Data LakeThe Central Hub: Defining the Data Lake
The Central Hub: Defining the Data Lake
 
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 Mind Your Business: Why Privacy Matters to the Successful Enterprise Mind Your Business: Why Privacy Matters to the Successful Enterprise
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 
A Tight Ship: How Containers and SDS Optimize the Enterprise
 A Tight Ship: How Containers and SDS Optimize the Enterprise A Tight Ship: How Containers and SDS Optimize the Enterprise
A Tight Ship: How Containers and SDS Optimize the Enterprise
 

Similar to Solving the Really Big Tech Problems with IoT

Big data data lake and beyond
Big data data lake and beyond Big data data lake and beyond
Big data data lake and beyond Rajesh Kumar
 
To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security Inside Analysis
 
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...Denodo
 
Big data processing with apache spark
Big data processing with apache sparkBig data processing with apache spark
Big data processing with apache sparksarith divakar
 
Getting Started with Data Virtualization – What problems DV solves
Getting Started with Data Virtualization – What problems DV solvesGetting Started with Data Virtualization – What problems DV solves
Getting Started with Data Virtualization – What problems DV solvesDenodo
 
Internet of Things and Hadoop
Internet of Things and HadoopInternet of Things and Hadoop
Internet of Things and Hadoopaziksa
 
Deutsche Telekom on Big Data
Deutsche Telekom on Big DataDeutsche Telekom on Big Data
Deutsche Telekom on Big DataDataWorks Summit
 
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization Denodo
 
Bigdata and Hadoop Bootcamp
Bigdata and Hadoop BootcampBigdata and Hadoop Bootcamp
Bigdata and Hadoop BootcampSpotle.ai
 
Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloudsornalathaNatarajan
 
Introduction Big Data
Introduction Big DataIntroduction Big Data
Introduction Big DataFrank Kienle
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsat MicroFocus Italy ❖✔
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsat MicroFocus Italy ❖✔
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 
Big Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsBig Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsMarco Casassa Mont
 
Role of cloud and analytics in IoT
Role of cloud and analytics in IoTRole of cloud and analytics in IoT
Role of cloud and analytics in IoTSelvaraj Kesavan
 
Cloud Computing & Big Data
Cloud Computing & Big DataCloud Computing & Big Data
Cloud Computing & Big DataMrinal Kumar
 
The Practice of Big Data - The Hadoop ecosystem explained with usage scenarios
The Practice of Big Data - The Hadoop ecosystem explained with usage scenariosThe Practice of Big Data - The Hadoop ecosystem explained with usage scenarios
The Practice of Big Data - The Hadoop ecosystem explained with usage scenarioskcmallu
 
Big Data - A Real Life Revolution
Big Data - A Real Life RevolutionBig Data - A Real Life Revolution
Big Data - A Real Life RevolutionCapgemini
 

Similar to Solving the Really Big Tech Problems with IoT (20)

Big data data lake and beyond
Big data data lake and beyond Big data data lake and beyond
Big data data lake and beyond
 
To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security
 
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
 
Haven 2 0
Haven 2 0 Haven 2 0
Haven 2 0
 
Big data processing with apache spark
Big data processing with apache sparkBig data processing with apache spark
Big data processing with apache spark
 
Getting Started with Data Virtualization – What problems DV solves
Getting Started with Data Virtualization – What problems DV solvesGetting Started with Data Virtualization – What problems DV solves
Getting Started with Data Virtualization – What problems DV solves
 
Internet of Things and Hadoop
Internet of Things and HadoopInternet of Things and Hadoop
Internet of Things and Hadoop
 
Deutsche Telekom on Big Data
Deutsche Telekom on Big DataDeutsche Telekom on Big Data
Deutsche Telekom on Big Data
 
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization
 
Bigdata and Hadoop Bootcamp
Bigdata and Hadoop BootcampBigdata and Hadoop Bootcamp
Bigdata and Hadoop Bootcamp
 
Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloud
 
Introduction Big Data
Introduction Big DataIntroduction Big Data
Introduction Big Data
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Big Data for Security - DNS Analytics
Big Data for Security - DNS AnalyticsBig Data for Security - DNS Analytics
Big Data for Security - DNS Analytics
 
Role of cloud and analytics in IoT
Role of cloud and analytics in IoTRole of cloud and analytics in IoT
Role of cloud and analytics in IoT
 
Cloud Computing & Big Data
Cloud Computing & Big DataCloud Computing & Big Data
Cloud Computing & Big Data
 
The Practice of Big Data - The Hadoop ecosystem explained with usage scenarios
The Practice of Big Data - The Hadoop ecosystem explained with usage scenariosThe Practice of Big Data - The Hadoop ecosystem explained with usage scenarios
The Practice of Big Data - The Hadoop ecosystem explained with usage scenarios
 
Big Data - A Real Life Revolution
Big Data - A Real Life RevolutionBig Data - A Real Life Revolution
Big Data - A Real Life Revolution
 

More from Eric Kavanagh

The Future of Data Warehousing and Data Integration
The Future of Data Warehousing and Data IntegrationThe Future of Data Warehousing and Data Integration
The Future of Data Warehousing and Data IntegrationEric Kavanagh
 
Best Practices in DataOps: How to Create Agile, Automated Data Pipelines
Best Practices in DataOps: How to Create Agile, Automated Data PipelinesBest Practices in DataOps: How to Create Agile, Automated Data Pipelines
Best Practices in DataOps: How to Create Agile, Automated Data PipelinesEric Kavanagh
 
Expediting the Path to Discovery with Multi-Source Analysis
Expediting the Path to Discovery with Multi-Source AnalysisExpediting the Path to Discovery with Multi-Source Analysis
Expediting the Path to Discovery with Multi-Source AnalysisEric Kavanagh
 
Will AI Eliminate Reports and Dashboards
Will AI Eliminate Reports and DashboardsWill AI Eliminate Reports and Dashboards
Will AI Eliminate Reports and DashboardsEric Kavanagh
 
Metadata Mastery: A Big Step for BI Modernization
Metadata Mastery: A Big Step for BI ModernizationMetadata Mastery: A Big Step for BI Modernization
Metadata Mastery: A Big Step for BI ModernizationEric Kavanagh
 
Horses for Courses: Database Roundtable
Horses for Courses: Database RoundtableHorses for Courses: Database Roundtable
Horses for Courses: Database RoundtableEric Kavanagh
 
Database Survival Guide: Exploratory Webcast
Database Survival Guide: Exploratory WebcastDatabase Survival Guide: Exploratory Webcast
Database Survival Guide: Exploratory WebcastEric Kavanagh
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityEric Kavanagh
 
The Model Enterprise: A Blueprint for Enterprise Data Governance
The Model Enterprise: A Blueprint for Enterprise Data GovernanceThe Model Enterprise: A Blueprint for Enterprise Data Governance
The Model Enterprise: A Blueprint for Enterprise Data GovernanceEric Kavanagh
 
Best Laid Plans: Saving Time, Money and Trouble with Optimal Forecasting
Best Laid Plans: Saving Time, Money and Trouble with Optimal ForecastingBest Laid Plans: Saving Time, Money and Trouble with Optimal Forecasting
Best Laid Plans: Saving Time, Money and Trouble with Optimal ForecastingEric Kavanagh
 
A Winning Strategy for the Digital Economy
A Winning Strategy for the Digital EconomyA Winning Strategy for the Digital Economy
A Winning Strategy for the Digital EconomyEric Kavanagh
 
Discovering Big Data in the Fog: Why Catalogs Matter
 Discovering Big Data in the Fog: Why Catalogs Matter Discovering Big Data in the Fog: Why Catalogs Matter
Discovering Big Data in the Fog: Why Catalogs MatterEric Kavanagh
 
Health Check: Maintaining Enterprise BI
Health Check: Maintaining Enterprise BIHealth Check: Maintaining Enterprise BI
Health Check: Maintaining Enterprise BIEric Kavanagh
 
