Securing Access to Big Data and Cloud Environments: Federal Defense In-Depth Strategies

Securing Access to Big Data and Cloud Environments: Federal Defense In-Depth Strategies
Among its predictions for 2012, analyst firm IDC predicted the volume of digital data would jump to 2.7 billion Tbytes, up 48 percent from 2011. By 2015, the firm predicts, that figure will reach 8 billion Tbytes. In federal organizations data is doubling in size every other year with no slow down in sight.

Organizations will increasingly have big data infrastructures spread across private and public cloud and on-premise data centers. Again, IDC estimates that by 2015 nearly 20 percent of all information will be touched by cloud computing service providers. But most big data architectures today (like Hadoop) do not implement a complete defense in-depth approach that deploys consistent access and security controls, granular privilege management and a trust-based network of systems for end-to-end encryption of data moving between these systems.

Key topics to be discussed include:

  • The imperative for centralized identities and unified access management for big data initiatives;
  • Use of Active Directory as the authoritative identity source, role-based access control, privilege management and trust-based protection of sensitive systems;
  • Securing mobile devices via a unified access management strategy based on Active Directory.

Background

Federal IT leaders require layered security approaches for distributed and heterogeneous environments characteristic of big data and cloud deployments. However, securing systems, databases and applications with a simple and cost effective approach that can enforce all the security controls, trust-based protection of sensitive systems and continuous monitoring required across on-premise, private and public cloud computing environments is a major challenge facing Federal IT leaders. This webcast will explain the advantages of controlling, securing and auditing systems, applications and devices leveraging a highly scalable infrastructure federal organizations already own - Active Directory.

Federal agencies tasked with cloud-first / share-first priorities need to ensure a robust and layered approach for big data and cloud initiatives. Given the sensitive nature of data stored on distributed and heterogeneous systems that make up federal IT environment it is critical that security controls, least-access privileges, separation of duties; auditing and continuous monitoring can be enforced in this environment. And federal IT leaders must meet this challenge in a tight budget environment that demands the highest levels of operational effectiveness and scalability.

The speaker will explain how to deploy many of the critical controls for securing and managing distributed and cross-platform systems that make up big data and cloud environments leveraging an agencies' existing investment in Active Directory.



Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.