The information provided in this document constitutes confidential and proprietary information of Zettaset, Inc. You may not disclose, use,
reproduce or distribute this document (or any portion thereof) without Zettaset's prior written authorization. Further, as between you and
Zettaset, Zettaset owns all right, title and interest in and to this document (together with any and all related intellectual property rights).
Zettaset
Hadoop: Making it Work
in the Business Unit
Jim Vogt, President & CEO, Zettaset
Hadoop Summit - June 5, 2014
View from the Business Unit…
• Customer focus is shifting to the top layers of the big data software
stack, from information management to the “analytics & discovery”
and “applications” layers
Hadoop in its Infancy
• Early Hadoop adoption was driven by cost savings
• Hadoop’s value proposition to enterprise customers has expanded to include
flexibility, analytics, and discovery capabilities
• As Hadoop continues to mature, the stack of applications and business processes
that can work with data directly in Hadoop’s file system is growing, driving a virtuous
cycle of adoption
• Hadoop becoming increasingly strategic and mission critical to enterprise computing:
Potential to become the primary data management technology
3
• As key enterprise issues with Hadoop are addressed through
technology, Hadoop will emerge as the primary data store
• Cost-effective, powerful, flexible and secure
4
Hadoop Emerging as Primary Data Store
Big Data Adoption Barriers
5
• Given its relative immaturity, customers face multiple issues with
Hadoop deployments, including security, reliability, application
integration, dependence on professional services
• Lack of best practices for integrating Big Data analytics into existing
business processes and workflows
• Vendors racing to address customer challenges with new solution
capabilities
Security for big data will be a key issue in 2014 and beyond.
Merv Adrian, Gartner blog - March 2014
6
Security is #1 Technology Challenge Facing
Organizations with Big Data Initiatives*
* Source: IDG Enterprise Big Data Study, 2014
Sample: 751 companies
Data Security: Key to Accelerating Growth*
7
* Source: Ovum
Security controls used to protect against insider
attacks by number of respondents
Number of respondents with concerns about big data issues
59%
57%
55%
0% 20% 40% 60% 80%
Lack of visibility into the security
measures used by the SaaS or
Cloud Provider
Potential for other users of the
service to access my
organization's data
Lack of control over the location of
data
Percentage responses for the top three cloud and SaaS
usage concerns
• Security in particular is a key focus for enterprise customers considering Big Data solutions
• Enterprises face severe commercial and reputational risk from data breaches
• Enterprise customers will not deploy Hadoop to manage sensitive data until vendors secure
such infrastructure
Big Data Highly Services Dependent*
* Source: Wikibon, February 2014
* Big Data
Revenue by
Type, 2013
(in $US millions)
(n=$18,814)
• Challenging to scale
services-based business
models
• Software projected to have
the fastest growth rate out
of the three segments
• Market will shift to software
because its value
proposition is automated
and replicable as the
technology matures
Synergy Between Big Data and Cloud
• Virtually unlimited data
storage scale-out
• Multiple applications and
“as-a-service” offerings
supportable
• Point of integration with
third-party data sources
• Service and capacity on-
demand, any time,
anywhere
9
Source: CSC
Data security, reliability, and performance remain key enterprise requirements,
no matter where or how Big Data / Hadoop is deployed
• Each of these attributes represents a challenge for organizations driving Big
Data initiatives
Five Most Important Attributes of a
BI / Analytics / Big Data Solution*
* Source: Enterprise Strategy Group - April 2014
Analytics Pulling the Market
“This is a time of accelerating
change, where your current IT
architecture will be rendered
obsolete.
Leading organizations of the
future will be distinguished by
the quality of their predictive
algorithms.”
