The document discusses the risks associated with big data technologies and provides recommendations for securing Hadoop clusters in an enterprise environment. It notes that new technologies introduce new vulnerabilities from things like open source code and lack of security practices. It recommends implementing authentication, authorization, auditing, encryption, and other security controls in a comprehensive manner integrated within the Hadoop platform to securely enable analytics on regulated data while meeting compliance requirements.