Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

11/21/2013
05:09 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Zettaset Brings Data-At-Rest Encryption To Hadoop

Latest version of Orchestrator also features fine-grained role-based access control and LDAP/AD integration

MOUNTAIN VIEW, Calif., November 20, 2013 – Zettaset, the leader in secure Big Data management, announced today that it has added data-at-rest encryption capabilities to Zettaset Orchestrator, its distribution-agnostic Hadoop cluster management platform. Organizations with strict corporate and/or industry compliance requirements, such as those in the financial, retail, and healthcare verticals can now confidently deploy Hadoop in environments where personal information data must be tightly safeguarded.

Encryption is the latest in a series of security features that make Zettaset Orchestrator the first choice for organizations looking for a true enterprise-class Hadoop management solution for their Big Data deployments. Orchestrator also features fine-grained role-based access control and LDAP/AD integration, which enables it to easily fit into existing security policy frameworks.

Encryption can be optionally installed during the automated Orchestrator installation process.

Taking a standards-based approach, Zettaset Orchestrator uses the 256-bit Advanced Encryption Standard (AES-256) to ensure the highest levels of encryption and data security. Orchestrator encryption is based on the KMIP protocol, and can easily integrate with a company's existing key manager in any Hadoop environment. The Orchestrator encryption feature has been carefully engineered to eliminate any noticeable impact on Hadoop cluster performance.

"Encryption is a very specialized capability, and there are few viable options available today for Hadoop users," said Jim Vogt, Zettaset CEO. "When it comes to risk management, Zettaset Orchestrator with data-at-rest encryption gives customers the upper hand, supporting compliance mandates such as HIPAA, BSA/AML and PCI-DSS, for example, and provides assurance that their Hadoop cluster data is protected against malicious attacks."

"Securing Hadoop data has been a work in progress," said Tony Baer, principal analyst for Ovum. "Zettaset's support of encryption as part of its Orchestrator cluster management product is an important step toward making data protection in Hadoop policy-driven."

Zettaset Orchestrator is an independent commercial software application that is fully compatible with open source distributions. Zettaset Orchestrator encryption benefits and features include:

· Helps regulated companies meet strict electronic data security and compliance requirements

· Uses 256-bit AES encryption, the highest standard available

· Easily integrates with existing key managers using standard KMIP protocol

· Contributes negligible impact on Hadoop cluster performance, an important consideration as Hadoop users scale up their enterprise deployments

For more information on Zettaset Orchestrator, please visit http://www.zettaset.com/platform.php.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.