Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security //

Database Security

6/9/2015
02:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Dataguise Introduces Big Data Security Suite for On-Premise and Cloud Deployments

Company Delivers DgSecure 5.0 to Provide Insight and Access to Different Sensitive Data Classifications

FREMONT, Calif. — June 9, 2015 — Dataguise, the leading provider of data-centric discovery and data protection for Hadoop and other Big Data environments, today announced the release of DgSecure™ version 5.0. The latest generation DgSecure platform allows businesses to scale sensitive data discovery, automate data protection, and achieve a 360-degree view of their sensitive data assets across Big Data and traditional data repositories both on-premise and in popular cloud platforms.

DgSecure version 5.0 includes significant enhancements, including the addition of industry-first security access monitoring and entitlement functionality which allows administrators to define and audit sensitive data interactions. By combining sensitive data discovery with integrated Access Control List (ACL) permissions as defined in Apache Sentry, Apache Ranger or MapR’s ACLs, enterprises can see complete sensitive data access and entitlement within Hadoop. This provides information about the status of sensitive data with greater control over which users can view the information. This is the first solution to allow security personnel insight into which users are entitled to access different classifications of sensitive data.

“While enterprises today seek to unlock the potential of Big Data for their organizations, many have serious concerns around lack of visibility and security,” said Nik Rouda, senior analyst, Enterprise Strategy Group. “The complexity and scale of these environments demands an end-to-end data-centric security and compliance option that identifies where sensitive data is located, who has access to it, and the means to lock it down - all without impacting performance. ESG research shows security, privacy, and governance are top level issues for any Big Data deployment.”

Version 5.0 enhancements include:

•             Ability to run virtually in the cloud to support Hadoop operations, including Big Data repositories in AWS, Amazon EMR, Azure, and HD Insight

•             Enhanced automation features through Oozie support to facilitate full job scheduling and automation of discovery and protection via security workflow scripting/command line interfaces

•             Automated cell-level encryption (AES and FPE) capabilities for Flume, Sqoop, and HIVE API

•             Multi-cluster support from a single integrated dashboard with certified integrations for Cloudera, Hortonworks, MapR, and Pivotal HD

•             Most advanced native and HIVE API support for Hadoop file formats RC, ORC, AVRO, Sequence, TXT, JSON and XML

•             Advanced encryption key management and integration with Safenet, RSA and Thales, featuring industry-standard Key Management Interface Protocol (KMIP) support

•             Automatic discovery upon importing new data

“With DgSecure version 5, our joint customers gain enhanced granular, and precise control of sensitive data by combining DgSecure with Cloudera’s industry leading data governance and security capabilities. The new discovery and entitlement features will make it even easier for businesses to define and enforce remediation policies in support of customer initiatives,” said Tim Stevens, vice president, business and corporate development at Cloudera.

“With a data-centric approach for protecting large data sets, Dataguise provides a rigorous model of defense for secure, monitored access to data without undue complexity or performance barriers,” said Steve Wooledge, vice president product marketing, MapR Technologies. “This approach is aligned with the MapR strategy and capabilities for securing and governing data in business-critical Hadoop deployments. We are pleased to work with Dataguise to ensure security and compliance with industry-leading innovations for Hadoop and NoSQL.”

“DgSecure 5.0 extends a first-in-market footprint for security access monitoring and entitlement,” said Manmeet Singh, CEO of Dataguise. “This purpose-built data-centric security solution for Hadoop and NoSQL provides organizations with unique sensitive data discovery capabilities, allowing users to locate, identify, and manage sensitive data in large datasets, and then apply dynamic, high performance data protection based on user permissions. With our latest release, compliance and security professionals can rest assured that their sensitive data is optimally protected.”

 DgSecure is a data-centric solution that provides organizations with unique sensitive data discovery capabilities, allowing users to locate, identify and manage sensitive data within large datasets, and then apply dynamic, high performance data protection based on user permissions. The discovery and security solution’s capabilities mitigate the risk of a data breach by providing extensive reporting and auditing services, allowing enterprises for the first time to see who is adding, accessing, and attempting to access sensitive data. DgSecure is the first solution of its kind to discover all sensitive data residing in or being written to Hadoop and NoSQL repositories, protecting this data against unauthorized access. The DgSecure platform now supports Hadoop-in-the-Cloud, including the largest cloud Hadoop implementation, Amazon EMR (Elastic MapReduce). Already a certified partner of Cloudera, Hortonworks and MapR, Dataguise is the only vendor to support one hundred percent of the major Hadoop distributions along with Hadoop-in-the-Cloud, traditional databases, files and SharePoint.

•             Follow Dataguise on Twitter at: http://twitter.com/dataguise

•             Follow Dataguise on LinkedIn at: http://www.linkedin.com/company/dataguise

•             Contact Dataguise directly at: http://dataguise.com/?q=inquiries

About Dataguise

Dataguise is the leading provider of data privacy protection and compliance intelligence for sensitive data assets stored in both Big Data and traditional repositories. The company’s comprehensive and centrally managed solutions allow companies to maintain a 360 degree view of their sensitive data, evaluate their compliance exposure risks, and enforce the most appropriate remediation policies, whether the data is stored on premises or in the cloud. Dataguise is recognized as a visionary by one of the world’s leading analyst firms for its ability to help its customers to reduce the risk of data breaches and to remain compliant with leading regulations designed to protect personally identifiable information (PII) such as the Health Insurance Portability and Accountability Act (HIPAA), The Health Information Technology for Economic and Clinical Health (HITECH), and the Payment Card Industry (PCI) DSS. For more information visit: http://dataguise.com/.

 

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.