Page 37 - index
P. 37







redact sensitive data once discovered


Ability to count and 100% automated discovery can run on all
realm sensitive data new data with reporting to determine the file
/ offset location of sensitive data elements
and the size of sensitive data across all files
and directories


Risk profiling and Unique entitlement reports show who can
audit access sensitive data in Hadoop


Monitor for changes, Monitor system for changes; can run as
catch exposures incremental scans








About The Author

Jeremy Stieglitz drives Product Management for Dataguise, the market
leader in Hadoop security. Before joining Dataguise, Jeremy worked as
Vice President of Business Development at Voltage Security, and as Vice
President of Marketing and Product Management for Redwood Systems.
He also held product management and marketing roles at Redwood
Systems, Force10 Networks, Cisco, Entrust, and RSA. Jeremy has spoken
at leading security conferences including the RSA Conference, InfoSec,
Networkers, Connectivity Week, SuperComputing, SemiCon, and Internet2 and is the author of
19 patents in network security, user authentication, network automation, and wireless security.
Jeremy can be reached online at [email protected], is on Twitter at @BigDataProtect
and www.dataguise.com.














37 Cyber Warnings E-Magazine – June 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   32   33   34   35   36   37   38   39   40   41   42