Protegrity expands enterprise big data protection capabilities
Posted on 02 August 2013.
Bookmark and Share
Protegrity released the Protegrity Data Security Platform 6.5, which expands the Protegrity Big Data Protector capabilities to include support and certification on many Apache Hadoop distributions.

In addition, the new File Protector Gateway Server provides another powerful yet flexible option for fine-grain data protection of sensitive data before it enters Hadoop or other data stores.


"Release 6.5 demonstrates Protegrity’s continued focus on centralized security management, and innovation in supporting enterprise-wide data protection. With advanced appliance clustering and infinitely scalable on-node protection capabilities to support parallel, distributed computing environments such as Hadoop and Teradata, the feature-rich flexibility of the Protegrity Data Security Platform allows companies to easily expand and control security throughout their enterprises,” said Yigal Rozenberg, Protegrity VP Products.

The Protegrity Big Data Protector has been certified to support even more distributions of Apache Hadoop, including IBM Big Insights, Pivotal, Hortonworks, Cloudera, and MapR. Utilizing strong encryption for coarse-grain file or volume protection, patent-pending Vaultless Tokenization on the node for fine-grain field level protection, and central policy control for access management, the Protegrity Big Data Protector secures all sensitive data in Hadoop from external and internal threats.

Users and business processes can continue to analyze the secure data for transformative decision-making insights, and as part of the Protegrity Data Security Platform, data is secured from the point of acquisition to deletion, across the heterogeneous enterprise.

The File Protector Gateway Server (FPGS) functions as a protected zone outside of Hadoop, or other data systems. It allows sensitive data elements in structured data files to be parsed and protected or un-protected using Protegrity Vaultless Tokenization, masking, or encryption before entering or leaving data systems. The FPGS uses a protection policy to determine the data elements to be protected/un-protected and the protection method to be used. After protecting/un-protecting data elements, the file can be moved elsewhere, to another machine, platform, or outside the enterprise, or remain in the FPGS in secure storage.





Spotlight

64% of companies expect cyber attacks

Posted on 9 July 2014.  |  Nearly two-thirds of UK IT decision-makers said they expect their organization to be the target of a cyber attack within the next 12 months. 32% of those surveyed confirm their business was hit by a cyber attack during the past year.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Jul 10th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //