Advertisement

Kamis, 21 Agustus 2014

Cyber-Terrorism Struck the Nuclear Regulation Commission - infoTECH Spotlight

 

  Featured Articles



  Sponsored By: Voltage Security, Inc. and Hortonworks


WEBINAR: Securing Hadoop: What Are Your Options?
Wednesday
August 27, 2014
Time: 10:00am PT/ 1:00pm ET

http://images.tmcnet.com/webinars/systech/regbtn.jpg


Abstract Now that you are faced with moving your Hadoop POC into production, you know that sensitive customer and corporate data will be in the ecosystem–credit card numbers, intellectual property, customer files, and more. Now the question becomes, how to keep all this sensitive data secure, as it moves into Hadoop, as it is stored and as it moves beyond Hadoop?  And, most importantly, how to secure the data but still make it available for analytics? After all, analytics is why it’s in Hadoop in the first place. 


Attend this discussion to learn about security options with authentication, authorization, monitoring and data-level security for Apache Hadoop. Get insight to the use cases and architectural decisions that enable the business benefits you need to deliver, while avoiding risks straight from today’s headlines, including cyber attacks and leaking of sensitive customer data. Cases to be covered include:

  1. Global Telco–moving petabytes of user and location data into Hadoop, including 17 PII data elements
  2. Top 5 financial services firm–reducing the costs of its data warehouse infrastructure by performing fraud analytics on Hadoop
  3. Supply Chain data and analytics solutions provider delivering pharmacy claims reconciliations, product usage trending and market basket insights

Learn how to protect your sensitive data, enable analytics without security risk, and neutralize breaches through new data-centric technologies that are easy to integrate with Hive, Sqoop, MapReduce and many other interfaces.




  Top Stories



  From The Expert Corner


 

Disaster Recovery Plans Need That 'VoIP' Factor

 

August 21, 2014

By Rory J. Thompson, Web Editor


With hurricane season well underway and winter not all that far off (it’ll be Labor Day a week from Monday, FYI), companies need to be sure they always have an updated disaster recovery plan in place. While data may be secured in remote, duplicate locations, not everyone has given thought to communications. And that’s where VoIP comes in.


In a recent blog post, freelance tech writer John Terra took a closer look at this issue, and came up with some strong suggestions that any enterprise would be wise to heed.

“Maybe it's a natural disaster, or maybe it's a failure of the infrastructure (burst pipes, electrical fire), but whatever it is, a prudent business has a recovery plan set up to best lessen the impact of the disaster and get back up and running in the shortest time and with minimal fuss,” he wrote. “But in this grand plan, have you considered the value of VoIP in expediting recovery? If not, consider changing that, and the first step is to see how this awesome communications technology can make life easier in the aftermath of a setback...Read More


  Featured Video



  TMCnet Free Premium Content



   Latest Blogs



  Featured Channels



  Webinars



  Become a TMCnet Columnist!


Become a TMCnet columnist! Want to contribute your expertise to a growing audience of technology professionals? Become a writer, blogger or columnist for the TMCnet Web site and this newsletter. Contact TMCnet Group Editorial Director, Erik Linask, at elinask@tmcnet.com for details.



This email was distributed by: Technology Marketing Corporation, 800 Connecticut Avenue, Norwalk, CT 06854 As a valued reader or attendee of TMC's publications and events, you will occasionally receive carefully-screened offers and free product information via email. If you no longer wish to receive this type of email, please go to http://www.tmcnet.com/enews/subs.aspx?eml=ipat39@gmail.com to adjust your preferences.


Tidak ada komentar:

Posting Komentar