- Peter Sondergaard, Gartner
• Comprehensive security, including access control and data encryption
• Response time not affected by security controls, no impact on user experience
• High availability ensure the reliability and stability of the database
• Data access via easy-to-use graphical user interfaces, no need to write code
• Advanced analytic capabilities to analyze multi-structured data
• Sophisticated visualizations to understand and make sense of Big Data
• “Speed-of-thought” performance, a cumulative measure of all components
What Analytics Users Want
in a Big Data Solution
Multi-National Financial Services Organization
•Automate and simplify Hadoop installation and cluster expansion/scalability
•Easy integration with Active Directory security policy, and data access control
•Simplify and secure Hadoop connectivity to BI and analytics applications
Major Healthcare Provider
•Secure protected health information and patient records
•Assist with HIPAA compliance, lock down sensitive data with encryption
•Automate administration and security across multiple locations
Leading Online Payments Company
•Fine-grained, role-based access control and support for multi-tenancy
•High availability and automated fail-over for on-demand service reliability
•Activity monitoring and logging for SLA reporting
13
Enterprise Requirements Examples
Use Case – Financial Services
• Banks and credit card companies want to be
able to analyze years of transaction history to
investigate and predict fraudulent transactions,
detect purchase patterns of consumers and
score individuals on credit worthiness
• Depth of this transactional history ranges from
hundreds of Terabytes to several Petabytes of
data, making it cost prohibitive for traditional
databases
• Hadoop proving to be a more cost-effective and
scalable storage and data access solution
• However, securing consumer financial data in
Hadoop is of paramount importance to financial
institutions, who must comply with data
protection and privacy mandates such as
PCI/DSS and SOX
Use Case – Healthcare Records
• Electronic healthcare records are vulnerable to
both insider and outsider threats because of the
value of information to criminals
• Physicians notes are an example of
unstructured data that is retained by healthcare
organizations
• When combined, this information represents
highly sensitive 'regulated data,' which is tightly
controlled by federal laws as well as numerous
state breach notification laws
• HIPAA - Health Insurance Portability and
Accountability Act addresses the privacy and
security of patient data
15
Use Case – Retail Payments
• Online payments company combines the use of
Hadoop databases with analytics for merchant
reporting, along with dashboard applications
that analyze merchant-specific payments
• Data security as well as service reliability is of
utmost importance in this environment
• Transactions involve a database that includes
personally-identifiable information for millions of
users, and the system must be available on-
demand, 24 x 7
• Requirement to secure one merchant’s data
from the data of others, and that requires multi-
tenancy, supported by sophisticated role-based
access control
Hadoop:
Meeting Business Unit Expectations
Focus on business applications and
processes vs. database mechanics
Comprehensive security approach that
simplifies integration with existing
enterprise security frameworks
Simplified application integration,
including analytics
High reliability across all critical
Hadoop services
More process automation, and fewer
requirements for professional services
Hadoop that’s enterprise-ready
17
Thank you!

Hadoop: Making it work for the Business Unit

  • 1.
    The information providedin this document constitutes confidential and proprietary information of Zettaset, Inc. You may not disclose, use, reproduce or distribute this document (or any portion thereof) without Zettaset's prior written authorization. Further, as between you and Zettaset, Zettaset owns all right, title and interest in and to this document (together with any and all related intellectual property rights). Zettaset Hadoop: Making it Work in the Business Unit Jim Vogt, President & CEO, Zettaset Hadoop Summit - June 5, 2014
  • 2.
    View from theBusiness Unit… • Customer focus is shifting to the top layers of the big data software stack, from information management to the “analytics & discovery” and “applications” layers
  • 3.
    Hadoop in itsInfancy • Early Hadoop adoption was driven by cost savings • Hadoop’s value proposition to enterprise customers has expanded to include flexibility, analytics, and discovery capabilities • As Hadoop continues to mature, the stack of applications and business processes that can work with data directly in Hadoop’s file system is growing, driving a virtuous cycle of adoption • Hadoop becoming increasingly strategic and mission critical to enterprise computing: Potential to become the primary data management technology 3
  • 4.
    • As keyenterprise issues with Hadoop are addressed through technology, Hadoop will emerge as the primary data store • Cost-effective, powerful, flexible and secure 4 Hadoop Emerging as Primary Data Store
  • 5.
    Big Data AdoptionBarriers 5 • Given its relative immaturity, customers face multiple issues with Hadoop deployments, including security, reliability, application integration, dependence on professional services • Lack of best practices for integrating Big Data analytics into existing business processes and workflows • Vendors racing to address customer challenges with new solution capabilities Security for big data will be a key issue in 2014 and beyond. Merv Adrian, Gartner blog - March 2014
  • 6.
    6 Security is #1Technology Challenge Facing Organizations with Big Data Initiatives* * Source: IDG Enterprise Big Data Study, 2014 Sample: 751 companies
  • 7.
