SlideShare ist ein Scribd-Unternehmen logo
1 von 20
PCI Compliant Big Data
Environment
Speaker Name // Speaker Title
Build a PCI-Compliant Big Data Environment with Hadoop
3© Cloudera, Inc. All rights reserved.
• Big Data Is Getting Bigger
• The Costs & Benefits of PCI Compliance
• A Hub for Your Big Data Strategy
• Building a Secure Data Vault
• Experience & Leadership
Agenda
4© Cloudera, Inc. All rights reserved.
Information is the Basis of Industry for Merchants & Banks
Security Enables Strategy to Unlock New Value from More Data
Credit Cards &
Payments
• Card Transactions
• Customer Data
• Online Activity
• Merchant / Retailer /
Bank Co-Branding
• Loyalty Programs /
Promotions / Offers
Banking
• Bank Transactions
• ATM Activity
• Online Activity
• Mobile Activity
Retail Customer
& Operations
• POS / TLOG
• E-commerce / Mobile
• Memberships / Loyalty
• Warranties
• In-Store Sensors /
Surveillance / IoT
• Schematic / Display
• Supply Chain / Inventory
Marketing &
CRM
• Promotions / Offers
• Website / SEO
• Campaigns / Affiliate
• Surveys
• Competitive
Intelligence
Public & Trade
• Demographic / Census
• Psychographic
• Inflation /
Macroeconomic
• Gas Prices
• Labor Statistics
• Weather Data
• Industry Research
• Social / Sentiment
Cost SavingsCompliance
Customer
Insight
Competitive
Advantage
5© Cloudera, Inc. All rights reserved.
Customer
Insight
Compliance is mandatory for any data strategy
An Enterprise Data Hub transforms risk from a
cost center into a profit center and enables
immediate rather than staged delivery
Cost Savings
Compliance
Competitive
Advantage
Information is the Basis of Industry for Merchants & Banks
Security Enables Strategy to Unlock New Value from More Data
6© Cloudera, Inc. All rights reserved.
How Prevalent Are Data Violations?
A Snapshot of 2014’s Mega Payment Card Information Breaches
40 million payment cards and 70 million records stolen
145 million accountholders affected
76 million households and 7 million small businesses affected
56 million payment cards stolen
2.6 million customers affected
1.1 million customers affected
115 retail stores affected
Source: 2014: A Year of Mega Breaches. Ponemon Institute. January 2015.
7© Cloudera, Inc. All rights reserved.
What is PCI Compliance?
Payment Card Industry Data Security Standard (PCI DSS)
The trillion-dollar growth of the digital economy has made
Hadoop an absolute necessity for storage of credit card data.
All credit card data must be properly secured and protected
both at rest and in motion, including digital channels.
All applications, databases, and file systems, including those
owned or managed by merchants and third-party solution
providers, must meet minimum encryption and privacy levels
when storing, processing, or transmitting account-related data.
8© Cloudera, Inc. All rights reserved.
The High Cost of Compliance and Non-Compliance
Lessons from the Banking Battlefield
Steep Fines
& Legal Fees
Greater
Scrutiny
Brand
Damage
Suspension or
Termination
Average Data Breach Costs Banks
$206 Per Compromised Account
30,000 People Work on Control
Functions in Each Large Bank
Cyber Crime Expenses Average
$13 Million Annual Per Bank
Sources: 2014 Cost of Data Breach Study: Global Analysis. Ponemon Institute. May 2014.
2014 Global Report on the Cost of Cyber Crime. Ponemon Institute. October 2014.
Dodge, Matt. “Financial Industry Wrestles with Compliance Costs.” Mainbiz.com. 1 April 2013.
9© Cloudera, Inc. All rights reserved.
The High Value of Compliance
Unlock the Business Potential of Big Data: Security Enables Strategy
Next Best Offer
Better profile the customer and use collaborative and content-based filtering to offer the most
appropriate product or bundle of products at any given time.
Unified Customer Identity
Compress the customer IDs created through various siloed and third-party touch points to
correlate as a single customer identity across all operational systems.
Policy Personalization
Differentiate coverage options by customizing plans based on information collected about
customers’ lifestyle, health patterns, habits, and preferences.
Productizing Deep Insights
Combine, analyze, and digest complex data from across multiple business units and data
sources to drive segmentation and profiling partners, merchants, etc.
10© Cloudera, Inc. All rights reserved.
What Is Universal Compliance?
Centralized and Secure Management of All Data
Central, Scalable Data Security
Regulations
• Payment Card Industry Data Security Standard (PCI DSS)
• European Data Protection Directive
• Cyber Security (emerging)
Capabilities & Tools
• Only PCI-certified Hadoop (Cloudera Navigator)
• Native data encryption (Navigator Encrypt)
• Integrated key management (Key Trustee)
• Hardware-enabled security (Intel partnership)
Key Partners
MasterCard Advisors, Intel, Symantec, Fortscale, Voltage
Enterprise
Data
Hub
11© Cloudera, Inc. All rights reserved.
Start with the Hadoop Security Maturity Model
Achieve Scale and Cost Effectiveness via Best Practices
Data Free-for-All:
Available & Error-Prone
Basic Security Controls:
Authorization
Authentication
Comprehensive Auditing
Data Security &
Governance:
Lineage Visibility
Metadata Discovery
Encryption & Key
Management
Fully Compliance Ready:
Audit-Ready & Protected
Audit Ready For:
EU Data Protection Directive
PCI DSS
HIPAA
FERPA
FISMA
PII
Full encryption, key management,
transparency, and enforcement for all
data-at-rest and data-in-motion
Security Compliance & Risk Mitigation
0 Highly Vulnerable
Data at Risk
1 Reduced Risk
Exposure
2 Managed, Secure,
Protected
3 Enterprise Data Hub:
Secure Data Vault
12© Cloudera, Inc. All rights reserved.
AUTHENTICATION
Guarding access to the
system, its data, and its
various systems
LDAP
Kerberos RPC
PROTECTION
Encryption for data at
rest or in motion with
full key management
Cloudera Navigator:
Encrypt & Key Trustee
AUTHORIZATION
Controlling who or
what has access to a
resource or service
POSIX Permissions
Apache Sentry
AUDIT
Capture a complete
and immutable record
of all activity
Cloudera Navigator
SIEM Tools
Enterprise-Grade Security
Governing Access to, and Management of, All Data-at-Rest and Data-in-Motion
Table Stakes for Big Data and
Native to Cloudera Enterprise
• Cloudera Manager and Navigator
automate protections for Hadoop
and related projects
• Perimeter security
• Role-based access control
• The only complete policy-based
management of sensitive data
• Data lineage and discoverability
13© Cloudera, Inc. All rights reserved.
Enterprise-Grade Security, Full Regulatory Compliance
Meeting PCI DSS Requirements with Cloudera Enterprise
PCI Requirement Detail
Apache
Sentry
Kerberos
Cloudera
Navigator
Cloudera
Manager
Cloudera
CSE
Customer
Build and Maintain a Secure
Network and Systems
Install and maintain a firewall configuration to protect cardholder data ✔
Do not use vendor-supplied defaults for system passwords and other
security parameters
✔
Protect Cardholder Data Protect stored cardholder data ✔
Encrypt transmission of cardholder data across open, public networks ✔
Maintain a Vulnerability
Management Program
Protect all systems against malware and regularly update anti-virus
software of programs
✔
Develop and maintain secure systems and applications ✔
Implement Strong Access
Control Measures
Restrict Access to cardholder data by business need to know ✔
Identify and authenticate access to system components ✔
Restrict physical access to cardholder data ✔
Regularly Monitor and Test
Networks
Track and monitor all access to network resources and cardholder data ✔
Regularly test security systems and processes ✔
Maintain an Information
Security Policy
Maintain a policy that addresses information security for all personnel
✔
14© Cloudera, Inc. All rights reserved.
More Value from More Data for More Users in Less Time
Maximize Benefit from All Your Data for Mission-Critical Jobs and Innovation
Data
Sources
Data
Systems
Data
Access
Business
Analytics
Custom
Applications
Existing
Data
Databases
Operational
Applications
New Data
Keep Unlimited Data
From disparate and limited views,
to unlimited information access.
Unlock Value from Data
From analytics for some,
to insights for all.
Manage Compliance
From risk due to regulations and
customer privacy concerns,
to trust in a secure and
compliant platform.
Enterprise Data Hub
Security and Administration
Unlimited Storage
Process Discover Model Serve
15© Cloudera, Inc. All rights reserved.
Hadoop Data Security Reference Architecture
Drawing on Insight from Successful Deployments in the Wild
16© Cloudera, Inc. All rights reserved.
MasterCard and Cloudera PCI Compliance Solution
A Three-Phase Services Engagement to Deliver Certifiable Data Security
Assess
• Assess data strategy and security*
• Review Hadoop environment*
• Map to maturity model
• Identify and document gaps
• Layout roadmap to address gaps
• Complete necessary technology
prerequisites prior to next stage*
Report & Present
• Audit assessment
• Monitor system
• Perform internal testing of protocols
• Prepare final:
- Documentation
- Network diagrams
- Compensation controls
• Educate auditors on Hadoop*
8 – 10 weeks 24 – 32 weeks 2 – 3 weeks
Configure & Repair
• Create roles and responsibilities,
processes and procedures, and
control documentation for:
- Authentication
- Authorization
- Data protection
- Data governance
- Architecture review
- Auditor and internal alignment
• Configure software*
*Cloudera roles
17© Cloudera, Inc. All rights reserved.
Getting to Universal Compliance
An Enterprise Data Hub is the Core of a Regulatory & Security Center of Excellence
Tech
Process People
PCI
Compliance
Ongoing Process Transformation
with Global Systems Integrators:
18© Cloudera, Inc. All rights reserved.
Partnering with MasterCard Advisors
Delivering Deep Insights and Best Practices in Big Data Security and Compliance
• First PCI-certified Hadoop platform
• Secures 10 PB in a PCI-compliant manner every day
• Founding member of the PCI Security Council
• Sits on the PCI Executive Committee
• Four decades of data security experience
• Secures 2 billion payment cards and 65 million
transactions per minute across 210 countries
• Never, ever had a data breach
Checkout lines are too slow.
We help them move faster.
Commuters are busy.
We speed them on their way.
Consumers want better ways to pay.
We invent them.
People want financial access.
We find ways to serve them.
Procurement is complicated.
We make it simple.
19© Cloudera, Inc. All rights reserved.
Thank you
20© Cloudera, Inc. All rights reserved.
Hadoop Is the Scalable Solution for Managing Customer Data
Cloudera Delivers the Only Big Data Platform with Native Data Security and Encryption
Securing Data at Rest
Large Volumes of Private Data
• Encrypt all data at rest with isolated key management
• Securely store more data without losing performance
Built-In Encryption
• Navigator is the only encryption tool native to Hadoop
• Transparent layer between application and file system
Safeguarding Data in Motion
Insecure Shared Networks
• Ensure compliant transmission across public networks
• Insufficient key release policies for cloud applications
Key Management via Secure Vault
• Keys are separated in secure, access-controlled servers
• Trustee approval and audit logs for all access requests
Managing Access to the Cluster
Preventing Intruders and Nefarious Insiders
• Keep tenants from accessing privileged apps and data
• Audit Hadoop interactions and manage data lifecycle
Multi-Stage Administration and Authorization
• Kerberos and Sentry provide strong role-based access
• Full governance, lineage, and discovery with Navigator
Customer Pain Point Cloudera Solution
21© Cloudera, Inc. All rights reserved.
• Contributed by Intel in 2013
• Blueprint for enterprise-grade
security
Rhino Goal: Unified Authorization
Engineers at Intel and Cloudera
(together with Oracle and IBM)
are now jointly contributing to
Apache Sentry
Rhino Goal: Encryption and Key
Management Framework
Cloudera and Intel engineers are now
contributing HDFS encryption
capabilities that can plug into enterprise
key managers
Cloudera and Intel’s Project Rhino Collaboration
Developing the Leading Edge of Hadoop Data Security
Hardware-
Integrated
Software