Rapid Response: Debugging and Profiling to the Rescue
Rapid Response: Debugging and Profiling to the RescueRapid Response: Debugging and Profiling to the Rescue
Rapid Response: Debugging and Profiling to the RescueEric Kavanagh
 
Beyond the Platform: Enabling Fluid Analysis
Beyond the Platform: Enabling Fluid AnalysisBeyond the Platform: Enabling Fluid Analysis
Beyond the Platform: Enabling Fluid AnalysisEric Kavanagh
 
Protect Your Database: High Availability for High Demand Data
 Protect Your Database: High Availability for High Demand Data Protect Your Database: High Availability for High Demand Data
Protect Your Database: High Availability for High Demand DataEric Kavanagh
 
Application Acceleration: Faster Performance for End Users
Application Acceleration: Faster Performance for End Users	Application Acceleration: Faster Performance for End Users
Application Acceleration: Faster Performance for End Users Eric Kavanagh
 
Time's Up! Getting Value from Big Data Now
Time's Up! Getting Value from Big Data NowTime's Up! Getting Value from Big Data Now
Time's Up! Getting Value from Big Data NowEric Kavanagh
 
The New Normal: Dealing with the Reality of an Unsecure World
The New Normal: Dealing with the Reality of an Unsecure WorldThe New Normal: Dealing with the Reality of an Unsecure World
The New Normal: Dealing with the Reality of an Unsecure WorldEric Kavanagh
 
A Bigger Magnifying Glass: Analyzing the Internet of Things
A Bigger Magnifying Glass: Analyzing the Internet of Things	A Bigger Magnifying Glass: Analyzing the Internet of Things
A Bigger Magnifying Glass: Analyzing the Internet of Things Eric Kavanagh
 

More from Eric Kavanagh (20)

The Future of Data Warehousing and Data Integration
The Future of Data Warehousing and Data IntegrationThe Future of Data Warehousing and Data Integration
The Future of Data Warehousing and Data Integration
 
Best Practices in DataOps: How to Create Agile, Automated Data Pipelines
Best Practices in DataOps: How to Create Agile, Automated Data PipelinesBest Practices in DataOps: How to Create Agile, Automated Data Pipelines
Best Practices in DataOps: How to Create Agile, Automated Data Pipelines
 
Expediting the Path to Discovery with Multi-Source Analysis
Expediting the Path to Discovery with Multi-Source AnalysisExpediting the Path to Discovery with Multi-Source Analysis
Expediting the Path to Discovery with Multi-Source Analysis
 
Will AI Eliminate Reports and Dashboards
Will AI Eliminate Reports and DashboardsWill AI Eliminate Reports and Dashboards
Will AI Eliminate Reports and Dashboards
 
Metadata Mastery: A Big Step for BI Modernization
Metadata Mastery: A Big Step for BI ModernizationMetadata Mastery: A Big Step for BI Modernization
Metadata Mastery: A Big Step for BI Modernization
 
Horses for Courses: Database Roundtable
Horses for Courses: Database RoundtableHorses for Courses: Database Roundtable
Horses for Courses: Database Roundtable
 
Database Survival Guide: Exploratory Webcast
Database Survival Guide: Exploratory WebcastDatabase Survival Guide: Exploratory Webcast
Database Survival Guide: Exploratory Webcast
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
The Model Enterprise: A Blueprint for Enterprise Data Governance
The Model Enterprise: A Blueprint for Enterprise Data GovernanceThe Model Enterprise: A Blueprint for Enterprise Data Governance
The Model Enterprise: A Blueprint for Enterprise Data Governance
 
Best Laid Plans: Saving Time, Money and Trouble with Optimal Forecasting
Best Laid Plans: Saving Time, Money and Trouble with Optimal ForecastingBest Laid Plans: Saving Time, Money and Trouble with Optimal Forecasting
Best Laid Plans: Saving Time, Money and Trouble with Optimal Forecasting
 
