SlideShare a Scribd company logo
1 of 10
Download to read offline
Introducing Active Security
Solving the Challenges of Accessing Unified Information
Across Multiple Silos
An Attivio Technology Brief
1
Introduction
The ability to easily define and manage user security access to relational databases (structured data) has
long been taken for granted by organizations. Setting and managing security permissions for
unstructured content (such as documents, email and other free-flowing text sources), on the other hand,
remains maddeningly complex and labor-intensive.
Information retrieval systems originally focused on providing access either to public information or
semi-private information, such as research papers viewable by anyone with an account. Security
permissioning was not a concern. Of course, security is a major concern for the enterprise. Access to
such confidential content as salary reports, potential acquisitions and new product research must be
strictly limited to select users, groups and roles within the organization. Any viable enterprise
information system must respect these permission structures.
Most information retrieval solutions have added security access controls using one of the two primary
security approaches: early binding and late binding. Unfortunately, both approaches come with serious
flaws that incur slow query response times, system latency, constant maintenance and other headaches.
Attivio has eliminated these frustrations with its next-generation Active Security technology found in
Attivio’s Active Intelligence Engine® (AIE).
Attivio AIE integrates, correlates and presents all related information – structured and unstructured,
internal and external – with no advance modeling required. End users easily access, explore and analyze
this unified information to gain new business insights not possible working with silos of structured data
or unstructured content alone.
Attivio’s Active Security makes it possible to provide this unprecedented level of unified information
access throughout the enterprise. Unlike early binding or late binding, Active Security supports all
security access controls – no matter how complex – with fast performance and easy administration.
This brief will explore the significant technical problems that accompany early binding and late binding
user permissioning for unstructured information, rendering early and late binding systems very
impractical. You will also discover how Attivio’s Active Security model eliminates these issues to provide
security access controls that are as easily created and maintained as for a database, as evidenced by two
case studies in which Active Security enabled business success where other vendor tools had failed.
Why Early Binding Fails
The early binding security approach basically consists of tagging each piece of content during ingestion
with access control lists (ACLs) containing users and/or groups who have access rights to that piece of
content. At query time, the security system (such as Active Directory or LDAP) retrieves the ACLs the
user is part of; this information is then turned into a filter that is applied to a user’s query.
2
While this model allows for fast queries and exact counts for faceting and other aggregations, early
binding has several significant drawbacks that render it almost unusable.
Because each document is tagged with the ACLs directly, any change to the allowed users/groups
requires the document be re-ingested and re-processed. This means, for example, that an affected
20mb PDF file or image content requiring OCR processing and complex text analytics must be re-
processed completely from scratch – a highly time- and resource-intensive proposition. Changes to ACLs
rarely impact a single document, but rather large sets of content (folders, drives, etc.), resulting in a
huge number of documents that must be re-processed.
Changes to account users and the groups themselves present an even greater problem. For example, if a
group is merged with another group due to a company reorg or a new parent group is created, you will
have to re-process all impacted portions of your indexed content. Even minor changes to the structure
of your organization can trigger massive re-processing efforts.
Further muddying the waters is the fact that some users and ACLs exist across different realms. For
example, if Tom@Windows and Tom@Unix are both the same user, it would be best if both realms'
ACLs are applied whenever Tom submits a user query.
The direct result of these drawbacks is tremendous latency – days in some cases – in updating access
control of content. This leaves significant security gaps that require either excluding certain content or
limiting the functionality of the solution itself. Additionally, because systems using early binding require
constant re-processing of content, significantly more hardware is required in order to keep up with the
ongoing required changes.
Key Summary Points - Early Binding:
 Requires constant/expensive reprocessing of content
 Imposes huge latency in updates to ACLs
 Requires additional hardware for constant reprocessing
3
Why Late Binding Fails
The late binding security approach was developed to address the significant latency and brittleness
issues of the early binding approach. Unlike early binding, late binding requires no additional processing
of content during ingestion. Instead, each query is executed with no access control filtering at all. Each
result in the full result set is then compared, at run time, with user/group permissions to determine
whether the user is allowed to view that result.
Late binding enables any changes to security permissions to be propagated immediately without the
latency common with early binding. Unfortunately, like early binding, late binding also has several
unacceptable significant drawbacks.
First, because access controls must be applied at query time, late binding significantly impairs the
performance of the system. The system must support a high volume of requests to determine whether
user X can see document Y. For example, a given user query might yield hundreds or even thousands of
matching documents, but under late binding security, each document must be compared against the
user’s permissions before finally presenting the ten documents the user is allowed to see.
Performing such lookups for each document in every full result set, in real-time, puts an enormous strain
on the source and security systems. These systems typically are not designed and scaled for this type of
interaction, which can negatively impact performance across the entire organization (for example,
others using Active Directory) or require additional hardware investment to scale these systems out to
support the additional load.
Because of the extensive processing required to present a final security-filtered result set, most
solutions using late binding either do not support paging through the results or, if they do, performance
is frustratingly slow. Even worse, other highly useful information system features such as faceted
navigation, spelling suggestions, and “Did you mean…” functionality cannot be safely used, because the
facets presented to the user could include document details that user is not privileged to see. Even
displaying a given facet constitutes a security leakage: the user now knows records exist for that facet.
4
Finally, late binding makes it impossible to give users accurate summarization information such as facet
counts or even total number of search results. Doing so correctly would require scanning the system’s
entire corpus of content, which might work for a few thousand documents, but would never scale to a
few million documents.
The late binding approach represents an unsuccessful attempt to close the latency gap found in the
early binding approach. Unfortunately, late binding incurs severe performance issues and renders
valuable system features usable only in a limited capacity, if at all, due to security concerns. As a result,
late binding is rarely used.
Key Summary Points - Late binding:
 Imposes huge burdens on existing security systems
 Does not provide accurate and completely trimmed result sets
 Significantly slows down query response times
Hybrid Approach: The Worst of Both Worlds
In an effort to mitigate the issues that plague early and late binding, sometimes both approaches are
combined to create a hybrid access control system. Such a hybrid approach provides a base level of
access control using the early binding approach while attempting to reduce the latency inherent in early
binding by layering late bound access control to close the gap.
While this approach can help plug the latency holes introduced by early binding, it still incurs all of the
negatives of both systems: constant ongoing reprocessing of content, heavy system load, security
leakage risks and more. In addition, the latency reduction is only seen in limiting latency of reduced
access to content, but does not improve latency for increases in access which can lead to over-trimming
of result sets.
Key Summary Points - Hybrid approach:
 Requires constant, expensive reprocessing of content
 Requires additional hardware for constant reprocessing
 Imposes huge burdens on existing security systems
 Does not provide accurate and completely trimmed result sets
 Significantly slows down query response times
The Attivio Solution: Active Security
Attivio’s Active Intelligence Engine is the only information system on the market today that actually
solves the problems described above, plus much more, through its innovative Active Security model.
Attivio Active Security incorporates a clear understanding of how access controls are actually used
within organizations. For example, changes in access control are primarily changes in access to sets
5
(sometimes large sets) of content, as well changes to the user/group structure itself. Additionally, for
organizations where security access control is critical, such as financial services and intelligence, other
factors often play a critical role in controlling access to content, such as location, device, time of day,
temporary access and more. From this understanding, we designed and built Attivio Active Security.
Active Security accepts and normalizes access control and related security information (including users,
groups, ACLs, realms) from connectors and stores them as independent records in a relational structure
within the Attivio universal index, separate from the document content – just as a database does.
At query time, Active Security automatically intersects the set of records that match the user’s query
with the set of records the user is authorized to see, using a combination of Attivio’s patented query-
time JOIN operator and Attivio’s GRAPH operator.
First, the hierarchy of groups and parent groups that a user can access is traversed using the GRAPH
operator. This set of user/group records is then bonded to the ACLs using a specialized JOIN operation
(appropriately called ACL) which performs both ALLOW and DENY operations. This set of ACLs is then
bound to the original document set using an INNER JOIN that produces a properly filtered set of results.
This result set includes static and dynamically generated facets featuring exact counts, all respecting the
user’s security privileges.
The benefits of Active Security are compelling:
Low Update Latency. Attivio Active Security minimizes update latency for access control changes. As
ACLs are not bound to the underlying document content, changes to access controls – even changes
that impact large sets of documents – can be made very quickly because the original content does not
have to be re-processed.
High Scalability. Attivio Active Security has been implemented by some of our largest customers for
systems containing hundreds of millions of documents with hundreds of thousands of users and groups,
while still delivering sub-second query response times.
6
Low Security/Directory System Load. Unlike late bound security systems, Attivio Active Security does
not interact with security/directory systems at query time. All access control is performed within Attivio
AIE. By taking the security/directory system out of the query, Active Security both minimizes load on
those systems and substantially improves query performance compared to late-bound systems.
The only interaction Active Security has with security/directory systems is in periodically updating the
user/group hierarchy stored within AIE. This update mechanism takes advantage of incremental update
capabilities provided by security systems in order to both minimize load and reduce change latency.
Exceptional Simplicity. Attivio Active Security is easy for both administrators and developers to work
with. Out of the box, Active Security provides several essential features:
 An Active Directory scanner to ingest users, groups and group membership
 A Windows file scanner to ingest documents along with their Windows ACLs
 A Windows service to persist ACL updates in real-time to the index (without re-indexing the
document)
 An Exchange scanner to ingest emails along with their ACLs
 A SharePoint scanner to ingest SharePoint documents along their ACLs
 The ability to create cross-realm aliases, so that user Tom@Windows and Tom@Unix can be
treated as the same user with respect to permissions
 An extensible API to support custom user, group and ACL ingestion
 Complete security filtering of queries and their results (including facets) so users have no
knowledge of applied security rules
Developers building user interfaces need to simply pass the ID of the user to Attivio AIE when executing
queries. Active Security will automatically inject all access controls into those queries, no matter how
complex.
High Extensibility. While Attivio Active Security is very simple to deploy out of the box, it is also
extremely extensible. It was built from the ground up with the understanding that access control
requirements imposed by business and legal compliance rules do not map to a standard user/group
model. As a result, Active Security supports ephemeral group membership based upon time of day, type
of device being used or where in the world the query is issued, simply by adjusting the model.
Active Security also supports customization of how documents and ACLs are modeled, allowing for
folder-level ACLs instead of per-record ACLs, to minimize update times even further for larger systems.
All of this customization is encapsulated within the Active Security model so interactions with the
system do not change from an administrative and development perspective.
Active Security in Action: A Business Success Enabler Instead of a Barrier
Intralinks is a leading global provider of Software-as-a-Service (SaaS) solutions for securely managing
content, exchanging critical business information and collaborating within and among organizations. The
company replaced its legacy enterprise search solution with Attivio AIE. Unlike Intralinks’ legacy
7
solution, Attivio AIE lets users easily explore and discover all relevant information, whether structured or
unstructured, while ensuring real-time security, availability and reliability.
“Attivio gives Intralinks a tremendous competitive edge,” said Fahim Siddiqui, Executive Vice President
of Product Development and Operations for Intralinks. “At Intralinks, we strive to ensure that every time
a customer comes to our site, they are delighted. With Attivio’s help, we are providing the best-in-class
user interface.”
A major driver in Intralinks’ selection of Attivio AIE was Active Security, which fully supported Intralinks’
complex security access model, succeeding where its legacy solution was continuously failing to keep up
with Intralinks’ business needs. The final straw was an exorbitant proposal from the incumbent vendor
calling for a 54-week, $5M custom development engagement that still would not have significantly
improved performance. Attivio implemented AIE for Intralinks at a fraction of the cost in seven weeks.
The legacy solution used a hybrid security system that caused unacceptable latency issues. Detailed user
permissions were maintained in a separate database; to ingest it, the legacy search product had to first
convert it into a flat file, losing the relational value of the data. The legacy solution required comparing
each document matching a user query with the user’s permissions before presenting the final results
(late binding), incurring noticeably slow response times. Even worse, user permissions could not be
updated in real time; permissions had to be updated for each document (early binding). “User
permissions must be rapidly updatable, as content is often sensitive and confidential. It is critical to user
confidence,” Siddiqui said.
Attivio AIE’s integrated Active Security model fulfilled Intralinks’ needs for real-time permissioning to
put an end to latency issues. Unlike the legacy search tool, Attivio AIE normalizes and stores user
permissions in tables, separate from document content, without “flattening.” Attivio AIE then performs
ad hoc relational JOINs documents matching a user’s query with what the user is authorized to see, for
fast, highly scalable performance that also allows for real-time changes to permissions with no latency.
“Everything we do depends on the utmost security, availability and reliability, including tightly managing
access control lists (ACLs) and workspace-specific roles and permissions,” said John Landy, Chief
Technology Officer for Intralinks. “Attivio AIE empowers Intralinks’ permissioning model, enabling users
to find and examine critical information, while maintaining strict access rights.”
Siddiqui concluded, “We consider Attivio a key platform component.”
The investment banking division of a global financial services provider turned to Attivio AIE to resolve
issues adversely impacting access to its numerous silos of SharePoint repositories, used by over 15,000
employees to access over 40 million internal documents.
The division maintained a separate database with highly detailed user security entitlements. Changes or
suspensions of a user’s permissions required 24 hours to enact – a significant latency issue – as it was
necessary to re-index all affected content (early binding).
To try to help mitigate this latency, IT managers resorted to a hybrid combination of re-indexing and late
binding, blocking access to disallowed content just before presenting authorized content in response to
8
an end user query. In addition to slowing system performance, late binding still does not prevent the
display of navigation facets drawn from disallowed content, causing needless security breaches.
Attivio’s Active Security quickly resolved these interrelated security, latency and performance issues for
the division. Active Security stores all documents, groups, users and access control lists (ACLs) in a
separate security table within the AIE index, eliminating the need for a separate security database.
Changes or suspensions to user permissions take effect immediately with no latency and no impact on
system availability or performance.
Between AIE’s Active Security and superior navigation capabilities such as dynamically-created
recommended facets, the division solved its SharePoint security-related issues, providing users with
uninterrupted access and exploration of key information.
Conclusion: Active Security Eliminates Early & Late Binding Issues Permanently
Simply put, Attivio has solved the long-standing problem of providing access security controls to
unstructured content without incurring the serious liabilities of early binding and late binding. Active
Security permanently eliminates these issues, while providing exceptional performance, rapid
deployment and simple administration.
Unlike early binding or late binding, Active Security is comparable to a database in that changing the
permissions on a record, set of records (such as a folder), or some other structure like a security group
doesn’t impact the content at all; there is no need to re-fetch and re-process documents or rows (from a
database), rebuild the index to reflect changes in the group structure, etc.
However, unlike a database, Active Security fully supports the unified information access provided by
Attivio’s Active Intelligence Engine:
 Integration, correlation and presentation of all enterprise information – structured data
together with unstructured content – with no data modeling required
 Arbitrary support for full-text and/or relational queries
 Native SQL support and ODBC/JDBC connectivity, enabling the use of popular business
intelligence (BI) tools as a visual analytical front-end
 Low-cost scaling to massive volumes using commodity servers
Finally, Attivio also recognizes there is no “one-size-fits-all” solution to enterprise information security.
Attivio conceived and developed its Active Security model to provide the agility and flexibility necessary
to seamlessly support future security use cases, such as device-dependent security, hardware/software
fingerprinting and behavioral authentication.
Unlike early or late binding systems, Attivio’s next-generation Active Security is up to the task of
providing powerful, precise security access, supporting even the most complex enterprise security
environments, now as well as for the future.
9
About Attivio
Attivio’s Active Intelligence Engine® (AIE), redefines the business impact of our customers’ information
assets, so they can quickly seize opportunities, solve critical challenges and fulfill their strategic vision.
Attivio correlates disparate silos of structured data and unstructured content in ways never before
possible. Offering both intuitive search capabilities and the power of SQL, AIE seamlessly integrates with
existing BI and big data tools to reveal insight that matters, through the access method that best suits
each user’s technical skills and priorities. Please visit us at www.attivio.com.
Attivio, Inc. • 275 Grove Street • Newton, MA 02466 USA
o +1.857.226.5040 • f +1.857.226.5072 • info@attivio.com• www.attivio.com
© 2013 Attivio, Inc. All rights reserved. Attivio, Active Intelligence Engine, and all other related logos and product names are registered
trademarks of Attivio. All other company, product, and service names are the property of their respective holders.

More Related Content

What's hot

Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Editor IJARCET
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...IJMER
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudGowthami Konakanchi
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresIJRES Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Security For Application Development
Security For Application DevelopmentSecurity For Application Development
Security For Application Development6502programmer
 
Back to the Office: Privacy and Security Solutions to Compliance Issues for 2...
Back to the Office: Privacy and Security Solutions to Compliance Issues for 2...Back to the Office: Privacy and Security Solutions to Compliance Issues for 2...
Back to the Office: Privacy and Security Solutions to Compliance Issues for 2...Aggregage
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...NextLabs, Inc.
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Editor IJARCET
 
Distributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudDistributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudChanakya Chandu
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd Iaetsd
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageIEEEFINALYEARPROJECTS
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...IEEEGLOBALSOFTTECHNOLOGIES
 
Approved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in CloudApproved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in CloudEditor IJCATR
 

What's hot (19)

Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
 
Ensuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloudEnsuring distributed accountability for data sharing in the cloud
Ensuring distributed accountability for data sharing in the cloud
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
I42024349
I42024349I42024349
I42024349
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Security For Application Development
Security For Application DevelopmentSecurity For Application Development
Security For Application Development
 
Back to the Office: Privacy and Security Solutions to Compliance Issues for 2...
Back to the Office: Privacy and Security Solutions to Compliance Issues for 2...Back to the Office: Privacy and Security Solutions to Compliance Issues for 2...
Back to the Office: Privacy and Security Solutions to Compliance Issues for 2...
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
 
Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944Volume 2-issue-6-1939-1944
Volume 2-issue-6-1939-1944
 
Distributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudDistributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloud
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
Dit yvol3iss33
Dit yvol3iss33Dit yvol3iss33
Dit yvol3iss33
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
 
Approved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in CloudApproved TPA along with Integrity Verification in Cloud
Approved TPA along with Integrity Verification in Cloud
 

Similar to Attivio Active Security Technical Brief

Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueEswar Publications
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docxaulasnilda
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docxcroftsshanon
 
64.ensuring distributed accountability
64.ensuring distributed accountability64.ensuring distributed accountability
64.ensuring distributed accountabilityNagaraj Naidu
 
Scalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesScalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesFinalyear Projects
 
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...Finalyear Projects
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesHitachi ID Systems, Inc.
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security FrameworkMaria Perkins
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKijcsit
 
CHAPTER 9 Design Considerations In this chapter you will
CHAPTER 9 Design Considerations In this chapter you willCHAPTER 9 Design Considerations In this chapter you will
CHAPTER 9 Design Considerations In this chapter you willJinElias52
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementRyan Gallavin
 
Hrm database-management-java-project
Hrm database-management-java-projectHrm database-management-java-project
Hrm database-management-java-projectchetanmbhimewal
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsAnton Chuvakin
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...IJERA Editor
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsAnton Chuvakin
 
A03302001006
A03302001006A03302001006
A03302001006theijes
 

Similar to Attivio Active Security Technical Brief (20)

Secure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption TechniqueSecure Authorised De-duplication using Convergent Encryption Technique
Secure Authorised De-duplication using Convergent Encryption Technique
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
 
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
1 hour agoSrinivas Goud Thadakapally week 3 discussionCOLL.docx
 
64.ensuring distributed accountability
64.ensuring distributed accountability64.ensuring distributed accountability
64.ensuring distributed accountability
 
Scalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesScalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehouses
 
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 
Database Security - IK
Database Security - IKDatabase Security - IK
Database Security - IK
 
A1802030104
A1802030104A1802030104
A1802030104
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security Framework
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORK
 
oracle
oracleoracle
oracle
 
CHAPTER 9 Design Considerations In this chapter you will
CHAPTER 9 Design Considerations In this chapter you willCHAPTER 9 Design Considerations In this chapter you will
CHAPTER 9 Design Considerations In this chapter you will
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access Management
 
Hrm database-management-java-project
Hrm database-management-java-projectHrm database-management-java-project
Hrm database-management-java-project
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and Operations
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
Data base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access methodData base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access method
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and Operations
 
A03302001006
A03302001006A03302001006
A03302001006
 

More from Attivio

What To Do When Watson Fails
What To Do When Watson FailsWhat To Do When Watson Fails
What To Do When Watson FailsAttivio
 
Cognitive Search for Knowledge Management
Cognitive Search for Knowledge ManagementCognitive Search for Knowledge Management
Cognitive Search for Knowledge ManagementAttivio
 
Cognitive Search for Knowledge Management
Cognitive Search for Knowledge ManagementCognitive Search for Knowledge Management
Cognitive Search for Knowledge ManagementAttivio
 
Attivio Predictions 2017
Attivio Predictions 2017Attivio Predictions 2017
Attivio Predictions 2017Attivio
 
Achieving Compliance Efficiencies Amid Heightened Regulatory Scrutiny
Achieving Compliance Efficiencies Amid Heightened Regulatory ScrutinyAchieving Compliance Efficiencies Amid Heightened Regulatory Scrutiny
Achieving Compliance Efficiencies Amid Heightened Regulatory ScrutinyAttivio
 
Attivio Survey of Big Data Decision Makers
Attivio Survey of Big Data Decision MakersAttivio Survey of Big Data Decision Makers
Attivio Survey of Big Data Decision MakersAttivio
 
Reduce Risk and Protect Brand Value Through Proactive Monitoring and Compliance
Reduce Risk and Protect Brand Value Through Proactive Monitoring and Compliance Reduce Risk and Protect Brand Value Through Proactive Monitoring and Compliance
Reduce Risk and Protect Brand Value Through Proactive Monitoring and Compliance Attivio
 
IDC Report - Unified Information Access on a Solid Search Base
IDC Report - Unified Information Access on a Solid Search BaseIDC Report - Unified Information Access on a Solid Search Base
IDC Report - Unified Information Access on a Solid Search BaseAttivio
 
