CSO - Big data is all the buzz in board rooms these days, but in security circles it's a mixed blessing.
The technology allows tons of threat data to be analyzed and used to thwart intruders. In the enterprise, it can be used to analyze volumes of network traffic to reveal insider trouble and advanced persistent threats.
Problem is, the network architecture that supports big data wasn't created with security in mind, which can create problems for system defenders.
A common big data deployment uses Hadoop to manage the clusters of computers used to crunch the mountains of data fed into it. That can create problems for defenders, especially if they're trying to use traditional security tools to protect their big data fortress.
"Incumbent data security vendors believe that Hadoop and distributed cluster security can be addressed with traditional perimeter security solutions such as firewalls and intrusion detection/prevention technologies," explained Zettaset, a big data security company, in a white paper "The big data Security Gap: Protecting the Hadoop Cluster."
"But no matter how advanced, traditional approaches that rely on perimeter security are unable to adequately secure Hadoop clusters and distributed file systems," it added.
Traditional security products are designed to protect a single database, noted Zettaset CTO Brian Christian. When those products are forced to protect a distributed cluster of computers that can number in the thousands, their capacity is taxed.
"When you put them on a large scale distributed computing environment, they become either a choke point or a single point of failure for the entire cluster," Christian said in an interview.
"They could potentially be extremely dangerous running them on a cluster," he said, "because if they do fail, there is the potential to deny everybody on the cluster access to petabytes of data or a corruption of data in some of the encryption security technologies."
Performance problems aren't unusual where security is "bolted on" to a big data setup, said Jason Escaravage, a principal with Booz Allen Hamilton.
For example, if you have a central place where everyone has to check credentials and you have to leave the system to access those credentials on an external security system, each one of those transactions are going to slow things down.
That can be challenging not only for system performance, but for a company's bottom line, too. "When you come to a system that's already been deployed and you're trying wrap security around it or bolt it on at the end, it's costly because it wasn't designed up front," Escaravage said in an interview.
- Seattle Children's Accelerates Citrix Login Times by 500% with Cross-Tier Insight Seattle Children's is a leading research hospital with a large and growing Citrix XenDesktop deployment. With ExtraHop, the IT team at Seattle Children's...
- Data Protection eGuide In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly...
Best Practices in Enterprise Data Governance
This paper explores the challenges organizations have today in implementing a data
governance program via an actual business case. It highlights SAS technology that
- 10 Mistakes to Avoid When Launching Your DG Program From failing to define data governance, to premature launch, or expecting too much from a sponsor, this white paper explains ten common mistakes...
- The Key to Happiness: Throw out Your Data Warehouse In this webinar, Kerry Reitnauer, Director, Solution Architect at FairPoint Communications will discuss the challenges the data warehouse brought, how they migrated to...
- Building Tomorrow's Data Center with Converged Technologies A number of forces are converging: the cloud, converged infrastructure, big data and fabric architectures to name a few. All Data Center White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!