A Winning Strategy for the Digital Economy
A Winning Strategy for the Digital EconomyA Winning Strategy for the Digital Economy
A Winning Strategy for the Digital Economy
 
Discovering Big Data in the Fog: Why Catalogs Matter
 Discovering Big Data in the Fog: Why Catalogs Matter Discovering Big Data in the Fog: Why Catalogs Matter
Discovering Big Data in the Fog: Why Catalogs Matter
 
Health Check: Maintaining Enterprise BI
Health Check: Maintaining Enterprise BIHealth Check: Maintaining Enterprise BI
Health Check: Maintaining Enterprise BI
 
Rapid Response: Debugging and Profiling to the Rescue
Rapid Response: Debugging and Profiling to the RescueRapid Response: Debugging and Profiling to the Rescue
Rapid Response: Debugging and Profiling to the Rescue
 
Beyond the Platform: Enabling Fluid Analysis
Beyond the Platform: Enabling Fluid AnalysisBeyond the Platform: Enabling Fluid Analysis
Beyond the Platform: Enabling Fluid Analysis
 
Protect Your Database: High Availability for High Demand Data
 Protect Your Database: High Availability for High Demand Data Protect Your Database: High Availability for High Demand Data
Protect Your Database: High Availability for High Demand Data
 
Application Acceleration: Faster Performance for End Users
Application Acceleration: Faster Performance for End Users	Application Acceleration: Faster Performance for End Users
Application Acceleration: Faster Performance for End Users
 
Time's Up! Getting Value from Big Data Now
Time's Up! Getting Value from Big Data NowTime's Up! Getting Value from Big Data Now
Time's Up! Getting Value from Big Data Now
 
The New Normal: Dealing with the Reality of an Unsecure World
The New Normal: Dealing with the Reality of an Unsecure WorldThe New Normal: Dealing with the Reality of an Unsecure World
The New Normal: Dealing with the Reality of an Unsecure World
 
A Bigger Magnifying Glass: Analyzing the Internet of Things
A Bigger Magnifying Glass: Analyzing the Internet of Things	A Bigger Magnifying Glass: Analyzing the Internet of Things
A Bigger Magnifying Glass: Analyzing the Internet of Things
 

Recently uploaded

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Recently uploaded (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Solving the Really Big Tech Problems with IoT