TDWI Best Practices Report- Achieving Greater Agility with Business Intellige...
TDWI Best Practices Report- Achieving Greater Agility with Business Intellige...TDWI Best Practices Report- Achieving Greater Agility with Business Intellige...
TDWI Best Practices Report- Achieving Greater Agility with Business Intellige...Attivio
 
Attivio Customer Success Story - USGA
Attivio Customer Success Story - USGAAttivio Customer Success Story - USGA
Attivio Customer Success Story - USGAAttivio
 
Attivio Customer Success Story - UBS Neo
Attivio Customer Success Story - UBS NeoAttivio Customer Success Story - UBS Neo
Attivio Customer Success Story - UBS NeoAttivio
 
Attivio Customer Success Story - Durkheim Project
Attivio Customer Success Story - Durkheim Project Attivio Customer Success Story - Durkheim Project
Attivio Customer Success Story - Durkheim Project Attivio
 
Attivio Customer Success Story - Citi
Attivio Customer Success Story - CitiAttivio Customer Success Story - Citi
Attivio Customer Success Story - CitiAttivio
 
Accelerate Data Discovery
Accelerate Data Discovery   Accelerate Data Discovery
Accelerate Data Discovery Attivio
 
Customer Retention & Upsell Solution Brief
Customer Retention & Upsell Solution BriefCustomer Retention & Upsell Solution Brief
Customer Retention & Upsell Solution BriefAttivio
 
eCommunications Surveillance Solution Brief
eCommunications Surveillance Solution Brief eCommunications Surveillance Solution Brief
eCommunications Surveillance Solution Brief Attivio
 
Attivio Product and Company Overview
Attivio Product and Company OverviewAttivio Product and Company Overview
Attivio Product and Company OverviewAttivio
 
Attivio Company Brochure
Attivio Company BrochureAttivio Company Brochure
Attivio Company BrochureAttivio
 
Attivio Customer Success Story - UBS Neo Customer Retention & Upsell
Attivio Customer Success Story - UBS Neo Customer Retention & UpsellAttivio Customer Success Story - UBS Neo Customer Retention & Upsell
Attivio Customer Success Story - UBS Neo Customer Retention & UpsellAttivio
 
Attivio Customer Success Story - National Instruments Search & Discovery
Attivio Customer Success Story - National Instruments Search & DiscoveryAttivio Customer Success Story - National Instruments Search & Discovery
Attivio Customer Success Story - National Instruments Search & DiscoveryAttivio
 

More from Attivio (20)

What To Do When Watson Fails
What To Do When Watson FailsWhat To Do When Watson Fails
What To Do When Watson Fails
 
Cognitive Search for Knowledge Management
Cognitive Search for Knowledge ManagementCognitive Search for Knowledge Management
Cognitive Search for Knowledge Management
 
Cognitive Search for Knowledge Management
Cognitive Search for Knowledge ManagementCognitive Search for Knowledge Management
Cognitive Search for Knowledge Management
 
Attivio Predictions 2017
Attivio Predictions 2017Attivio Predictions 2017
Attivio Predictions 2017
 
Achieving Compliance Efficiencies Amid Heightened Regulatory Scrutiny
Achieving Compliance Efficiencies Amid Heightened Regulatory ScrutinyAchieving Compliance Efficiencies Amid Heightened Regulatory Scrutiny
Achieving Compliance Efficiencies Amid Heightened Regulatory Scrutiny
 
Attivio Survey of Big Data Decision Makers
Attivio Survey of Big Data Decision MakersAttivio Survey of Big Data Decision Makers
Attivio Survey of Big Data Decision Makers
 
Reduce Risk and Protect Brand Value Through Proactive Monitoring and Compliance
Reduce Risk and Protect Brand Value Through Proactive Monitoring and Compliance Reduce Risk and Protect Brand Value Through Proactive Monitoring and Compliance
Reduce Risk and Protect Brand Value Through Proactive Monitoring and Compliance
 
IDC Report - Unified Information Access on a Solid Search Base
IDC Report - Unified Information Access on a Solid Search BaseIDC Report - Unified Information Access on a Solid Search Base
IDC Report - Unified Information Access on a Solid Search Base
 
TDWI Best Practices Report- Achieving Greater Agility with Business Intellige...
TDWI Best Practices Report- Achieving Greater Agility with Business Intellige...TDWI Best Practices Report- Achieving Greater Agility with Business Intellige...
TDWI Best Practices Report- Achieving Greater Agility with Business Intellige...
 
Attivio Customer Success Story - USGA
Attivio Customer Success Story - USGAAttivio Customer Success Story - USGA
Attivio Customer Success Story - USGA
 
Attivio Customer Success Story - UBS Neo
Attivio Customer Success Story - UBS NeoAttivio Customer Success Story - UBS Neo
Attivio Customer Success Story - UBS Neo
 
Attivio Customer Success Story - Durkheim Project
Attivio Customer Success Story - Durkheim Project Attivio Customer Success Story - Durkheim Project
Attivio Customer Success Story - Durkheim Project
 
Attivio Customer Success Story - Citi
Attivio Customer Success Story - CitiAttivio Customer Success Story - Citi
Attivio Customer Success Story - Citi
 
Accelerate Data Discovery
Accelerate Data Discovery   Accelerate Data Discovery
Accelerate Data Discovery
 
Customer Retention & Upsell Solution Brief
Customer Retention & Upsell Solution BriefCustomer Retention & Upsell Solution Brief
Customer Retention & Upsell Solution Brief
 
eCommunications Surveillance Solution Brief
eCommunications Surveillance Solution Brief eCommunications Surveillance Solution Brief
eCommunications Surveillance Solution Brief
 