    Data Security: Keyto Accelerating Growth* 7 * Source: Ovum Security controls used to protect against insider attacks by number of respondents Number of respondents with concerns about big data issues 59% 57% 55% 0% 20% 40% 60% 80% Lack of visibility into the security measures used by the SaaS or Cloud Provider Potential for other users of the service to access my organization's data Lack of control over the location of data Percentage responses for the top three cloud and SaaS usage concerns • Security in particular is a key focus for enterprise customers considering Big Data solutions • Enterprises face severe commercial and reputational risk from data breaches • Enterprise customers will not deploy Hadoop to manage sensitive data until vendors secure such infrastructure
  • 8.
    Big Data HighlyServices Dependent* * Source: Wikibon, February 2014 * Big Data Revenue by Type, 2013 (in $US millions) (n=$18,814) • Challenging to scale services-based business models • Software projected to have the fastest growth rate out of the three segments • Market will shift to software because its value proposition is automated and replicable as the technology matures
  • 9.
    Synergy Between BigData and Cloud • Virtually unlimited data storage scale-out • Multiple applications and “as-a-service” offerings supportable • Point of integration with third-party data sources • Service and capacity on- demand, any time, anywhere 9 Source: CSC Data security, reliability, and performance remain key enterprise requirements, no matter where or how Big Data / Hadoop is deployed
  • 10.
    • Each ofthese attributes represents a challenge for organizations driving Big Data initiatives Five Most Important Attributes of a BI / Analytics / Big Data Solution* * Source: Enterprise Strategy Group - April 2014
  • 11.
    Analytics Pulling theMarket “This is a time of accelerating change, where your current IT architecture will be rendered obsolete. Leading organizations of the future will be distinguished by the quality of their predictive algorithms.” - Peter Sondergaard, Gartner
  • 12.
    • Comprehensive security,including access control and data encryption • Response time not affected by security controls, no impact on user experience • High availability ensure the reliability and stability of the database • Data access via easy-to-use graphical user interfaces, no need to write code • Advanced analytic capabilities to analyze multi-structured data • Sophisticated visualizations to understand and make sense of Big Data • “Speed-of-thought” performance, a cumulative measure of all components What Analytics Users Want in a Big Data Solution
  • 13.
    Multi-National Financial ServicesOrganization •Automate and simplify Hadoop installation and cluster expansion/scalability •Easy integration with Active Directory security policy, and data access control •Simplify and secure Hadoop connectivity to BI and analytics applications Major Healthcare Provider •Secure protected health information and patient records •Assist with HIPAA compliance, lock down sensitive data with encryption •Automate administration and security across multiple locations Leading Online Payments Company •Fine-grained, role-based access control and support for multi-tenancy •High availability and automated fail-over for on-demand service reliability •Activity monitoring and logging for SLA reporting 13 Enterprise Requirements Examples
  • 14.
    Use Case –Financial Services • Banks and credit card companies want to be able to analyze years of transaction history to investigate and predict fraudulent transactions, detect purchase patterns of consumers and score individuals on credit worthiness • Depth of this transactional history ranges from hundreds of Terabytes to several Petabytes of data, making it cost prohibitive for traditional databases • Hadoop proving to be a more cost-effective and scalable storage and data access solution • However, securing consumer financial data in Hadoop is of paramount importance to financial institutions, who must comply with data protection and privacy mandates such as PCI/DSS and SOX
  • 15.
    Use Case –Healthcare Records • Electronic healthcare records are vulnerable to both insider and outsider threats because of the value of information to criminals • Physicians notes are an example of unstructured data that is retained by healthcare organizations • When combined, this information represents highly sensitive 'regulated data,' which is tightly controlled by federal laws as well as numerous state breach notification laws • HIPAA - Health Insurance Portability and Accountability Act addresses the privacy and security of patient data 15
  • 16.
    Use Case –Retail Payments • Online payments company combines the use of Hadoop databases with analytics for merchant reporting, along with dashboard applications that analyze merchant-specific payments • Data security as well as service reliability is of utmost importance in this environment • Transactions involve a database that includes personally-identifiable information for millions of users, and the system must be available on- demand, 24 x 7 • Requirement to secure one merchant’s data from the data of others, and that requires multi- tenancy, supported by sophisticated role-based access control
  • 17.
    Hadoop: Meeting Business UnitExpectations Focus on business applications and processes vs. database mechanics Comprehensive security approach that simplifies integration with existing enterprise security frameworks Simplified application integration, including analytics High reliability across all critical Hadoop services More process automation, and fewer requirements for professional services Hadoop that’s enterprise-ready 17
  • 18.

Editor's Notes

  • #18 What does Zettaset do?