Welcome!

News Feed Item

Zettaset Announces Data-in-Motion Encryption for Hadoop

New Encryption Capability Integrated Into Existing Comprehensive Security Solution for Enterprises Using Hadoop

MOUNTAIN VIEW, CA -- (Marketwired) -- 03/25/14 -- Zettaset, the leader in secure Big Data management, today announced the addition of data-in-motion encryption as a new feature in its innovative Zettaset Orchestrator management and security add-on application for Hadoop. Data-in-motion encryption provides organizations with an additional layer of protection for their Hadoop clusters and sensitive data, eliminating access by unauthorized users.

Orchestrator data-in-motion encryption ensures that all networking connections to the Orchestrator web-based console are completely secure within a Secure Socket Layer (SSL) tunnel. Communication links between all cluster nodes are encrypted and authenticated to eliminate the possibility of unauthorized access to data by anyone within the corporate network or Hadoop cluster. Connections from the Orchestrator Business Intelligence (BI) Connector, an API that connects Hadoop clusters with analytics applications, are also protected.

"Risks associated with Hadoop projects include security and privacy challenges," wrote Gartner Research Director & Analyst, Bhavish Sood et. al. "Hadoop certainly wasn't built with enterprise IT environments in mind because there is a shortage of robust security controls in Hadoop."(1)

Orchestrator data-in-motion encryption comes on the heels of Zettaset's data-at-rest encryption, and similarly, is designed to have virtually no negative impact on node and cluster performance. Node performance with encryption is especially critical as more enterprise customers scale up their Hadoop clusters and move from pilot to production.

"Orchestrator data-in-motion encryption for Hadoop represents the next phase of Zettaset's Big Data encryption technology initiative, which began with the release of data-at-rest encryption in late 2013," said Jim Vogt, CEO of Zettaset. "Unlike other Hadoop encryption approaches which are bolt-on point products, Zettaset has integrated encryption into a complete security solution for Hadoop that provides an enterprise-wide framework for identity and access management, as well as security policy enforcement."

Orchestrator's management console automates virtually all manual configuration processes within Hadoop, eliminating the need for professional services and reducing IT resource requirements in the enterprise.

The Orchestrator security and management application is not a Hadoop distribution, but is distribution-agnostic and fully compatible with branded Hadoop distributions from Cloudera and Hortonworks. Orchestrator can replace existing branded Hadoop management products with a more automated and robust Hadoop management platform, which is optimized to deliver superior security and high availability for enterprise customers. Data-in-motion encryption is part of Orchestrator's comprehensive, fully-integrated security solution. Zettaset Orchestrator features and benefits include:

  • Data-at-rest encryption
  • Fine-grained, role-based access control
  • Automated active directory (AD) and LDAP integration
  • Activity monitoring for data capture and compliance reporting
  • Automated installation and configuration of all security components into the Hadoop cluster
  • Patented high-availability which ensures that every Hadoop service is protected with automated fail-over

Data-in-motion encryption for Hadoop will be bundled with every Orchestrator application license, and is scheduled for availability in early Q2, 2014.

For more information, please visit here.

(1) Gartner - Technology Overview: Hadoop Maturity and Adoption Trends in Asia/Pacific, 22 October 2013, Bhavish Sood, Arun Chandrasekaran
About Zettaset, Inc.

Zettaset, the leader in secure Big Data management, automates, accelerates, and simplifies Hadoop cluster deployment for the enterprise. Zettaset Orchestrator™ is the only Big Data management solution designed to address enterprise requirements for comprehensive security, high availability, manageability and scalability in a distributed computing environment. Orchestrator helps organizations move Hadoop more efficiently from pilot into production, replacing open source management with a more robust approach that easily fits into existing enterprise security and policy frameworks. Zettaset Orchestrator provides multi-service fail-over for all critical cluster services, facilitates integration with the most widely adopted ETL and analytics applications, and is compatible with the leading Hadoop distributions.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Hardware virtualization and cloud computing allowed us to increase resource utilization and increase our flexibility to respond to business demand. Docker Containers are the next quantum leap - Are they?! Databases always represented an additional set of challenges unique to running workloads requiring a maximum of I/O, network, CPU resources combined with data locality.
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackIQ...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of Dev...
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it m...
In their general session at 16th Cloud Expo, Michael Piccininni, Global Account Manager - Cloud SP at EMC Corporation, and Mike Dietze, Regional Director at Windstream Hosted Solutions, reviewed next generation cloud services, including the Windstream-EMC Tier Storage solutions, and discussed how to increase efficiencies, improve service delivery and enhance corporate cloud solution development. Michael Piccininni is Global Account Manager – Cloud SP at EMC Corporation. He has been engaged in t...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus o...
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...