Attivio Product and Company Overview
Attivio Product and Company OverviewAttivio Product and Company Overview
Attivio Product and Company Overview
 
Attivio Company Brochure
Attivio Company BrochureAttivio Company Brochure
Attivio Company Brochure
 
Attivio Customer Success Story - UBS Neo Customer Retention & Upsell
Attivio Customer Success Story - UBS Neo Customer Retention & UpsellAttivio Customer Success Story - UBS Neo Customer Retention & Upsell
Attivio Customer Success Story - UBS Neo Customer Retention & Upsell
 
Attivio Customer Success Story - National Instruments Search & Discovery
Attivio Customer Success Story - National Instruments Search & DiscoveryAttivio Customer Success Story - National Instruments Search & Discovery
Attivio Customer Success Story - National Instruments Search & Discovery
 

Recently uploaded

Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023ymrp368
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 

Recently uploaded (20)

Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 

Attivio Active Security Technical Brief

  • 1. Introducing Active Security Solving the Challenges of Accessing Unified Information Across Multiple Silos An Attivio Technology Brief
  • 2. 1 Introduction The ability to easily define and manage user security access to relational databases (structured data) has long been taken for granted by organizations. Setting and managing security permissions for unstructured content (such as documents, email and other free-flowing text sources), on the other hand, remains maddeningly complex and labor-intensive. Information retrieval systems originally focused on providing access either to public information or semi-private information, such as research papers viewable by anyone with an account. Security permissioning was not a concern. Of course, security is a major concern for the enterprise. Access to such confidential content as salary reports, potential acquisitions and new product research must be strictly limited to select users, groups and roles within the organization. Any viable enterprise information system must respect these permission structures. Most information retrieval solutions have added security access controls using one of the two primary security approaches: early binding and late binding. Unfortunately, both approaches come with serious flaws that incur slow query response times, system latency, constant maintenance and other headaches. Attivio has eliminated these frustrations with its next-generation Active Security technology found in Attivio’s Active Intelligence Engine® (AIE). Attivio AIE integrates, correlates and presents all related information – structured and unstructured, internal and external – with no advance modeling required. End users easily access, explore and analyze this unified information to gain new business insights not possible working with silos of structured data or unstructured content alone. Attivio’s Active Security makes it possible to provide this unprecedented level of unified information access throughout the enterprise. Unlike early binding or late binding, Active Security supports all security access controls – no matter how complex – with fast performance and easy administration. This brief will explore the significant technical problems that accompany early binding and late binding user permissioning for unstructured information, rendering early and late binding systems very impractical. You will also discover how Attivio’s Active Security model eliminates these issues to provide security access controls that are as easily created and maintained as for a database, as evidenced by two case studies in which Active Security enabled business success where other vendor tools had failed. Why Early Binding Fails The early binding security approach basically consists of tagging each piece of content during ingestion with access control lists (ACLs) containing users and/or groups who have access rights to that piece of content. At query time, the security system (such as Active Directory or LDAP) retrieves the ACLs the user is part of; this information is then turned into a filter that is applied to a user’s query.
  • 3. 2 While this model allows for fast queries and exact counts for faceting and other aggregations, early binding has several significant drawbacks that render it almost unusable. Because each document is tagged with the ACLs directly, any change to the allowed users/groups requires the document be re-ingested and re-processed. This means, for example, that an affected 20mb PDF file or image content requiring OCR processing and complex text analytics must be re- processed completely from scratch – a highly time- and resource-intensive proposition. Changes to ACLs rarely impact a single document, but rather large sets of content (folders, drives, etc.), resulting in a huge number of documents that must be re-processed. Changes to account users and the groups themselves present an even greater problem. For example, if a group is merged with another group due to a company reorg or a new parent group is created, you will have to re-process all impacted portions of your indexed content. Even minor changes to the structure of your organization can trigger massive re-processing efforts. Further muddying the waters is the fact that some users and ACLs exist across different realms. For example, if Tom@Windows and Tom@Unix are both the same user, it would be best if both realms' ACLs are applied whenever Tom submits a user query. The direct result of these drawbacks is tremendous latency – days in some cases – in updating access control of content. This leaves significant security gaps that require either excluding certain content or limiting the functionality of the solution itself. Additionally, because systems using early binding require constant re-processing of content, significantly more hardware is required in order to keep up with the ongoing required changes. Key Summary Points - Early Binding:  Requires constant/expensive reprocessing of content  Imposes huge latency in updates to ACLs  Requires additional hardware for constant reprocessing
  • 4. 3 Why Late Binding Fails The late binding security approach was developed to address the significant latency and brittleness issues of the early binding approach. Unlike early binding, late binding requires no additional processing of content during ingestion. Instead, each query is executed with no access control filtering at all. Each result in the full result set is then compared, at run time, with user/group permissions to determine whether the user is allowed to view that result. Late binding enables any changes to security permissions to be propagated immediately without the latency common with early binding. Unfortunately, like early binding, late binding also has several unacceptable significant drawbacks. First, because access controls must be applied at query time, late binding significantly impairs the performance of the system. The system must support a high volume of requests to determine whether user X can see document Y. For example, a given user query might yield hundreds or even thousands of matching documents, but under late binding security, each document must be compared against the user’s permissions before finally presenting the ten documents the user is allowed to see. Performing such lookups for each document in every full result set, in real-time, puts an enormous strain on the source and security systems. These systems typically are not designed and scaled for this type of interaction, which can negatively impact performance across the entire organization (for example, others using Active Directory) or require additional hardware investment to scale these systems out to support the additional load. Because of the extensive processing required to present a final security-filtered result set, most solutions using late binding either do not support paging through the results or, if they do, performance is frustratingly slow. Even worse, other highly useful information system features such as faceted navigation, spelling suggestions, and “Did you mean…” functionality cannot be safely used, because the facets presented to the user could include document details that user is not privileged to see. Even displaying a given facet constitutes a security leakage: the user now knows records exist for that facet.