Weitere ähnliche Inhalte

Was ist angesagt?

When NOT to use Apache Kafka?
When NOT to use Apache Kafka?When NOT to use Apache Kafka?
When NOT to use Apache Kafka?Kai Wähner
 
Building an Effective Data Warehouse Architecture
Building an Effective Data Warehouse ArchitectureBuilding an Effective Data Warehouse Architecture
Building an Effective Data Warehouse ArchitectureJames Serra
 
Lecture1 introduction to big data
Lecture1 introduction to big dataLecture1 introduction to big data
Lecture1 introduction to big datahktripathy
 
Redis + Apache Spark = Swiss Army Knife Meets Kitchen Sink
Redis + Apache Spark = Swiss Army Knife Meets Kitchen SinkRedis + Apache Spark = Swiss Army Knife Meets Kitchen Sink
Redis + Apache Spark = Swiss Army Knife Meets Kitchen SinkDatabricks
 
End-to-End Data Pipelines with Apache Spark
End-to-End Data Pipelines with Apache SparkEnd-to-End Data Pipelines with Apache Spark
End-to-End Data Pipelines with Apache SparkBurak Yavuz
 
A Thorough Comparison of Delta Lake, Iceberg and Hudi
A Thorough Comparison of Delta Lake, Iceberg and HudiA Thorough Comparison of Delta Lake, Iceberg and Hudi
A Thorough Comparison of Delta Lake, Iceberg and HudiDatabricks
 
F5_Active-Active Data Center.pdf
F5_Active-Active Data Center.pdfF5_Active-Active Data Center.pdf
F5_Active-Active Data Center.pdfSolutions Architect
 
OpenStack @ Workday - CI/CD
OpenStack @ Workday - CI/CDOpenStack @ Workday - CI/CD
OpenStack @ Workday - CI/CDEdgar Magana
 
Big Data Architecture
Big Data ArchitectureBig Data Architecture
Big Data ArchitectureGuido Schmutz
 
Hive Training -- Motivations and Real World Use Cases
Hive Training -- Motivations and Real World Use CasesHive Training -- Motivations and Real World Use Cases
Hive Training -- Motivations and Real World Use Casesnzhang
 
Migrating your traditional Data Warehouse to a Modern Data Lake
Migrating your traditional Data Warehouse to a Modern Data LakeMigrating your traditional Data Warehouse to a Modern Data Lake
Migrating your traditional Data Warehouse to a Modern Data LakeAmazon Web Services
 
Simplifying And Accelerating Data Access for Python With Dremio and Apache Arrow
Simplifying And Accelerating Data Access for Python With Dremio and Apache ArrowSimplifying And Accelerating Data Access for Python With Dremio and Apache Arrow
Simplifying And Accelerating Data Access for Python With Dremio and Apache ArrowPyData
 
Scaling Data Quality @ Netflix
Scaling Data Quality @ NetflixScaling Data Quality @ Netflix
Scaling Data Quality @ NetflixMichelle Ufford
 
dbt Python models - GoDataFest by Guillermo Sanchez
dbt Python models - GoDataFest by Guillermo Sanchezdbt Python models - GoDataFest by Guillermo Sanchez
dbt Python models - GoDataFest by Guillermo SanchezGoDataDriven
 
Databricks Platform.pptx
Databricks Platform.pptxDatabricks Platform.pptx
Databricks Platform.pptxAlex Ivy
 
Apache Tez – Present and Future
Apache Tez – Present and FutureApache Tez – Present and Future
Apache Tez – Present and FutureDataWorks Summit
 

Was ist angesagt? (20)

HBase in Practice
HBase in Practice HBase in Practice
HBase in Practice
 
When NOT to use Apache Kafka?
When NOT to use Apache Kafka?When NOT to use Apache Kafka?
When NOT to use Apache Kafka?
 
