05:09 PM
Dark Reading
Dark Reading
Products and Releases

Zettaset Brings Data-At-Rest Encryption To Hadoop

Latest version of Orchestrator also features fine-grained role-based access control and LDAP/AD integration

MOUNTAIN VIEW, Calif., November 20, 2013 – Zettaset, the leader in secure Big Data management, announced today that it has added data-at-rest encryption capabilities to Zettaset Orchestrator, its distribution-agnostic Hadoop cluster management platform. Organizations with strict corporate and/or industry compliance requirements, such as those in the financial, retail, and healthcare verticals can now confidently deploy Hadoop in environments where personal information data must be tightly safeguarded.

Encryption is the latest in a series of security features that make Zettaset Orchestrator the first choice for organizations looking for a true enterprise-class Hadoop management solution for their Big Data deployments. Orchestrator also features fine-grained role-based access control and LDAP/AD integration, which enables it to easily fit into existing security policy frameworks.

Encryption can be optionally installed during the automated Orchestrator installation process.

Taking a standards-based approach, Zettaset Orchestrator uses the 256-bit Advanced Encryption Standard (AES-256) to ensure the highest levels of encryption and data security. Orchestrator encryption is based on the KMIP protocol, and can easily integrate with a company's existing key manager in any Hadoop environment. The Orchestrator encryption feature has been carefully engineered to eliminate any noticeable impact on Hadoop cluster performance.

"Encryption is a very specialized capability, and there are few viable options available today for Hadoop users," said Jim Vogt, Zettaset CEO. "When it comes to risk management, Zettaset Orchestrator with data-at-rest encryption gives customers the upper hand, supporting compliance mandates such as HIPAA, BSA/AML and PCI-DSS, for example, and provides assurance that their Hadoop cluster data is protected against malicious attacks."

"Securing Hadoop data has been a work in progress," said Tony Baer, principal analyst for Ovum. "Zettaset's support of encryption as part of its Orchestrator cluster management product is an important step toward making data protection in Hadoop policy-driven."

Zettaset Orchestrator is an independent commercial software application that is fully compatible with open source distributions. Zettaset Orchestrator encryption benefits and features include:

· Helps regulated companies meet strict electronic data security and compliance requirements

· Uses 256-bit AES encryption, the highest standard available

· Easily integrates with existing key managers using standard KMIP protocol

· Contributes negligible impact on Hadoop cluster performance, an important consideration as Hadoop users scale up their enterprise deployments

For more information on Zettaset Orchestrator, please visit

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Well, at least it isn't Mobby Dick!
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-03-22
IBM Content Navigator 3.0CD could allow attackers to direct web traffic to a malicious site. If attackers make a fake IBM Content Navigator site, they can send a link to ICN users to send request to their Edit client directly. Then Edit client will download documents from the fake ICN website. IBM X...
PUBLISHED: 2019-03-22
IBM API Connect 2018.1 and 2018.4.1.2 apis can be leveraged by unauthenticated users to discover login ids of registered users. IBM X-Force ID: 156544.
PUBLISHED: 2019-03-22
An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. A directory traversal vulnerability exists using the SIZE command along with a \..\..\ substring, allowing an attacker to enumerate file existence based on the returned information.
PUBLISHED: 2019-03-22
pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
PUBLISHED: 2019-03-22
rbash in Bash before 4.4-beta2 did not prevent the shell user from modifying BASH_CMDS, thus allowing the user to execute any command with the permissions of the shell.