Inside the Briefcase

Ironclad SaaS Security for Cloud-Forward Enterprises

Ironclad SaaS Security for Cloud-Forward Enterprises

The 2015 Anthem data breach was the result of...

The Key Benefits of Using Social Media for Business

The Key Benefits of Using Social Media for Business

Worldwide, there are more than 2.6 billion social media...

Gartner IT Sourcing, Procurement, Vendor and Asset Management Summit 2018, September 5 – 7, in Orlando, FL

Gartner IT Sourcing, Procurement, Vendor and Asset Management Summit 2018, September 5 – 7, in Orlando, FL

Register with code GARTITB and save $350 off the...

Infographic: The Three Pillars of Digital Identity: Trust, Consent, Knowledge

Infographic: The Three Pillars of Digital Identity: Trust, Consent, Knowledge

8,434 adults were surveyed to gauge consumer awareness of...

FICO Scales with Oracle Cloud

FICO Scales with Oracle Cloud

Doug Clare, Vice President at FICO, describes how Oracle...

Identity and Access Management for Hadoop: The Cornerstone for Big Data Security

January 6, 2016 No Comments

With the news full of data breaches and the growing exposure created by high-value data spread across Hadoop clusters, a bullet-proof security plan is critical to the success of every Hadoop initiative. Companies without an integrated security strategy for Hadoop are at risk of exposing critical data or failing an audit, but the damage to reputation could be irreparable. Join Sam Heywood, Director Product Management at Cloudera and Satish Veerapuneni, Senior Product Manager at Centrify to learn how an integrated security strategy can secure and simplify access to Hadoop environments, while leveraging your existing identity management infrastructure.

Watch this webcast to learn how to:

  • Proactively incorporate security into your Hadoop environment to secure Cloudera clusters, nodes and services
  • Connect your Cloudera environment with your existing Active Directory environment to provide scalable authentication and access controls
  •  Gain visibility and centralized control over who can access your Hadoop environment, what they can do and what they have done

VIEW WEBCAST

 

centrify vertical 100x100 1 Identity and Access Management for Hadoop: The Cornerstone for Big Data Security

DATA and ANALYTICS , Featured Webinars, OPEN SOURCE

Leave a Reply

(required)

(required)


ADVERTISEMENT

Gartner