Building an Effective Data Warehouse Architecture
Building an Effective Data Warehouse ArchitectureBuilding an Effective Data Warehouse Architecture
Building an Effective Data Warehouse Architecture
 
Lecture1 introduction to big data
Lecture1 introduction to big dataLecture1 introduction to big data
Lecture1 introduction to big data
 
Redis + Apache Spark = Swiss Army Knife Meets Kitchen Sink
Redis + Apache Spark = Swiss Army Knife Meets Kitchen SinkRedis + Apache Spark = Swiss Army Knife Meets Kitchen Sink
Redis + Apache Spark = Swiss Army Knife Meets Kitchen Sink
 
Introduction to HBase
Introduction to HBaseIntroduction to HBase
Introduction to HBase
 
End-to-End Data Pipelines with Apache Spark
End-to-End Data Pipelines with Apache SparkEnd-to-End Data Pipelines with Apache Spark
End-to-End Data Pipelines with Apache Spark
 
A Thorough Comparison of Delta Lake, Iceberg and Hudi
A Thorough Comparison of Delta Lake, Iceberg and HudiA Thorough Comparison of Delta Lake, Iceberg and Hudi
A Thorough Comparison of Delta Lake, Iceberg and Hudi
 
F5_Active-Active Data Center.pdf
F5_Active-Active Data Center.pdfF5_Active-Active Data Center.pdf
F5_Active-Active Data Center.pdf
 
OpenStack @ Workday - CI/CD
OpenStack @ Workday - CI/CDOpenStack @ Workday - CI/CD
OpenStack @ Workday - CI/CD
 
Nosql data models
Nosql data modelsNosql data models
Nosql data models
 
Big Data Architecture
Big Data ArchitectureBig Data Architecture
Big Data Architecture
 
Hive Training -- Motivations and Real World Use Cases
Hive Training -- Motivations and Real World Use CasesHive Training -- Motivations and Real World Use Cases
Hive Training -- Motivations and Real World Use Cases
 
Migrating your traditional Data Warehouse to a Modern Data Lake
Migrating your traditional Data Warehouse to a Modern Data LakeMigrating your traditional Data Warehouse to a Modern Data Lake
Migrating your traditional Data Warehouse to a Modern Data Lake
 
Simplifying And Accelerating Data Access for Python With Dremio and Apache Arrow
Simplifying And Accelerating Data Access for Python With Dremio and Apache ArrowSimplifying And Accelerating Data Access for Python With Dremio and Apache Arrow
Simplifying And Accelerating Data Access for Python With Dremio and Apache Arrow
 
Scaling Data Quality @ Netflix
Scaling Data Quality @ NetflixScaling Data Quality @ Netflix
Scaling Data Quality @ Netflix
 
dbt Python models - GoDataFest by Guillermo Sanchez
dbt Python models - GoDataFest by Guillermo Sanchezdbt Python models - GoDataFest by Guillermo Sanchez
dbt Python models - GoDataFest by Guillermo Sanchez
 
Databricks Platform.pptx
Databricks Platform.pptxDatabricks Platform.pptx
Databricks Platform.pptx
 
Apache Tez – Present and Future
Apache Tez – Present and FutureApache Tez – Present and Future
Apache Tez – Present and Future
 
Introduction to Hadoop
Introduction to HadoopIntroduction to Hadoop
Introduction to Hadoop
 

Andere mochten auch

Big data analytics in payments
Big data analytics in payments Big data analytics in payments
Big data analytics in payments Ashish Anand
 
Securing Your Apache Spark Applications
Securing Your Apache Spark ApplicationsSecuring Your Apache Spark Applications
Securing Your Apache Spark ApplicationsCloudera, Inc.
 
Payments Key Performance Indicators (KPIs): A Basic Perspective
Payments Key Performance Indicators (KPIs):  A Basic PerspectivePayments Key Performance Indicators (KPIs):  A Basic Perspective
Payments Key Performance Indicators (KPIs): A Basic PerspectiveChristopher Uriarte
 
AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)Amazon Web Services
 
Secure Search - Using Apache Sentry to Add Authentication and Authorization S...
Secure Search - Using Apache Sentry to Add Authentication and Authorization S...Secure Search - Using Apache Sentry to Add Authentication and Authorization S...
Secure Search - Using Apache Sentry to Add Authentication and Authorization S...Lucidworks
 
Hadoop security @ Philly Hadoop Meetup May 2015
Hadoop security @ Philly Hadoop Meetup May 2015Hadoop security @ Philly Hadoop Meetup May 2015
Hadoop security @ Philly Hadoop Meetup May 2015Shravan (Sean) Pabba
 
AWS re:Invent 2016: The Effective AWS CLI User (DEV402)
AWS re:Invent 2016: The Effective AWS CLI User (DEV402)AWS re:Invent 2016: The Effective AWS CLI User (DEV402)
AWS re:Invent 2016: The Effective AWS CLI User (DEV402)Amazon Web Services
 
Overview of HDFS Transparent Encryption
Overview of HDFS Transparent Encryption Overview of HDFS Transparent Encryption
Overview of HDFS Transparent Encryption Cloudera, Inc.
 
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...Cloudera, Inc.
 
Deploying Enterprise-grade Security for Hadoop
Deploying Enterprise-grade Security for HadoopDeploying Enterprise-grade Security for Hadoop
Deploying Enterprise-grade Security for HadoopCloudera, Inc.
 
Computer system architecture
Computer system architectureComputer system architecture
Computer system architectureKumar
 
The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014Cloudera, Inc.
 
Social Business Reference Architecture
Social Business Reference ArchitectureSocial Business Reference Architecture
Social Business Reference ArchitectureHeath McCarthy
 
Hadoop Security: Overview
Hadoop Security: OverviewHadoop Security: Overview
Hadoop Security: OverviewCloudera, Inc.
 
Evolving from RDBMS to NoSQL + SQL
Evolving from RDBMS to NoSQL + SQLEvolving from RDBMS to NoSQL + SQL
Evolving from RDBMS to NoSQL + SQLMapR Technologies
 
Hadoop and Data Access Security
Hadoop and Data Access SecurityHadoop and Data Access Security
Hadoop and Data Access SecurityCloudera, Inc.
 
Sentry - An Introduction
Sentry - An Introduction Sentry - An Introduction
Sentry - An Introduction Alexander Alten
 
Database system architecture
Database system architectureDatabase system architecture
Database system architectureDk Rukshan
 
Real-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsReal-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsChristian Gügi
 

Andere mochten auch (20)

Big data analytics in payments
Big data analytics in payments Big data analytics in payments
Big data analytics in payments
 
Securing Your Apache Spark Applications
Securing Your Apache Spark ApplicationsSecuring Your Apache Spark Applications
Securing Your Apache Spark Applications
 
Payments Key Performance Indicators (KPIs): A Basic Perspective
Payments Key Performance Indicators (KPIs):  A Basic PerspectivePayments Key Performance Indicators (KPIs):  A Basic Perspective
Payments Key Performance Indicators (KPIs): A Basic Perspective
 
AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)
 
Secure Search - Using Apache Sentry to Add Authentication and Authorization S...
Secure Search - Using Apache Sentry to Add Authentication and Authorization S...Secure Search - Using Apache Sentry to Add Authentication and Authorization S...
Secure Search - Using Apache Sentry to Add Authentication and Authorization S...
 
