Page 37 - index
P. 37
redact sensitive data once discovered
Ability to count and 100% automated discovery can run on all
realm sensitive data new data with reporting to determine the file
/ offset location of sensitive data elements
and the size of sensitive data across all files
and directories
Risk profiling and Unique entitlement reports show who can
audit access sensitive data in Hadoop
Monitor for changes, Monitor system for changes; can run as
catch exposures incremental scans
About The Author
Jeremy Stieglitz drives Product Management for Dataguise, the market
leader in Hadoop security. Before joining Dataguise, Jeremy worked as
Vice President of Business Development at Voltage Security, and as Vice
President of Marketing and Product Management for Redwood Systems.
He also held product management and marketing roles at Redwood
Systems, Force10 Networks, Cisco, Entrust, and RSA. Jeremy has spoken
at leading security conferences including the RSA Conference, InfoSec,
Networkers, Connectivity Week, SuperComputing, SemiCon, and Internet2 and is the author of
19 patents in network security, user authentication, network automation, and wireless security.
Jeremy can be reached online at [email protected], is on Twitter at @BigDataProtect
and www.dataguise.com.
37 Cyber Warnings E-Magazine – June 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide