Access your Pro+ Content below.
IT teams take big data security issues into their own hands
This article is part of the Business Information issue of April 2018, Vol. 6, No. 2
When TMW Systems Inc. began building a big data environment to run advanced analytics applications three years ago, the first step wasn't designing and implementing the Hadoop-based architecture -- rather, it involved putting together a framework to secure the data going into the new platform. "I started with the security model," said Timothy Leonard, TMW's executive vice president of operations and CTO. "I wanted my customers to know that when it comes to the security of their data, it's like Fort Knox -- the data is protected. Then I built the rest of the environment on top of it." Big data security issues shouldn't be an afterthought in deployments of Hadoop, Spark and related technologies, according to technology analysts and experienced IT managers. That's partly because of the importance of safeguarding data against theft or misuse -- and partly because of the work it typically takes to create effective defenses in data lakes and other big data systems. Timothy Leonard TMW, which develops transportation management software...
Access this PRO+ Content for Free!
Features in this issue
The General Data Protection Regulation makes privacy paramount and reinforces the practice of good data governance. Will a new focus on data ethics be an important side effect?
As hacking, ransomware and malware attacks mount, companies place big data protection and integrity among the primary reasons for increased spending on security software.
Data security needs to be addressed upfront in deployments of big data systems -- and users are likely to find they have to build some security capabilities themselves.
Columns in this issue
Data breaches and a history of data abuse led the EU to adopt GDPR, but it might take massive scale data security crises for the U.S. to legislate similar data protection laws.
Data privacy expert and SAP consultant Stephen Lofthouse outlines a six-step process that data managers can follow to be compliant with GDPR regulations.
As real-time big data increasingly hitches up to internet of things, edge computing power and fog nodes, a whole new layer of security threats emerges.