Hadoop security @ Philly Hadoop Meetup May 2015
Hadoop security @ Philly Hadoop Meetup May 2015Hadoop security @ Philly Hadoop Meetup May 2015
Hadoop security @ Philly Hadoop Meetup May 2015
 
AWS re:Invent 2016: The Effective AWS CLI User (DEV402)
AWS re:Invent 2016: The Effective AWS CLI User (DEV402)AWS re:Invent 2016: The Effective AWS CLI User (DEV402)
AWS re:Invent 2016: The Effective AWS CLI User (DEV402)
 
Overview of HDFS Transparent Encryption
Overview of HDFS Transparent Encryption Overview of HDFS Transparent Encryption
Overview of HDFS Transparent Encryption
 
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...
 
Deploying Enterprise-grade Security for Hadoop
Deploying Enterprise-grade Security for HadoopDeploying Enterprise-grade Security for Hadoop
Deploying Enterprise-grade Security for Hadoop
 
Computer system architecture
Computer system architectureComputer system architecture
Computer system architecture
 
The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014
 
Social Business Reference Architecture
Social Business Reference ArchitectureSocial Business Reference Architecture
Social Business Reference Architecture
 
Hadoop Security: Overview
Hadoop Security: OverviewHadoop Security: Overview
Hadoop Security: Overview
 
Evolving from RDBMS to NoSQL + SQL
Evolving from RDBMS to NoSQL + SQLEvolving from RDBMS to NoSQL + SQL
Evolving from RDBMS to NoSQL + SQL
 
Hadoop and Data Access Security
Hadoop and Data Access SecurityHadoop and Data Access Security
Hadoop and Data Access Security
 
Sentry - An Introduction
Sentry - An Introduction Sentry - An Introduction
Sentry - An Introduction
 
Database system architecture
Database system architectureDatabase system architecture
Database system architecture
 
Big Data Security and Governance
Big Data Security and GovernanceBig Data Security and Governance
Big Data Security and Governance
 
Real-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsReal-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment Transactions
 

Ähnlich wie Hadoop and Financial Services

Seeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the DataSeeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the DataCloudera, Inc.
 
Data Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI ComplianceData Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI ComplianceDavid Walker
 
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...DataWorks Summit
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceCloudera, Inc.
 
151116 Sedania Cloudera BDA Profile
151116 Sedania Cloudera BDA Profile151116 Sedania Cloudera BDA Profile
151116 Sedania Cloudera BDA ProfileZarul Zaabah
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008Denny Lee
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataCloudera, Inc.
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...Sutedjo Tjahjadi
 
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesWebinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesDataStax
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Risk Crew
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsTechcello
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...BigDataEverywhere
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Cloudera, Inc.
 
Data engineering Use Cases in financial industry.pdf
Data engineering Use Cases in financial industry.pdfData engineering Use Cases in financial industry.pdf
Data engineering Use Cases in financial industry.pdfshreyathaker
 
Moving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment SecurelyMoving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment SecurelyJeff Green
 
Data Engineering: Elastic, Low-Cost Data Processing in the Cloud
Data Engineering: Elastic, Low-Cost Data Processing in the CloudData Engineering: Elastic, Low-Cost Data Processing in the Cloud
Data Engineering: Elastic, Low-Cost Data Processing in the CloudCloudera, Inc.
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Cloud Standards Customer Council
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedCloudera, Inc.
 
Transforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform StrategyTransforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform StrategyDatabricks
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataPrecisely
 

Ähnlich wie Hadoop and Financial Services (20)

Seeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the DataSeeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the Data
 
Data Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI ComplianceData Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI Compliance
 
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services Experience
 
151116 Sedania Cloudera BDA Profile
151116 Sedania Cloudera BDA Profile151116 Sedania Cloudera BDA Profile
151116 Sedania Cloudera BDA Profile
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big Data
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
 
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud RealitiesWebinar  |  Aligning GDPR Requirements with Today's Hybrid Cloud Realities
Webinar | Aligning GDPR Requirements with Today's Hybrid Cloud Realities
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
 
Data engineering Use Cases in financial industry.pdf
Data engineering Use Cases in financial industry.pdfData engineering Use Cases in financial industry.pdf
Data engineering Use Cases in financial industry.pdf
 
Moving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment SecurelyMoving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment Securely
 
Data Engineering: Elastic, Low-Cost Data Processing in the Cloud
Data Engineering: Elastic, Low-Cost Data Processing in the CloudData Engineering: Elastic, Low-Cost Data Processing in the Cloud
Data Engineering: Elastic, Low-Cost Data Processing in the Cloud
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: Exposed
 
Transforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform StrategyTransforming GE Healthcare with Data Platform Strategy
Transforming GE Healthcare with Data Platform Strategy
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted Data
 

Mehr von Cloudera, Inc.

Partner Briefing_January 25 (FINAL).pptx
Partner Briefing_January 25 (FINAL).pptxPartner Briefing_January 25 (FINAL).pptx
Partner Briefing_January 25 (FINAL).pptxCloudera, Inc.
 
Cloudera Data Impact Awards 2021 - Finalists
Cloudera Data Impact Awards 2021 - Finalists Cloudera Data Impact Awards 2021 - Finalists
Cloudera Data Impact Awards 2021 - Finalists Cloudera, Inc.
 
2020 Cloudera Data Impact Awards Finalists
2020 Cloudera Data Impact Awards Finalists2020 Cloudera Data Impact Awards Finalists
2020 Cloudera Data Impact Awards FinalistsCloudera, Inc.
 
Edc event vienna presentation 1 oct 2019
Edc event vienna presentation 1 oct 2019Edc event vienna presentation 1 oct 2019
Edc event vienna presentation 1 oct 2019Cloudera, Inc.
 
Machine Learning with Limited Labeled Data 4/3/19
Machine Learning with Limited Labeled Data 4/3/19Machine Learning with Limited Labeled Data 4/3/19
Machine Learning with Limited Labeled Data 4/3/19Cloudera, Inc.
 
Data Driven With the Cloudera Modern Data Warehouse 3.19.19
Data Driven With the Cloudera Modern Data Warehouse 3.19.19Data Driven With the Cloudera Modern Data Warehouse 3.19.19
Data Driven With the Cloudera Modern Data Warehouse 3.19.19Cloudera, Inc.
 
Introducing Cloudera DataFlow (CDF) 2.13.19
Introducing Cloudera DataFlow (CDF) 2.13.19Introducing Cloudera DataFlow (CDF) 2.13.19
Introducing Cloudera DataFlow (CDF) 2.13.19Cloudera, Inc.
 
Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19Cloudera, Inc.
 
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19Cloudera, Inc.
 
Leveraging the cloud for analytics and machine learning 1.29.19
Leveraging the cloud for analytics and machine learning 1.29.19Leveraging the cloud for analytics and machine learning 1.29.19
Leveraging the cloud for analytics and machine learning 1.29.19Cloudera, Inc.
 
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19Cloudera, Inc.
 
Leveraging the Cloud for Big Data Analytics 12.11.18
Leveraging the Cloud for Big Data Analytics 12.11.18Leveraging the Cloud for Big Data Analytics 12.11.18
Leveraging the Cloud for Big Data Analytics 12.11.18Cloudera, Inc.
 
Modern Data Warehouse Fundamentals Part 3
Modern Data Warehouse Fundamentals Part 3Modern Data Warehouse Fundamentals Part 3
Modern Data Warehouse Fundamentals Part 3Cloudera, Inc.
 
Modern Data Warehouse Fundamentals Part 2
Modern Data Warehouse Fundamentals Part 2Modern Data Warehouse Fundamentals Part 2
Modern Data Warehouse Fundamentals Part 2Cloudera, Inc.
 
Modern Data Warehouse Fundamentals Part 1
Modern Data Warehouse Fundamentals Part 1Modern Data Warehouse Fundamentals Part 1
Modern Data Warehouse Fundamentals Part 1Cloudera, Inc.
 