  • 1. Grab some coffee and enjoy the pre-show banter before the top of the hour! !
  • 2. The Briefing Room Solving the Really Big Tech Problems with IoT
  • 4. u  Reveal the essential characteristics of enterprise software, good and bad u  Provide a forum for detailed analysis of today s innovative technologies u  Give vendors a chance to explain their product to savvy analysts u  Allow audience members to pose serious questions…and get answers! Mission
  • 6. The Rosetta Stone u  MapReduce wasn’t enough u  Spark is awesome, but still… u  Kafka changed the game u  NiFi is the capstone for Hadoop!
  • 7. Analyst Robin Bloor is Chief Analyst at The Bloor Group robin.bloor@bloorgroup.com @robinbloor
  • 8. HPE Security u  HPE offers comprehensive data security and privacy solutions for big data, the cloud and the Internet of Things u  Its solution features data encryption, tokenization and key management u  HPE partnered with Hortonworks to enhance its DataFlow solution (powered by Apache NiFi) with data protection
  • 9. Guest Reiner Kappenberger, Global Product Management, Big Data HPE Security – Data Security Reiner Kappenberger has over 20 years of computer software industry experience focusing on encryption and security for Big Data environments. His background ranges from Device management in the telecommunications sector to GIS and database systems. He holds a Diploma from the FH Regensburg, Germany in computer science.
  • 10. Solving the Really Big Tech Problems with IoT HPE Security – Data Security January 17, 2017
  • 11. 2 HPE Security - Data Security We protect the world’s most sensitive data –  Protect the world’s largest brands & neutralize breach impact by securing sensitive data-at-rest, in-use and in-motion. –  Over 80 patents & 51 years of expertise Our Solutions –  Provide advanced encryption, tokenization & key management Market leadership –  Data-centric security solutions used by eight of the top ten U.S. payment processors, nine of the top ten U.S. banks. –  Thousands of enterprise customers across all industries including transportation, retail, financial services, payment processing, banking, insurance, high tech, healthcare, energy, telecom & public sector. –  Email solution used by millions of users and thousands of enterprise & mid- sized businesses including healthcare organizations, regional banks & insurance providers. –  Contribute technology to multiple standards organizations.
  • 12. Why is securing Hadoop difficult? Rapid innovation in a well funded open source community Multiple feeds of data in real time from different sources with different protection needs Mainframe MQ RDBMs XML Salesforce Flat Files Multiple types of data combined in a Hadoop “Data Lake” 3
  • 13. Why is securing Hadoop difficult? 4 Reduced control if Hadoop clusters are deployed in a cloud environment Automatic replication of data across multiple nodes once entered into the HDFS data store Access by many different users with varying analytic needs
  • 14. Introducing “Data-centric” security 5 Traditional IT Infrastructure Security Disk encryption Database encryption SSL/TLS/firewalls Authentication Management Threats to Data Malware, Insiders SQL injection, Malware Traffic Interceptors Malware, Insiders Credential Compromise Security Gaps HPE SecureData Data-centric Security SSL/TLS/firewalls Datasecuritycoverage End-to-endProtection Data Ecosystem Storage File systems Databases Data and applications Security gap Security gap Security gap Security gap Middleware
  • 15. HPE Format-Preserving Encryption (FPE) 6 – Supports data of any format: name, address, dates, numbers, etc. – Preserves referential integrity – Only applications that need the original value need change – Used for production protection and data masking – NIST-standard using FF1 AES Encryption AES - CBC AES - FPE 253- 67-2356 8juYE%Uks&dDFa2345^WFLERG First Name: Uywjlqo Last Name: Muwruwwbp SSN: 253- 67-2356 DOB: 18-06-1972 Ija&3k24kQotugDF2390^32 0OWioNu2(*872weW Oiuqwriuweuwr%oIUOw1@ First Name: Gunther Last Name: Robertson SSN: 934-72-2356 DOB: 20-07-1966 Tax ID 934-72-2356
  • 16. Hyper Secure Stateless Tokenization (SST) Credit Card 4171 5678 8765 4321 – Tokenization for PCI scope reduction – Replaces token database with a smaller token mapping table – Token values mapped using random numbers – Lower costs − No database hardware, software, replication problems, etc. – Hyper SST technology is architected to leverage the latest compute-platform advances 7 SST 8736 5533 4678 9453 Partial SST 4171 5633 4678 4321 Obvious SST 4171 56AZ UYTZ 4321 BIN Mapping 1236 5533 4678 4321