  • 5. 4 Finally, late binding makes it impossible to give users accurate summarization information such as facet counts or even total number of search results. Doing so correctly would require scanning the system’s entire corpus of content, which might work for a few thousand documents, but would never scale to a few million documents. The late binding approach represents an unsuccessful attempt to close the latency gap found in the early binding approach. Unfortunately, late binding incurs severe performance issues and renders valuable system features usable only in a limited capacity, if at all, due to security concerns. As a result, late binding is rarely used. Key Summary Points - Late binding:  Imposes huge burdens on existing security systems  Does not provide accurate and completely trimmed result sets  Significantly slows down query response times Hybrid Approach: The Worst of Both Worlds In an effort to mitigate the issues that plague early and late binding, sometimes both approaches are combined to create a hybrid access control system. Such a hybrid approach provides a base level of access control using the early binding approach while attempting to reduce the latency inherent in early binding by layering late bound access control to close the gap. While this approach can help plug the latency holes introduced by early binding, it still incurs all of the negatives of both systems: constant ongoing reprocessing of content, heavy system load, security leakage risks and more. In addition, the latency reduction is only seen in limiting latency of reduced access to content, but does not improve latency for increases in access which can lead to over-trimming of result sets. Key Summary Points - Hybrid approach:  Requires constant, expensive reprocessing of content  Requires additional hardware for constant reprocessing  Imposes huge burdens on existing security systems  Does not provide accurate and completely trimmed result sets  Significantly slows down query response times The Attivio Solution: Active Security Attivio’s Active Intelligence Engine is the only information system on the market today that actually solves the problems described above, plus much more, through its innovative Active Security model. Attivio Active Security incorporates a clear understanding of how access controls are actually used within organizations. For example, changes in access control are primarily changes in access to sets
  • 6. 5 (sometimes large sets) of content, as well changes to the user/group structure itself. Additionally, for organizations where security access control is critical, such as financial services and intelligence, other factors often play a critical role in controlling access to content, such as location, device, time of day, temporary access and more. From this understanding, we designed and built Attivio Active Security. Active Security accepts and normalizes access control and related security information (including users, groups, ACLs, realms) from connectors and stores them as independent records in a relational structure within the Attivio universal index, separate from the document content – just as a database does. At query time, Active Security automatically intersects the set of records that match the user’s query with the set of records the user is authorized to see, using a combination of Attivio’s patented query- time JOIN operator and Attivio’s GRAPH operator. First, the hierarchy of groups and parent groups that a user can access is traversed using the GRAPH operator. This set of user/group records is then bonded to the ACLs using a specialized JOIN operation (appropriately called ACL) which performs both ALLOW and DENY operations. This set of ACLs is then bound to the original document set using an INNER JOIN that produces a properly filtered set of results. This result set includes static and dynamically generated facets featuring exact counts, all respecting the user’s security privileges. The benefits of Active Security are compelling: Low Update Latency. Attivio Active Security minimizes update latency for access control changes. As ACLs are not bound to the underlying document content, changes to access controls – even changes that impact large sets of documents – can be made very quickly because the original content does not have to be re-processed. High Scalability. Attivio Active Security has been implemented by some of our largest customers for systems containing hundreds of millions of documents with hundreds of thousands of users and groups, while still delivering sub-second query response times.
  • 7. 6 Low Security/Directory System Load. Unlike late bound security systems, Attivio Active Security does not interact with security/directory systems at query time. All access control is performed within Attivio AIE. By taking the security/directory system out of the query, Active Security both minimizes load on those systems and substantially improves query performance compared to late-bound systems. The only interaction Active Security has with security/directory systems is in periodically updating the user/group hierarchy stored within AIE. This update mechanism takes advantage of incremental update capabilities provided by security systems in order to both minimize load and reduce change latency. Exceptional Simplicity. Attivio Active Security is easy for both administrators and developers to work with. Out of the box, Active Security provides several essential features:  An Active Directory scanner to ingest users, groups and group membership  A Windows file scanner to ingest documents along with their Windows ACLs  A Windows service to persist ACL updates in real-time to the index (without re-indexing the document)  An Exchange scanner to ingest emails along with their ACLs  A SharePoint scanner to ingest SharePoint documents along their ACLs  The ability to create cross-realm aliases, so that user Tom@Windows and Tom@Unix can be treated as the same user with respect to permissions  An extensible API to support custom user, group and ACL ingestion  Complete security filtering of queries and their results (including facets) so users have no knowledge of applied security rules Developers building user interfaces need to simply pass the ID of the user to Attivio AIE when executing queries. Active Security will automatically inject all access controls into those queries, no matter how complex. High Extensibility. While Attivio Active Security is very simple to deploy out of the box, it is also extremely extensible. It was built from the ground up with the understanding that access control requirements imposed by business and legal compliance rules do not map to a standard user/group model. As a result, Active Security supports ephemeral group membership based upon time of day, type of device being used or where in the world the query is issued, simply by adjusting the model. Active Security also supports customization of how documents and ACLs are modeled, allowing for folder-level ACLs instead of per-record ACLs, to minimize update times even further for larger systems. All of this customization is encapsulated within the Active Security model so interactions with the system do not change from an administrative and development perspective. Active Security in Action: A Business Success Enabler Instead of a Barrier Intralinks is a leading global provider of Software-as-a-Service (SaaS) solutions for securely managing content, exchanging critical business information and collaborating within and among organizations. The company replaced its legacy enterprise search solution with Attivio AIE. Unlike Intralinks’ legacy
  • 8. 7 solution, Attivio AIE lets users easily explore and discover all relevant information, whether structured or unstructured, while ensuring real-time security, availability and reliability. “Attivio gives Intralinks a tremendous competitive edge,” said Fahim Siddiqui, Executive Vice President of Product Development and Operations for Intralinks. “At Intralinks, we strive to ensure that every time a customer comes to our site, they are delighted. With Attivio’s help, we are providing the best-in-class user interface.” A major driver in Intralinks’ selection of Attivio AIE was Active Security, which fully supported Intralinks’ complex security access model, succeeding where its legacy solution was continuously failing to keep up with Intralinks’ business needs. The final straw was an exorbitant proposal from the incumbent vendor calling for a 54-week, $5M custom development engagement that still would not have significantly improved performance. Attivio implemented AIE for Intralinks at a fraction of the cost in seven weeks. The legacy solution used a hybrid security system that caused unacceptable latency issues. Detailed user permissions were maintained in a separate database; to ingest it, the legacy search product had to first convert it into a flat file, losing the relational value of the data. The legacy solution required comparing each document matching a user query with the user’s permissions before presenting the final results (late binding), incurring noticeably slow response times. Even worse, user permissions could not be updated in real time; permissions had to be updated for each document (early binding). “User permissions must be rapidly updatable, as content is often sensitive and confidential. It is critical to user confidence,” Siddiqui said. Attivio AIE’s integrated Active Security model fulfilled Intralinks’ needs for real-time permissioning to put an end to latency issues. Unlike the legacy search tool, Attivio AIE normalizes and stores user permissions in tables, separate from document content, without “flattening.” Attivio AIE then performs ad hoc relational JOINs documents matching a user’s query with what the user is authorized to see, for fast, highly scalable performance that also allows for real-time changes to permissions with no latency. “Everything we do depends on the utmost security, availability and reliability, including tightly managing access control lists (ACLs) and workspace-specific roles and permissions,” said John Landy, Chief Technology Officer for Intralinks. “Attivio AIE empowers Intralinks’ permissioning model, enabling users to find and examine critical information, while maintaining strict access rights.” Siddiqui concluded, “We consider Attivio a key platform component.” The investment banking division of a global financial services provider turned to Attivio AIE to resolve issues adversely impacting access to its numerous silos of SharePoint repositories, used by over 15,000 employees to access over 40 million internal documents. The division maintained a separate database with highly detailed user security entitlements. Changes or suspensions of a user’s permissions required 24 hours to enact – a significant latency issue – as it was necessary to re-index all affected content (early binding). To try to help mitigate this latency, IT managers resorted to a hybrid combination of re-indexing and late binding, blocking access to disallowed content just before presenting authorized content in response to
  • 9. 8 an end user query. In addition to slowing system performance, late binding still does not prevent the display of navigation facets drawn from disallowed content, causing needless security breaches. Attivio’s Active Security quickly resolved these interrelated security, latency and performance issues for the division. Active Security stores all documents, groups, users and access control lists (ACLs) in a separate security table within the AIE index, eliminating the need for a separate security database. Changes or suspensions to user permissions take effect immediately with no latency and no impact on system availability or performance. Between AIE’s Active Security and superior navigation capabilities such as dynamically-created recommended facets, the division solved its SharePoint security-related issues, providing users with uninterrupted access and exploration of key information. Conclusion: Active Security Eliminates Early & Late Binding Issues Permanently Simply put, Attivio has solved the long-standing problem of providing access security controls to unstructured content without incurring the serious liabilities of early binding and late binding. Active Security permanently eliminates these issues, while providing exceptional performance, rapid deployment and simple administration. Unlike early binding or late binding, Active Security is comparable to a database in that changing the permissions on a record, set of records (such as a folder), or some other structure like a security group doesn’t impact the content at all; there is no need to re-fetch and re-process documents or rows (from a database), rebuild the index to reflect changes in the group structure, etc. However, unlike a database, Active Security fully supports the unified information access provided by Attivio’s Active Intelligence Engine:  Integration, correlation and presentation of all enterprise information – structured data together with unstructured content – with no data modeling required  Arbitrary support for full-text and/or relational queries  Native SQL support and ODBC/JDBC connectivity, enabling the use of popular business intelligence (BI) tools as a visual analytical front-end  Low-cost scaling to massive volumes using commodity servers Finally, Attivio also recognizes there is no “one-size-fits-all” solution to enterprise information security. Attivio conceived and developed its Active Security model to provide the agility and flexibility necessary to seamlessly support future security use cases, such as device-dependent security, hardware/software fingerprinting and behavioral authentication. Unlike early or late binding systems, Attivio’s next-generation Active Security is up to the task of providing powerful, precise security access, supporting even the most complex enterprise security environments, now as well as for the future.
  • 10. 9 About Attivio Attivio’s Active Intelligence Engine® (AIE), redefines the business impact of our customers’ information assets, so they can quickly seize opportunities, solve critical challenges and fulfill their strategic vision. Attivio correlates disparate silos of structured data and unstructured content in ways never before possible. Offering both intuitive search capabilities and the power of SQL, AIE seamlessly integrates with existing BI and big data tools to reveal insight that matters, through the access method that best suits each user’s technical skills and priorities. Please visit us at www.attivio.com. Attivio, Inc. • 275 Grove Street • Newton, MA 02466 USA o +1.857.226.5040 • f +1.857.226.5072 • info@attivio.com• www.attivio.com © 2013 Attivio, Inc. All rights reserved. Attivio, Active Intelligence Engine, and all other related logos and product names are registered trademarks of Attivio. All other company, product, and service names are the property of their respective holders.