Extending Cloudera SDX beyond the Platform
Extending Cloudera SDX beyond the PlatformExtending Cloudera SDX beyond the Platform
Extending Cloudera SDX beyond the PlatformCloudera, Inc.
 
Federated Learning: ML with Privacy on the Edge 11.15.18
Federated Learning: ML with Privacy on the Edge 11.15.18Federated Learning: ML with Privacy on the Edge 11.15.18
Federated Learning: ML with Privacy on the Edge 11.15.18Cloudera, Inc.
 
Analyst Webinar: Doing a 180 on Customer 360
Analyst Webinar: Doing a 180 on Customer 360Analyst Webinar: Doing a 180 on Customer 360
Analyst Webinar: Doing a 180 on Customer 360Cloudera, Inc.
 
Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18Cloudera, Inc.
 
Introducing the data science sandbox as a service 8.30.18
Introducing the data science sandbox as a service 8.30.18Introducing the data science sandbox as a service 8.30.18
Introducing the data science sandbox as a service 8.30.18Cloudera, Inc.
 

Mehr von Cloudera, Inc. (20)

Partner Briefing_January 25 (FINAL).pptx
Partner Briefing_January 25 (FINAL).pptxPartner Briefing_January 25 (FINAL).pptx
Partner Briefing_January 25 (FINAL).pptx
 
Cloudera Data Impact Awards 2021 - Finalists
Cloudera Data Impact Awards 2021 - Finalists Cloudera Data Impact Awards 2021 - Finalists
Cloudera Data Impact Awards 2021 - Finalists
 
2020 Cloudera Data Impact Awards Finalists
2020 Cloudera Data Impact Awards Finalists2020 Cloudera Data Impact Awards Finalists
2020 Cloudera Data Impact Awards Finalists
 
Edc event vienna presentation 1 oct 2019
Edc event vienna presentation 1 oct 2019Edc event vienna presentation 1 oct 2019
Edc event vienna presentation 1 oct 2019
 
Machine Learning with Limited Labeled Data 4/3/19
Machine Learning with Limited Labeled Data 4/3/19Machine Learning with Limited Labeled Data 4/3/19
Machine Learning with Limited Labeled Data 4/3/19
 
Data Driven With the Cloudera Modern Data Warehouse 3.19.19
Data Driven With the Cloudera Modern Data Warehouse 3.19.19Data Driven With the Cloudera Modern Data Warehouse 3.19.19
Data Driven With the Cloudera Modern Data Warehouse 3.19.19
 
Introducing Cloudera DataFlow (CDF) 2.13.19
Introducing Cloudera DataFlow (CDF) 2.13.19Introducing Cloudera DataFlow (CDF) 2.13.19
Introducing Cloudera DataFlow (CDF) 2.13.19
 
Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19
 
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19
 
Leveraging the cloud for analytics and machine learning 1.29.19
Leveraging the cloud for analytics and machine learning 1.29.19Leveraging the cloud for analytics and machine learning 1.29.19
Leveraging the cloud for analytics and machine learning 1.29.19
 
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19
 
Leveraging the Cloud for Big Data Analytics 12.11.18
Leveraging the Cloud for Big Data Analytics 12.11.18Leveraging the Cloud for Big Data Analytics 12.11.18
Leveraging the Cloud for Big Data Analytics 12.11.18
 
Modern Data Warehouse Fundamentals Part 3
Modern Data Warehouse Fundamentals Part 3Modern Data Warehouse Fundamentals Part 3
Modern Data Warehouse Fundamentals Part 3
 
Modern Data Warehouse Fundamentals Part 2
Modern Data Warehouse Fundamentals Part 2Modern Data Warehouse Fundamentals Part 2
Modern Data Warehouse Fundamentals Part 2
 
Modern Data Warehouse Fundamentals Part 1
Modern Data Warehouse Fundamentals Part 1Modern Data Warehouse Fundamentals Part 1
Modern Data Warehouse Fundamentals Part 1
 
Extending Cloudera SDX beyond the Platform
Extending Cloudera SDX beyond the PlatformExtending Cloudera SDX beyond the Platform
Extending Cloudera SDX beyond the Platform
 
Federated Learning: ML with Privacy on the Edge 11.15.18
Federated Learning: ML with Privacy on the Edge 11.15.18Federated Learning: ML with Privacy on the Edge 11.15.18
Federated Learning: ML with Privacy on the Edge 11.15.18
 
Analyst Webinar: Doing a 180 on Customer 360
Analyst Webinar: Doing a 180 on Customer 360Analyst Webinar: Doing a 180 on Customer 360
Analyst Webinar: Doing a 180 on Customer 360
 
Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18
 
Introducing the data science sandbox as a service 8.30.18
Introducing the data science sandbox as a service 8.30.18Introducing the data science sandbox as a service 8.30.18
Introducing the data science sandbox as a service 8.30.18
 

Kürzlich hochgeladen

%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Hararemasabamasaba
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...masabamasaba
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 

Kürzlich hochgeladen (20)

%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 

Hadoop and Financial Services

  • 1. PCI Compliant Big Data Environment Speaker Name // Speaker Title Build a PCI-Compliant Big Data Environment with Hadoop
  • 2. 3© Cloudera, Inc. All rights reserved. • Big Data Is Getting Bigger • The Costs & Benefits of PCI Compliance • A Hub for Your Big Data Strategy • Building a Secure Data Vault • Experience & Leadership Agenda
  • 3. 4© Cloudera, Inc. All rights reserved. Information is the Basis of Industry for Merchants & Banks Security Enables Strategy to Unlock New Value from More Data Credit Cards & Payments • Card Transactions • Customer Data • Online Activity • Merchant / Retailer / Bank Co-Branding • Loyalty Programs / Promotions / Offers Banking • Bank Transactions • ATM Activity • Online Activity • Mobile Activity Retail Customer & Operations • POS / TLOG • E-commerce / Mobile • Memberships / Loyalty • Warranties • In-Store Sensors / Surveillance / IoT • Schematic / Display • Supply Chain / Inventory Marketing & CRM • Promotions / Offers • Website / SEO • Campaigns / Affiliate • Surveys • Competitive Intelligence Public & Trade • Demographic / Census • Psychographic • Inflation / Macroeconomic • Gas Prices • Labor Statistics • Weather Data • Industry Research • Social / Sentiment Cost SavingsCompliance Customer Insight Competitive Advantage
  • 4. 5© Cloudera, Inc. All rights reserved. Customer Insight Compliance is mandatory for any data strategy An Enterprise Data Hub transforms risk from a cost center into a profit center and enables immediate rather than staged delivery Cost Savings Compliance Competitive Advantage Information is the Basis of Industry for Merchants & Banks Security Enables Strategy to Unlock New Value from More Data
  • 5. 6© Cloudera, Inc. All rights reserved. How Prevalent Are Data Violations? A Snapshot of 2014’s Mega Payment Card Information Breaches 40 million payment cards and 70 million records stolen 145 million accountholders affected 76 million households and 7 million small businesses affected 56 million payment cards stolen 2.6 million customers affected 1.1 million customers affected 115 retail stores affected Source: 2014: A Year of Mega Breaches. Ponemon Institute. January 2015.
  • 6. 7© Cloudera, Inc. All rights reserved. What is PCI Compliance? Payment Card Industry Data Security Standard (PCI DSS) The trillion-dollar growth of the digital economy has made Hadoop an absolute necessity for storage of credit card data. All credit card data must be properly secured and protected both at rest and in motion, including digital channels. All applications, databases, and file systems, including those owned or managed by merchants and third-party solution providers, must meet minimum encryption and privacy levels when storing, processing, or transmitting account-related data.
  • 7. 8© Cloudera, Inc. All rights reserved. The High Cost of Compliance and Non-Compliance Lessons from the Banking Battlefield Steep Fines & Legal Fees Greater Scrutiny Brand Damage Suspension or Termination Average Data Breach Costs Banks $206 Per Compromised Account 30,000 People Work on Control Functions in Each Large Bank Cyber Crime Expenses Average $13 Million Annual Per Bank Sources: 2014 Cost of Data Breach Study: Global Analysis. Ponemon Institute. May 2014. 2014 Global Report on the Cost of Cyber Crime. Ponemon Institute. October 2014. Dodge, Matt. “Financial Industry Wrestles with Compliance Costs.” Mainbiz.com. 1 April 2013.
  • 8. 9© Cloudera, Inc. All rights reserved. The High Value of Compliance Unlock the Business Potential of Big Data: Security Enables Strategy Next Best Offer Better profile the customer and use collaborative and content-based filtering to offer the most appropriate product or bundle of products at any given time. Unified Customer Identity Compress the customer IDs created through various siloed and third-party touch points to correlate as a single customer identity across all operational systems. Policy Personalization Differentiate coverage options by customizing plans based on information collected about customers’ lifestyle, health patterns, habits, and preferences. Productizing Deep Insights Combine, analyze, and digest complex data from across multiple business units and data sources to drive segmentation and profiling partners, merchants, etc.
  • 9. 10© Cloudera, Inc. All rights reserved. What Is Universal Compliance? Centralized and Secure Management of All Data Central, Scalable Data Security Regulations • Payment Card Industry Data Security Standard (PCI DSS) • European Data Protection Directive • Cyber Security (emerging) Capabilities & Tools • Only PCI-certified Hadoop (Cloudera Navigator) • Native data encryption (Navigator Encrypt) • Integrated key management (Key Trustee) • Hardware-enabled security (Intel partnership) Key Partners MasterCard Advisors, Intel, Symantec, Fortscale, Voltage Enterprise Data Hub
  • 10. 11© Cloudera, Inc. All rights reserved. Start with the Hadoop Security Maturity Model Achieve Scale and Cost Effectiveness via Best Practices Data Free-for-All: Available & Error-Prone Basic Security Controls: Authorization Authentication Comprehensive Auditing Data Security & Governance: Lineage Visibility Metadata Discovery Encryption & Key Management Fully Compliance Ready: Audit-Ready & Protected Audit Ready For: EU Data Protection Directive PCI DSS HIPAA FERPA FISMA PII Full encryption, key management, transparency, and enforcement for all data-at-rest and data-in-motion Security Compliance & Risk Mitigation 0 Highly Vulnerable Data at Risk 1 Reduced Risk Exposure 2 Managed, Secure, Protected 3 Enterprise Data Hub: Secure Data Vault
  • 11. 12© Cloudera, Inc. All rights reserved. AUTHENTICATION Guarding access to the system, its data, and its various systems LDAP Kerberos RPC PROTECTION Encryption for data at rest or in motion with full key management Cloudera Navigator: Encrypt & Key Trustee AUTHORIZATION Controlling who or what has access to a resource or service POSIX Permissions Apache Sentry AUDIT Capture a complete and immutable record of all activity Cloudera Navigator SIEM Tools Enterprise-Grade Security Governing Access to, and Management of, All Data-at-Rest and Data-in-Motion Table Stakes for Big Data and Native to Cloudera Enterprise • Cloudera Manager and Navigator automate protections for Hadoop and related projects • Perimeter security • Role-based access control • The only complete policy-based management of sensitive data • Data lineage and discoverability
  • 12. 13© Cloudera, Inc. All rights reserved. Enterprise-Grade Security, Full Regulatory Compliance Meeting PCI DSS Requirements with Cloudera Enterprise PCI Requirement Detail Apache Sentry Kerberos Cloudera Navigator Cloudera Manager Cloudera CSE Customer Build and Maintain a Secure Network and Systems Install and maintain a firewall configuration to protect cardholder data ✔ Do not use vendor-supplied defaults for system passwords and other security parameters ✔ Protect Cardholder Data Protect stored cardholder data ✔ Encrypt transmission of cardholder data across open, public networks ✔ Maintain a Vulnerability Management Program Protect all systems against malware and regularly update anti-virus software of programs ✔ Develop and maintain secure systems and applications ✔ Implement Strong Access Control Measures Restrict Access to cardholder data by business need to know ✔ Identify and authenticate access to system components ✔ Restrict physical access to cardholder data ✔ Regularly Monitor and Test Networks Track and monitor all access to network resources and cardholder data ✔ Regularly test security systems and processes ✔ Maintain an Information Security Policy Maintain a policy that addresses information security for all personnel ✔
  • 13. 14© Cloudera, Inc. All rights reserved. More Value from More Data for More Users in Less Time Maximize Benefit from All Your Data for Mission-Critical Jobs and Innovation Data Sources Data Systems Data Access Business Analytics Custom Applications Existing Data Databases Operational Applications New Data Keep Unlimited Data From disparate and limited views, to unlimited information access. Unlock Value from Data From analytics for some, to insights for all. Manage Compliance From risk due to regulations and customer privacy concerns, to trust in a secure and compliant platform. Enterprise Data Hub Security and Administration Unlimited Storage Process Discover Model Serve
  • 14. 15© Cloudera, Inc. All rights reserved. Hadoop Data Security Reference Architecture Drawing on Insight from Successful Deployments in the Wild
  • 15. 16© Cloudera, Inc. All rights reserved. MasterCard and Cloudera PCI Compliance Solution A Three-Phase Services Engagement to Deliver Certifiable Data Security Assess • Assess data strategy and security* • Review Hadoop environment* • Map to maturity model • Identify and document gaps • Layout roadmap to address gaps • Complete necessary technology prerequisites prior to next stage* Report & Present • Audit assessment • Monitor system • Perform internal testing of protocols • Prepare final: - Documentation - Network diagrams - Compensation controls • Educate auditors on Hadoop* 8 – 10 weeks 24 – 32 weeks 2 – 3 weeks Configure & Repair • Create roles and responsibilities, processes and procedures, and control documentation for: - Authentication - Authorization - Data protection - Data governance - Architecture review - Auditor and internal alignment • Configure software* *Cloudera roles
  • 16. 17© Cloudera, Inc. All rights reserved. Getting to Universal Compliance An Enterprise Data Hub is the Core of a Regulatory & Security Center of Excellence Tech Process People PCI Compliance Ongoing Process Transformation with Global Systems Integrators:
  • 17. 18© Cloudera, Inc. All rights reserved. Partnering with MasterCard Advisors Delivering Deep Insights and Best Practices in Big Data Security and Compliance • First PCI-certified Hadoop platform • Secures 10 PB in a PCI-compliant manner every day • Founding member of the PCI Security Council • Sits on the PCI Executive Committee • Four decades of data security experience • Secures 2 billion payment cards and 65 million transactions per minute across 210 countries • Never, ever had a data breach Checkout lines are too slow. We help them move faster. Commuters are busy. We speed them on their way. Consumers want better ways to pay. We invent them. People want financial access. We find ways to serve them. Procurement is complicated. We make it simple.
  • 18. 19© Cloudera, Inc. All rights reserved. Thank you
  • 19. 20© Cloudera, Inc. All rights reserved. Hadoop Is the Scalable Solution for Managing Customer Data Cloudera Delivers the Only Big Data Platform with Native Data Security and Encryption Securing Data at Rest Large Volumes of Private Data • Encrypt all data at rest with isolated key management • Securely store more data without losing performance Built-In Encryption • Navigator is the only encryption tool native to Hadoop • Transparent layer between application and file system Safeguarding Data in Motion Insecure Shared Networks • Ensure compliant transmission across public networks • Insufficient key release policies for cloud applications Key Management via Secure Vault • Keys are separated in secure, access-controlled servers • Trustee approval and audit logs for all access requests Managing Access to the Cluster Preventing Intruders and Nefarious Insiders • Keep tenants from accessing privileged apps and data • Audit Hadoop interactions and manage data lifecycle Multi-Stage Administration and Authorization • Kerberos and Sentry provide strong role-based access • Full governance, lineage, and discovery with Navigator Customer Pain Point Cloudera Solution
  • 20. 21© Cloudera, Inc. All rights reserved. • Contributed by Intel in 2013 • Blueprint for enterprise-grade security Rhino Goal: Unified Authorization Engineers at Intel and Cloudera (together with Oracle and IBM) are now jointly contributing to Apache Sentry Rhino Goal: Encryption and Key Management Framework Cloudera and Intel engineers are now contributing HDFS encryption capabilities that can plug into enterprise key managers Cloudera and Intel’s Project Rhino Collaboration Developing the Leading Edge of Hadoop Data Security Hardware- Integrated Software

Hinweis der Redaktion

  1. It can take up to 24 months to build a compliant big data infrastructure and, even then, a faulty data privacy configuration can lead to the types of massive breaches we've read about in the news. That's why we've created a PCI Hadoop Security offering to simplify and ensure the deployment and compliance process for everyone. By developing a certification plan for your big data infrastructure that leverages MasterCard's proven PCI Hadoop Security playbooks, templates, and architectures with Cloudera, you can cut your time to production and total cost by more than half and focus on realizing the business value of all your data.  
  2. No individual record is particularly valuable, but having every record opens the door to extreme value.
  3. OPPORTUNITY ABOUNDS in FINSERV & RETAIL Recovering from the 2008 Recession Proactive risk management through stress testing Fraud, anomaly, and insider threat detection and avoidance Macro-level financial system security Comply with more demanding regulation – data auditing, transparency Flexibility to business model requirements and changes Assure customer privacy Profiling & Personalization Better customer segmentation across LOBs – prevent churn, lower cost of acquisition Tailor and track product cross-sell, up-sell, and bundling opportunities – recommendations, targeted marketing Use more data to better understand sentiment – social, website, survey, public Micro-adjustments to products and policies based on predictive analytics Competitive Advantage More complete view of the market Quicker time to insight More relevant modeling and innovation Efficiency advantages that afford new opportunities – utilization, multi-tenancy, robust and real-time Open-source to avoid legacy lock-in and remain flexible with less specialization Less reliance on third-party data sources
  4. This is the one list that no company wants to be on – this is one of the few cases when not all publicity is good publicity. Data security is such a hot topic that President Obama hosted at summit at Stanford University in February 2015, along with executives from MasterCard and others to punctuate how important safeguarding data will be to the future of business, personal privacy, and national security. Obama also appointed DJ Patil as the first Chief Data Scientist of the USA, and addressed the Strata+ Hadoop World audience in San Jose.
  5. Note: PCI compliance is not the end point for this project and pitch. Complete security is. Even a compliant system can be (and has been) hacked. The Payment Card Industry Data Security Standard (PCI DSS) originated as separate data security standards established by the five major credit card companies: Visa, MasterCard, Discover, American Express, and the Japan Credit Bureau (some of whom are Cloudera Enterprise customers). The goal of ensuring that cardholder data is properly secured and protected and that merchants meet minimum security levels when storing, processing, and transmitting this data was formalized as an industry-wide standard in 2004 by the Payment Card Industry Security Standards Council.   In January 2014, PCI DSS Version 3.0 went into effect, requiring organizations to mitigate payment card risks posed by third parties such as cloud computing and storage providers and payment processors. The new version also stresses that businesses and organizations that accept and/or process cards are responsible for ensuring that the third parties on whom they rely for outsourced solutions and services use appropriate security measures. In the event of a security breach resulting from non-compliance, the breached organization could be subject to stiff penalties and fines.
  6. Direct Costs There is a 22% likelihood that any U.S. company will experience a data breach compromising at least 10,000 records during the next 24 months (Poneman Institute’s 2014 Cost of Data Breach Study: Global Analysis). Operating costs related to compliance are expected to reach $10 BILLION per year for the largest banks (according to Citigroup co-president Jamie Forese, quoted by Bloomberg in September 2014). Indirect Costs Fines: as much as $5,000-$100,000 per month (as large as $400m/yr for AML fines) Responsibility for fraudulent charges Cover credit monitoring charges Cover chargebacks Increase in transaction fees Enormous legal fees Brand damage Suspension of processing rights Elimination of and turnover of staff Escalation to a higher compliance tier Increased annual compliance auditing costs Government scrutiny Worst case – termination of relationship
  7. PCI DSS is… Payment Card Industry Security Standard originated as separate data security standards established by five major credit card companies: VISA, MasterCard, Discover, American Express, and Japan Credit Bureau. All credit card data must be properly secured and protected both at rest and in motion, including digital channels. Must meet minimum encryption and privacy levels when storing, processing, or transmitting account-related data. Applies to all applications, databases, and file systems, including those owned or managed by merchants and third-party solution providers (especially in the cloud). Why MasterCard as a partner? First PCI-certified Hadoop platform 10 PB PCI-compliantly secured every day Founding member of the PCI Security Council Sits on the PCI Executive Committee Four decades of data security experience Secures 2 billion cards and 65 million transactions per minute in 210 countries Never, ever had a data breach
  8. Hadoop Security Maturity Curve Stage 0 is an open source Hadoop cluster straight out of the box with no security configured. Storing your data here means that it’s highly vulnerable and your data is at risk. Stage 1 provides slightly reduced risk exposure where you’ve configured the basic security controls for Authorization, Authentication, and Auditing. This is the most other distributions are able to deliver. Stage 2 offers a managed, secure, and protected environment taking advantage of Cloudera components like Navigator and Sentry. Stage 3 is a Enterprise Data Hub configured as a Secure Data Vault. This is fully compliance audit-ready and protected. At this point, your system has all of the technology components configured and ready to undergo an audit. Note it requires additional steps to pass a full audit: a combination of People, Process, and Technology and additional services that are available from Cloudera to support your team. There are 3 key things you want to make a customer realize about the security maturity model Where they think they are Where they really are Where Cloudera can help them to get to
  9. Note: PCI compliance is not the end point for this project and pitch. Complete security is. Even a compliant system can be (and has been) hacked. Encrypting Data at Rest Customer Pain Point: Encrypt all data at rest with isolated key management Cloudera Solution: Navigator is the only encryption tool native to Hadoop Customer Pain Point: Securely store more data without losing performance Cloudera Solution: Transparent layer between application and file system Safeguarding Data in Motion Customer Pain Point: Ensure compliant transmission across public networks Cloudera Solution: Keys are separated in secure, access-controlled servers Customer Pain Point: Insufficient key release policies for cloud applications Cloudera Solution: Trustee approval and audit logs for all access requests Managing Access to the Cluster Customer Pain Point: Keep tenants from accessing privileged apps and data Cloudera Solution: Kerberos and Sentry provide strong role-based access control Customer Pain Point: Audit Hadoop interactions and manage data lifecycle Cloudera Solution: Full governance, lineage, and discovery with Navigator
  10. An enterprise data hub addresses each of the earlier challenges: 1. You can keep unlimited data online, in its original fidelity and format. As a data staging area, it can serve as an automatic archive of any data sent to it, and process that data quickly and cost-effectively. 2. Diverse users can get direct access to all business relevant data, through the best tool for the job, whether that’s SQL, search, programming, or a favorite BI or analytics tools. Users who previously had no way to benefit from data can now find and generate insights. 