  • 17. Granular Policy Managed by HPE SecureData – A policy consists of Data Formats, Protection, and Data Access Rules 8 Data Format Name – Field or Object Type Alphabets, Formats Logic Rules – Meaning Preservation Rules Protection Method Authentication Policy FPE SST IBSE Dynamic Masking Policy Mask Type, Mask System Auth Key Rotation Policy for Encryption, Caching Policy Authorization Groups, Roles – No Access, Access, Masked Access App Auth App Permissions – Encrypt, Tokenization, Detokenize, Decrypt Note: Some features vary by platform, use of LDAP, IAM, IDM LDAP, Groups PKI, Secret, IP ranges, custom adapters/Java
  • 18. Securing Sensitive Data in Big Data Platforms and Hadoop 9 Public data Big Data Platform Teradata, Vertica, Hadoop Sqoop Hive UDFs Map Reduce “Landing zone” TDE SQL Spark Sensor Data Power user re- identifies data BI tools work on protected data Business processes use protected data Laptop log files Server log files Any data Source Flume NiFi Storm Kafka
  • 19. 60 Data Sources 20 Million records per day = 1TB 250 Nodes LDAP Sensitive structured sources Hadoop Cluster Sqoop Flume Storm Hive UDFs Map Reduce Staging Area HPE SecureData File Processor Teradata EDW UDFs Data Virtualization layer Tableau Analytics & Data Science HPE SecureData Key Servers & WS API’s Leading Telecoms Provider – Big Data Primary Data Flow Data Cleansing 22
  • 20. Threats in the IoT Space 11 Public data Sqoop Hive UDFs Map Reduce “Landing zone” TDE SQL Spark Sensor Data Power user re- identifies data BI tools work on protected data Business processes use protected data Laptop log files Server log files Any data Source Flume NiFi Storm Kafka Back-end infrastructure
  • 21. Leading car manufacturer – Big Data primary data flow 12 Sensitive structured data Hadoop Edge Nodes HPE SecureData Hadoop Tools Hadoop Cluster Data Warehouse Sensitive structured sources Cognos Analytics & Data Science HPE SecureData Key Servers & WS API’s ~2 Billion real time transactions/day Other real-time data feeds – customer data from dealerships, manufacturers Sqoop Hive UDFs Map Reduces “Landing zone” “Integration Controls” Flume real time ingest Existing data sets and 3rd party data, e.g.. accident data UDFs IBM DataStage
  • 24. The Nature of Data in Motion Robin Bloor, PhD
  • 25. Event Management and Processing We have gradually entered an event- based IT world. It brings with it new realities. We need to consider “data in motion.”
  • 26. New Realities u  A good deal of (new) data is now sourced from outside the business u  Data has to be governed u  Provenance and lineage matter u  There is no perimeter anywhere -- data access permissions and encryption apply everywhere
  • 27. §  Time §  Geographic location §  Virtual/logical location §  Source device §  Device ID §  Ownership and actors §  Data Events and Event Data
  • 28. §  Apache project from NSA (2015) §  Highly scalable §  Parallel operation §  A distributed data flow platform §  Point to point (pull- push) §  IoT §  Apache Project from LinkedIn (2015) §  Highly scalable §  Parallel operation §  A distributed streaming platform §  Publish Subscribe (push-pull) §  Not so much IoT NiFi v Kafka NiFi Kafka
  • 29. A View of a Coherent Data Lake u  Data Lakes are complex - more complex, for example, than a data warehouse u  It’s becoming obvious that streaming and data flow are inherent to the data lake u  It is the primary place of governance u  There needs to be a strategy for data Secure Transform & Aggregate Ingest Extracts Network Devices IoTMobileServers Desktops Embedded Chips RFID The Cloud Log Files OSes VMsESB/Messaging Software Sys Mgt Apps Social Network DataWeb Services Data Streams WorkflowBI & Office AppsBusiness AppsSaaS To Databases Data Marts Other Apps Search & Query BI, Visual'n & Analytics Other Apps ETL D A T A S T O R A G E A R C H I V E Real-Time Apps Metadata MGT Data Cleansing Life Cycle
  • 30. Compliance and Regulations u  Aside from sector initiatives there are many official regulations: HIPAA, SOX, FISMA, FERPA, GLBA (mainly US legislation) u  Standards (Global): PCI-DSS, ISO/ IEC 17799 (data should be owned) u  National regulations differ country to country (even in Europe) u  GDPR being negotiated
  • 31. The Challenges It is ceasing to be possible to include security as an afterthought. Security needs to be designed in from the get go.
  • 32. u  How many companies doing big data projects do you believe have security properly organized? Is anything happening that is likely to complicate the situation even more? u  Security often comes with performance penalties. What is the performance cost of the solutions you are advocating? u  Costs? How much budget needs to be allocated? Can you give a feel for this?
  • 33. u  Where do you tend to see NiFi and Kafka (Storm, Flume, Flink…) being used? u  Security needs to be integrated, so encryption needs to shake hands with authentication. How does HPE make this work? u  Are there any environments/applications to which HPE’s security technology is inapplicable: OLTP, Data Streaming & Streaming Analytics, BI, Mobile, Cloud, etc.…
  • 34.
  • 36. THANK YOU for your ATTENTION! Some images provided courtesy of Wikimedia Commons