SYS-CON MEDIA Authors: Carmen Gonzalez, Yeshim Deniz, Sean Houghton, Glenn Rossman, Ignacio M. Llorente

News Feed Item

Zettaset Announces Data-in-Motion Encryption for Hadoop

New Encryption Capability Integrated Into Existing Comprehensive Security Solution for Enterprises Using Hadoop

MOUNTAIN VIEW, CA -- (Marketwired) -- 03/25/14 -- Zettaset, the leader in secure Big Data management, today announced the addition of data-in-motion encryption as a new feature in its innovative Zettaset Orchestrator management and security add-on application for Hadoop. Data-in-motion encryption provides organizations with an additional layer of protection for their Hadoop clusters and sensitive data, eliminating access by unauthorized users.

Orchestrator data-in-motion encryption ensures that all networking connections to the Orchestrator web-based console are completely secure within a Secure Socket Layer (SSL) tunnel. Communication links between all cluster nodes are encrypted and authenticated to eliminate the possibility of unauthorized access to data by anyone within the corporate network or Hadoop cluster. Connections from the Orchestrator Business Intelligence (BI) Connector, an API that connects Hadoop clusters with analytics applications, are also protected.

"Risks associated with Hadoop projects include security and privacy challenges," wrote Gartner Research Director & Analyst, Bhavish Sood et. al. "Hadoop certainly wasn't built with enterprise IT environments in mind because there is a shortage of robust security controls in Hadoop."(1)

Orchestrator data-in-motion encryption comes on the heels of Zettaset's data-at-rest encryption, and similarly, is designed to have virtually no negative impact on node and cluster performance. Node performance with encryption is especially critical as more enterprise customers scale up their Hadoop clusters and move from pilot to production.

"Orchestrator data-in-motion encryption for Hadoop represents the next phase of Zettaset's Big Data encryption technology initiative, which began with the release of data-at-rest encryption in late 2013," said Jim Vogt, CEO of Zettaset. "Unlike other Hadoop encryption approaches which are bolt-on point products, Zettaset has integrated encryption into a complete security solution for Hadoop that provides an enterprise-wide framework for identity and access management, as well as security policy enforcement."

Orchestrator's management console automates virtually all manual configuration processes within Hadoop, eliminating the need for professional services and reducing IT resource requirements in the enterprise.

The Orchestrator security and management application is not a Hadoop distribution, but is distribution-agnostic and fully compatible with branded Hadoop distributions from Cloudera and Hortonworks. Orchestrator can replace existing branded Hadoop management products with a more automated and robust Hadoop management platform, which is optimized to deliver superior security and high availability for enterprise customers. Data-in-motion encryption is part of Orchestrator's comprehensive, fully-integrated security solution. Zettaset Orchestrator features and benefits include:

  • Data-at-rest encryption
  • Fine-grained, role-based access control
  • Automated active directory (AD) and LDAP integration
  • Activity monitoring for data capture and compliance reporting
  • Automated installation and configuration of all security components into the Hadoop cluster
  • Patented high-availability which ensures that every Hadoop service is protected with automated fail-over

Data-in-motion encryption for Hadoop will be bundled with every Orchestrator application license, and is scheduled for availability in early Q2, 2014.

For more information, please visit here.

(1) Gartner - Technology Overview: Hadoop Maturity and Adoption Trends in Asia/Pacific, 22 October 2013, Bhavish Sood, Arun Chandrasekaran
About Zettaset, Inc.

Zettaset, the leader in secure Big Data management, automates, accelerates, and simplifies Hadoop cluster deployment for the enterprise. Zettaset Orchestrator™ is the only Big Data management solution designed to address enterprise requirements for comprehensive security, high availability, manageability and scalability in a distributed computing environment. Orchestrator helps organizations move Hadoop more efficiently from pilot into production, replacing open source management with a more robust approach that easily fits into existing enterprise security and policy frameworks. Zettaset Orchestrator provides multi-service fail-over for all critical cluster services, facilitates integration with the most widely adopted ETL and analytics applications, and is compatible with the leading Hadoop distributions.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
"SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
SYS-CON Events announced today that Gridstore™, the leader in hyper-converged infrastructure purpose-built to optimize Microsoft workloads, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Gridstore™ is the leader in hyper-converged infrastructure purpose-built for Microsoft workloads and designed to accelerate applications in virtualized environments. Gridstore’s hyper-converged infrastructure is the ...
The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to th...
"There is a natural synchronization between the business models, the IoT is there to support ,” explained Brendan O'Brien, Co-founder and Chief Architect of Aria Systems, in this SYS-CON.tv interview at the 15th International Cloud Expo®, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
Fundamentally, SDN is still mostly about network plumbing. While plumbing may be useful to tinker with, what you can do with your plumbing is far more intriguing. A rigid interpretation of SDN confines it to Layers 2 and 3, and that's reasonable. But SDN opens opportunities for novel constructions in Layers 4 to 7 that solve real operational problems in data centers. "Data center," in fact, might become anachronistic - data is everywhere, constantly on the move, seemingly always overflowing. Net...
SYS-CON Media announced that Centrify, a provider of unified identity management across cloud, mobile and data center environments that delivers single sign-on (SSO) for users and a simplified identity infrastructure for IT, has launched an ad campaign on Cloud Computing Journal. The ads focus on security: how an organization can successfully control privilege for all of the organization’s identities to mitigate identity-related risk without slowing down the business, and how Centrify provides ...