3. All of this can be done with confidence, thanks to Cloudera’s enterprise-grade security, governance, and management tools. An enterprise data hub unlocks more value, from more data, for more users, in less time. Representative Customer Stories Costco: From disparate and limited data views to unlimited information access. Challenge: Costco set out to refine their global data center without disrupting the existing heterogeneous environment consisting of Informatica, Oracle, Teradata, IBM, and others. A short term goal was to find a new solution for their transaction log (TLOG) processing, which was a bottleneck on the incumbent DB2 system that resulted in throwing data away. Solution: Costco implemented Cloudera on Cisco UCS hardware to integrate their many different in-house technologies within an interconnected enterprise data hub environment, leveraging tools including Impala, Mahout, Spark, and Solr to support a variety of user requirements and workloads. Benefit: Costco no longer throws data away, and their data processing performance has been accelerated, while alleviating at least 20% of the load on IBM systems. The traditional infrastructure is 100X more costly than Cloudera combined with Cisco hardware, so any relief on the legacy environment saves the company substantially. Their ultimate goal is to be able to capture and process all incoming data for a more comprehensive understanding of product movement by location, driving smarter decisions in market research and procurement strategy. SFR: From analytics for some to insights for all. Challenge: SFR’s data warehouse has served the company well for ten years, containing data on products, device usage, invoices, contracts, price plans, and call detail records (CDR), but SFR wanted to create a shared, detailed view into the customer journey -- available to employees across the company -- for real-time search, reporting, and analysis, while also aiming to bring in multi-structured data from new sources. Solution: By complementing its data warehouse infrastructure with Cloudera Enterprise, Data Hub Edition, SFR is delivering the 360-degree view that will help the company optimize its customer journey. SFR’s 9,000+ employees now have access to a self-service discovery environment enabling query and exploration of a single, centralized data store. Benefit: Employees across the country can now operate based on a centralized, real-time customer view that spans many devices and data sources. And by offloading large-scale data ingest, processing, and exploration of multi-structured data sets from the data warehouse to Cloudera, the data warehouse will deliver optimal system performance for 8-9 years, vs. needing an upgrade every 3 years. MasterCard: From risk due to regulation and customer privacy concerns to trust in a secure and compliant platform. Challenge: Given the growing importance of Hadoop in MasterCard's long-term enterprise data hub strategy, its Cloudera platform required PCI Certification to allow Hadoop to not only host PCI or potentially PCI datasets, but to also be able to integration with other PCI-certified environments. Solution: MasterCard's Cloudera environment -- which is a key component to the company's overarching enterprise data hub strategy -- has been certified by an external auditor to fully conform to the PCI DSS V 2.0 Security standard. Benefit: Achieving PCI compliance on its Cloudera environment is not only important in the evaluation of current workload suitability for Hadoop at MasterCard, but also for a new generation of applications and datasets that can now be hosted on the Cloudera platform which require a PCI Certified environment.
  11. Reference Architecture taken from Hadoop Security, written by Clouderans.
  12. Now that we’ve discussed the need for, and framework of, the PCI solution, the next question is “OK, how do we get started and what do timelines look like?” Upon a client decision to engage with Cloudera and MasterCard on PCI Compliance, we will begin a three-stage engagement that will take between approx. 35 and 45 weeks. Without this solution, the implementation of a compliant big data infrastructure could take at a minimum two years and have inherent security risks. Cloudera and Mastercard will reduce time to implementation AND increase security reliability. Phase 1: Assess: In the initial phase, Cloudera and MasterCard will work with you to understand your current environment and define a plan/roadmap to march your business towards PCI compliance. Phase 2: Configure/repair: In the second phase, Cloudera and Mastercard will leverage the plans created in the 1st phase to not only build out the software, but also to build the proper documentation, roles, and processes to ensure that the implementation will be successful. Phase 3: Report and Present: In the final stage, we will perform an audit assessment along with final documentation. We will also educator auditors on Hadoop and make sure that the client is set for success.
  13. The three-step process to PCI compliance of (1)Assess, (2)Configure/Repair, and (3)Report/Present helps to ensure we’ve achieved a 360-degree view of compliance. It’s important to remember that compliance isn’t just about technology, but also the people and processes that support/access the technology platform. Our documentation and training will make sure that your processes, people, and technology compliment each other…which will help ensure your enterprise security and compliance. 1. Technology Enterprise Data Hub built on Hadoop Massive full-fidelity data retention (HDFS, HBase) Reporting and retrieval for audit (Impala) Scalable data security (Navigator Encrypt & Key Trustee) Central administration and governance for lifecycle management (Cloudera Manager) 2. Process Security Integration & Transformation with MasterCard Advisors Review security requirements Audit architecture and current systems Tailor a security reference architecture Review audit and lineage Install and configure custom system Implement ongoing compliance plan Ongoing process transformation 3. People Technical Training & Support Removal of complexity to deliver results Leadership for broad and deep adoption Experience to develop effective projects Proactive technical guidance/planning Predictive performance optimization Implementation of ongoing compliance
  14. Cloudera and MasterCard Advisors are partnering to bring the leaders in payments and PCI compliance together with the world’s leading Hadoop distribution. Cloudera’s unique security offering on Hadoop pairs well with MasterCard Advisors’ deep industry knowledge to provide a solution that no two other partners can deliver to every organization and company handling credit card data, ranging from payment card processors to retailers to banks and beyond. It’s important to remember that MasterCard is a payments company with a deep and rich history of focusing on technology and data. MasterCard sits at the core of over 2 billion payment cards and 65 million transactions each minute. MasterCard Advisors is their consulting and innovation branch, which keeps MasterCard and its clients at the forefront of the payments industry.
  15. Note: PCI compliance is not the end point for this project and pitch. Complete security is. Even a compliant system can be (and has been) hacked. The simplest way to comply with the PCI DSS requirement to protect stored cardholder data is to encrypt all data-at-rest and store the encryption keys away from the protected data. An enterprise data hub featuring Cloudera Navigator—the first fully integrated data security and governance application for Hadoop-based systems—is the only Hadoop platform offering out-of-the-box encryption for data-in-motion between processes and systems, as well as for data-at-rest as it persists on disk or other storage media.   Within the tool, the Navigator Encrypt feature is a transparent data encryption solution that enables organizations to secure data-at-rest in Linux. This includes primary account numbers, 16-digit credit card numbers, and other personally identifiable information. The cryptographic keys are managed by the Navigator Key Trustee feature, a software-based universal key server that stores, manages, and enforces policies for Cloudera and other cryptographic keys. Navigator Key Trustee offers robust key management policies that prevent cloud and operating system administrators, hackers, and other unauthorized personnel from accessing cryptographic keys and sensitive data.   Navigator Key Trustee can also help organizations meet the PCI DSS encryption requirements across public networks by managing the keys and certificates used to safeguard sensitive data during transmission. Navigator Key Trustee provides robust security policies—including multifactor authentication—governing access to sensitive secure socket layer (SSL) and secure shell (SSH) keys. Storing these keys in a Navigator Key Trustee server will prevent unauthorized access in the event that a device is stolen or a file is breached. Even if a hacker were able to access SSH login credentials and sign in as a trusted user, the Navigator Key Trustee key release policy is pre-set to automatically trigger a notification to designated trustees requiring them to approve a key release. If a trustee denies the key release, SSH access is denied, and an audit log showing the denial request is created.   With Navigator Encrypt, only the authorized database accounts with assigned database rights connecting from applications on approved network clients can access cardholder data stored on a server. Operating system users without access to Navigator Encrypt keys cannot read the encrypted data. Providing an additional layer of security, Navigator Key Trustee allows organizations to set a variety of key release policies that factor in who is requesting the key, where the request originated, the time of day, and the number of times a key can be retrieved, among others.
  16. Our security story is one that we’re building hand-in-hand with Intel. In 2013, Intel established Project Rhino, which is a blueprint for enterprise-grade security. It’s meant to address many of the security concerns with Hadoop and we are working closely with them on many of these concerns – specifically around delivering unified authorization for Hadoop through Apache Sentry and bringing new encryption and key management frameworks to a Hadoop cluster.