Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


07:02 PM
Dark Reading
Dark Reading
Products and Releases

RainStor Major Product Update Delivers Enterprise-Grade Security, Search On Hadoop

New security features including data encryption, masking and identity management

San Francisco, California – June 25, 2013 – RainStor, provider of world's most efficient enterprise database for managing and analyzing all historical data, has combined the latest data security technologies in a comprehensive product update that has the potential to rapidly increase adoption of Apache Hadoop inside the world's largest banks, communications providers and government agencies.

Possible security risks associated with using Hadoop and high-value data include identity theft, fraud, regulatory default, and unauthorized data access. Beyond comprehensive data protection, enterprise customers also require multiple access tools for business query and analysis across petabyte scale data sets running on Hadoop. RainStor's new intuitive search capability provides 10-100X speed-up compared to standard SQL. With this new search capability users quickly narrow down results to a sub-set of data and conduct further exploration using standard SQL and BI tools.

"Our banking and communications customers running Hadoop want a range of query tools to answer known and unknown questions and we now offer the broadest range of options so they can pick the right tool for the job," said John Bantleman, CEO RainStor. "If you are a large bank looking at all transactions conducted by a specific trader, you can start with search and then dive in deeper using standard SQL," added Bantleman.

"Hadoop is a tremendous technology to cost effectively scale and manage big data but gaping security holes expose organizations to data breaches and malicious use," said Mark Cusack, chief architect at RainStor. "RainStor is the first database running on Hadoop that fills this critical need. We worked closely with our customers to fully understand their requirements around data privacy, trust and integrity."

RainStor's database runs natively on Hadoop and has been deployed by more than 20 global telecommunication providers, 10 multi-national banks and a number of government agencies to significantly reduce cost, complexity and compliance risk when managing Big Data. RainStor partners with industry leaders such as Dell, EMC, HP, and Teradata in addition to Hortonworks, developers of the only 100% open source Hadoop distribution. RainStor is designed for massive scale, runs on the lowest-cost hardware, provides the broadest possible query options including standard SQL, Pig, Hive and MapReduce, and reduces storage footprints by up to 97% through its patented compression technology.

For more details on the latest product update – join the webcast on July 11th at 10:00am PT

What's new?

RainStor has added the following to the first-ever enterprise security-grade database for Hadoop:


- Data Encryption – Scalable, rapid data encryption at rest to protect massive data volumes

- Data Masking & Views – New SQL functions to mask sensitive data. When combined with table-level security, these functions ensure that unauthorized users only see masked data

- Kerberos / LDAP / Active Directory/ PAM support – Standard authorization and authentication capabilities to enable trust within a Hadoop environment.

- Audit Trail and Tamper-proofing – Built-in auditing functionality to log and track all data changes to meet regulatory compliance requirements

- Configurable data disposition (with record-level delete) – Efficient deletion of individual records from tables containing trillions of records in clustered environments, enabling efficient data lifecycle management.


- Faster data exploration through free text search

- Boost query performance by 10-100X

- Minimal resource overhead from extremely low (1-5%) index load

- Extreme scalability by searching across billions of records (multi-petabyte)

- Simple management with no index sharding.

What Partners Say:

"We believe Rainstor is leading the way in the efficient management and security of data in petabyte-scale environments for service providers worldwide," said Gareth MacLachlan COO, AdaptiveMobile, a leading provider of mobile network protection and security solutions for the world's largest communication providers. "Built-in security capabilities such as encryption and standards-based authentication are critical, for AdaptiveMobile customers who expect such functionality to retain communication records for regulatory purposes."

"Anritsu embeds the RainStor database within our service assurance solutions for leading communication service providers who need to retain massive volumes of network data to better monitor and manage network performance and issues," said Neil Tomlinson, product management and R&D Director, Service Assurance, Anritsu. "RainStor's new product update provides a search capability that will really help customers find the needle in the haystack when looking for specific network events," added Tomlinson.

"We believe RainStor has made great strides with this new product update enabling the enterprise to secure high value, sensitive data," said Mitch Ferguson, vice president of business development at Hortonworks. "With the solutions from Hortonworks and RainStor, customers can be confident knowing that their data is privately stored in a trusted, secure environment that helps reduce malicious activity and overall risk exposure."

About RainStor

RainStor provides the world's most efficient database that reduces the cost, complexity and compliance risk of managing enterprise data. RainStor's patented technology enables customers to cut infrastructure costs by 90%. RainStor scales anywhere; on-premise or in the cloud and natively on Hadoop. Among RainStor's customers are 20 of the world's largest communications providers and 10 of the biggest banks and financial services organizations, who use RainStor to manage historical data, while saving millions. For more info: www.rainstor.com or join the conversation: @rainstor.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.