Zettaset Big Data Encryption Suite – Data-Centric Protection for Big Data Environments

The increased frequency and sophistication of high-profile data breaches and malicious hacking is putting organizations at continued risk of data theft and significant business disruption. Complicating this scenario is the unbounded growth of Big Data and petabyte-scale data storage, new open source database and distribution schemes like Hadoop and NoSQL, and the continued adoption of cloud services by enterprises. This momentum is breaking down the traditional perimeter, forcing organizations to look at security differently, with the focus shifting from the perimeter to the data that needs to be protected. The Zettaset Big Data Encryption Suite has been designed for optimal performance and scalability in distributed Big Data systems like Hadoop and other NoSQL databases.

What’s Different About Securing Big Data?

The massive attack surface of big data stores makes them highly vulnerable to unauthorized intrusion. However, much of the encryption technology that exists today was not designed for deployment in Big Data’s distributed computing architectures such as Hadoop and NoSQL which consist of multiple servers that are networked together into a server array known as a cluster.

For example, distributed data systems like Hadoop require a distributed policy server, with secure policy replication to prevent unauthorized modifications to policies. Distributed systems also require automated mechanisms for secure node removal when a server is removed from a cluster, encryption for both data-at-rest and in-motion, as well as rapid and secure encryption key rotation. All of these functions must perform efficiently without requiring the re-encryption of any files or downtime during normal operation.

Why Can’t Open Source and Legacy Solutions Do the Job?

When it comes to securing big data in the enterprise, open source and legacy encryption solutions are compromised in many ways. For example, open source transparent data encryption (TDE) lacks basic standards-interoperability with existing KMIP-compliant key managers and PKCS#11-compliant hardware security modules (HSMs), making open source encryption difficult to fit into existing enterprise security infrastructures, and leaving encryption keys exposed. Most legacy encryption products were designed for static relational databases, and lack the ability to scale and perform well in highly-dynamic, petabyte-scale, distributed computing architectures. Very few are optimized for big data distributed file systems like HDFS.

Encryption That is Optimized for Big Data

Designed from the ground up for optimal performance and scalability in distributed Big Data systems like Hadoop and other NoSQL, as well as the latest generation of Relational databases. Our solution delivers data-centric security utilizing advanced encryption and access control technologies to ensure the highest levels of protection of critical data.

Customers can choose from two different encryption products in the Zettaset Big Data Encryption Suite:

  • BDEncrypt
  • BDEncrypt Plus
Protection that Addresses Compliance Requirements

The Zettaset Big Data Encryption Suite provides a proven defense in regulated industries such as healthcare, financial services, and retail from the accelerating frequency and scope of data breaches. When integrated into a strategic IT security initiative, the Big Data Encryption Suite can help bring Hadoop, other NoSQL and Relational big data stores into compliance with corporate and regulatory data protection initiatives including HIPAA, HITECH, and PCI.

Resources

BDEncrypt Solution BriefBDEncrypt Solution Brief
BDEncrypt Plus Solution BriefBDEncrypt Plus Solution Brief
Zettaset Big Data Encryption SuiteZettaset Encryption Suite
Protecting Data Integrity 
Against the New Cyber ThreatWhite Paper – Protecting Data Integrity Against the New Cyber Threat

Free Trial, Customized Demo, or Both!

Your choice.


Our
Resources
Corporate
FactSheet
Our Resources
Videos
Solution Briefs
White Papers