Protegrity expands enterprise big data protection capabilities
Posted on 02 August 2013.
Protegrity released the Protegrity Data Security Platform 6.5, which expands the Protegrity Big Data Protector capabilities to include support and certification on many Apache Hadoop distributions.

In addition, the new File Protector Gateway Server provides another powerful yet flexible option for fine-grain data protection of sensitive data before it enters Hadoop or other data stores.

"Release 6.5 demonstrates Protegrity’s continued focus on centralized security management, and innovation in supporting enterprise-wide data protection. With advanced appliance clustering and infinitely scalable on-node protection capabilities to support parallel, distributed computing environments such as Hadoop and Teradata, the feature-rich flexibility of the Protegrity Data Security Platform allows companies to easily expand and control security throughout their enterprises,” said Yigal Rozenberg, Protegrity VP Products.

The Protegrity Big Data Protector has been certified to support even more distributions of Apache Hadoop, including IBM Big Insights, Pivotal, Hortonworks, Cloudera, and MapR. Utilizing strong encryption for coarse-grain file or volume protection, patent-pending Vaultless Tokenization on the node for fine-grain field level protection, and central policy control for access management, the Protegrity Big Data Protector secures all sensitive data in Hadoop from external and internal threats.

Users and business processes can continue to analyze the secure data for transformative decision-making insights, and as part of the Protegrity Data Security Platform, data is secured from the point of acquisition to deletion, across the heterogeneous enterprise.

The File Protector Gateway Server (FPGS) functions as a protected zone outside of Hadoop, or other data systems. It allows sensitive data elements in structured data files to be parsed and protected or un-protected using Protegrity Vaultless Tokenization, masking, or encryption before entering or leaving data systems. The FPGS uses a protection policy to determine the data elements to be protected/un-protected and the protection method to be used. After protecting/un-protecting data elements, the file can be moved elsewhere, to another machine, platform, or outside the enterprise, or remain in the FPGS in secure storage.


Critical bug found in Cisco ASA products, attackers are scanning for affected devices

Several Cisco ASA products - appliances, firewalls, switches, routers, and security modules - have been found sporting a flaw that can ultimately lead to remote code execution by attackers.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Feb 12th