Protegrity Avatar™ for Hortonworks

Report 6 Downloads 133 Views
Protegrity Avatar™ for Hortonworks Optimized, seamlessly integrated data-centric security for HDP

As Hadoop transitions to take on a more mission critical role within the enterprise, the top IT imperatives of process innovation, operational efficiency, and data security take center stage. Organizations must protect sensitive data to meet corporate governance and compliance requirements. At the same time, IT is confronted with meeting the demands of users to access information within business processes and analytical engines to gain insight and drive growth initiatives. Protegrity Avatar™ for Hortonworks can help resolve these challenges by protecting the data itself within Hortonworks Data Platform (HDP) with enterprise-class encryption and Protegrity Vaultless Tokenization (PVT), while managing and monitoring the data flow.

Protecting Sensitive Data in HDP

Protegrity Avatar for Hortonworks delivers highly transparent file-level AES 256 encryption and patented Protegrity Vaultless Tokenization on the node for individual data elements. It also includes Protegrity’s industry-leading centralized data security administration software, including comprehensive monitoring, auditing, and policy and key management. All sensitive data in HDP can be protected from internal and external threats – at rest in HDFS; in use during processing and analysis using MapReduce, Hive, and Pig; and in transit to and from enterprise data systems such as an Enterprise Data Warehouse. The actual data in HDP installations can now be tokenized and protected from external and internal threats, including privileged users.

Data Protection Methods An effective data security strategy is defined by matching the risk associated with any particular type of data with a specific data protection method. Protegrity Avatar supports a comprehensive range of data protection methods, including PVT, format-preserving encryption, file and field AES 256 encryption, masking, hashing, and monitoring.

Coarse-Grained Security (File/Volume)

Fine-Grained Security (Field/Column)

• Methods: File or volume encryption

• Methods: Field/column PVT, encryption or masking

• “All or nothing” approach • Secures data only at rest, and files in transit

• Data is protected wherever it goes • Business intelligence increases usability

Key Features: • Transparent data encryption and tokenization for HDP • Role and process-based policy and enterprise-grade key management • Selective access to de-identified data fields with business intelligence • Comprehensive monitoring, auditing and reporting for regulatory compliance • Seamless deployment with no process change and minimal performance impact

Protegrity Vaultless Tokenization (PVT) Granular data protection is essential to any comprehensive data security solution, and recently many companies are turning to technologies such as tokenization to secure the data itself. The industryfirst, patented Protegrity Vaultless Tokenization process eliminates the challenges associated with standard, vault-based tokenization, and provides all the benefits of masking with the additional advantage of reversibility for situations that require data in the clear. PVT greatly reduces bottlenecks in performance and scalability caused by latency, with no more fear of collisions, and no more sensitive data or tokens residing in your token server. In the event of a breach, tokens hold no value to a potential thief. Tokens can also be embedded with business intelligence, allowing for seamless analytics and business processes without the need to detokenize data.

Enterprise-Grade Policy and Key Management, Auditing and Reporting

Protegrity Avatar provides central policy and key management, auditing, and reporting across HDP. In

addition, all audit logs can be fed back into Hadoop for intelligence-based security analysis. Protegrity Avatar enables seamless security in all layers of HDP without disruption to business processes.

Applying Data Protection Protegrity Avatar provides comprehensive security throughout HDP and protects data in all critical states.

Protecting New Data Entering Hadoop Protegrity Avatar’s Extended HDFS File Encryption minimally impacts the rate at which data can be loaded into HDFS. As data enters, individual data elements can also be tokenized with Hadoop applications such as MapReduce and Hive on the node, and then distributed to the clusters inside encrypted files.

Unprotected Data

Protecting Data to and from the Enterprise As enterprise data enters or leaves HDFS, including monetized data, the same policy-level protection, file encryption, and data tokenization can be applied. This continuous protection ensures security of sensitive data throughout the enterprise and beyond.

Protecting Data During Analysis The API available to tasks in HDP applications such as MapReduce, Hive, Pig, Sqoop, Flume and HBase are extended with policy-driven data protection functions, including PVT and format-preserving encryption. This allows sensitive data to remain secure during analysis, while retaining the visibility critical to deep business insights.

BI Tools & Applications

Protected Data

Protected Data

8 Hadoop Cluster

Files

1

Application Protector

Data Access Framework HBase

Pig

Hive

File Protector

Databases

File Protection Gateway

Protocol

Staging Area

Database Protector

2

Protocol Protection Gateway

Data Storage Framework (HDFS)

Sqoop

Data Processing Framework (MapReduce)

6

7

4 Flume

Databases

5

9

10

3

1 Apply data protection at database, application or file-level outside Hadoop 2 Transfer data to staging area (edge node) and apply data protection outside Hadoop 3 Apply volume-level encryption within Hadoop 4 Extend Hbase, Pig, Hive, Flume and Sqoop job function using data protection API within Hadoop 5 Extend MapReduce framework with data protection API within Hadoop

Files

Protocol

Audit & Reporting

6 Apply transparent HDFS folder and file encryption 7 Import de-identified data into Hadoop 8 Export de-identified data for input into BI applications 9 Export identifiable data to trusted sources 10 Export audit data for monitoring, reporting and analysis

Protegrity is the only enterprise data security software platform that leverages scalable, datacentric encryption, tokenization and masking to help businesses secure sensitive information while maintaining data usability. Built for complex, heterogeneous business environments, the Protegrity Data Security Platform provides unprecedented levels of data security certified across application, data warehouses, mainframes, big data, and cloud environments. Companies trust Protegrity to help them manage risk, achieve compliance, enable business analytics, and confidently adopt new platforms. Copyright© 2015 Protegrity Corporation. All rights reserved. Protegrity® is a registered trademark of Protegrity Corporation. All other trademarks are the property of their respective owners. 02/2015

For more information call 203.326.7200 email [email protected] visit www.protegrity.com