SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
Securely explore your data
BREAKING DOWN
DATA SILOS WITH
SQRRL ENTERPRISE
Adam Fuchs
CTO: Sqrrl Data, Inc.
February 26, 2014
DATABASES ARE GREAT!
‱  Decouple data providers and consumers
‱  Enable independent development
Database
Data Provider Data Consumer
... but how can we handle complex
security policies?
© 2014 Sqrrl | All Rights Reserved 2
COMPLEX SECURITY POLICIES
Healthcare Example
PII
Sensitive Diagnoses
Doctor’s Notes
3© 2014 Sqrrl | All Rights Reserved
TRADITIONAL SECURITY
Build security policy logic into the application
Database
Data Provider
Security
Policy
Data Consumer
Security
© 2014 Sqrrl | All Rights Reserved 4
Application Implements Security Through:
‱  Database Views
‱  Query Rewriting
MORE COMPLEX SECURITY...
5
Claims Data
EMRs
Public
Records
Genomic Data
Healthcare Fraud / Automated Diagnosis App
© 2014 Sqrrl | All Rights Reserved
COMBINATORIAL COMPLEXITY
Database
Data Provider
Security
Policy
Data Consumer
Security
Data Consumer
Security
Data Consumer
Security
Data Provider
Security
Policy
Data Provider
Security
Policy
© 2014 Sqrrl | All Rights Reserved 6
COMBINATORIAL COMPLEXITY
Database
Data
Provider
Security
Policy
Data
Consumer
Security
Data
Consumer
Security
Data
Consumer
Security
Data
Provider
Security
Policy
Data
Provider
Security
Policy
‱  Security complexity
grows with sources
‱  Leads to apps
specializing on security
‱  Apps should be focused
on analytics
‱  App maintenance, policy
changes complicate the
story
‱  Cannot scale without
data-centric security
© 2014 Sqrrl | All Rights Reserved 7
ADVANCES IN IDENTITY AND
AUTHORIZATION MANAGEMENT
Federated Identity
"  Use common services for
authentication
"  Leverage technology like
OpenID, PKI, Single Sign-
On, Kerberos
"  Reduces administrative
burden for user management
Federated Authorization
"  Delegate authorization to
common services
"  Leverage technology like
OAuth, SAML, LDAP, AD
"  Ties into Data-Centric
Security concept
© 2014 Sqrrl | All Rights Reserved 8
DATA-CENTRIC SECURITY
‱  Move policy enforcement out of the app and into
the database
‱  Separate development of analysis from security
‱  Layer with traditional security elements
‱  Access control, auditing, encryption, ...
Data carries with it information needed to make
access control decisions.
© 2014 Sqrrl | All Rights Reserved 9
‱  Sorted Key/Value Store
‱  Fine-grained access control
(cell-level security)
‱  Modeled after Google’s Bigtable
‱  Distributed, Shared-Nothing
Architecture
‱  Scales to 10s of Petabytes
‱  Originally Developed in the US
Intelligence Community
‱  Now Open-Source, Apache
Software Foundation:
accumulo.apache.org
© 2014 Sqrrl | All Rights Reserved
In#
Memory*
Map*
Write*Ahead*
Log*
(For*Recovery)*
Sorted,*
Indexe
d*File*
Sorted,*
Indexe
d*File*
Sorted,*
Indexe
d*File*
Tablet'Data'Flow'
Reads&
Iterator*
Tree*
Minor&
Compac
0on&
Merging&/&Major&
Compac0on&
Iterator*
Tree*
Writes& Iterator*
Tree*
Scan&
Tablet*Server*
Tablet*
Tablet*Server*
Tablet*
Tablet*Server*
Tablet*
ApplicaAon*
Zookeeper*
Zookeeper*
Zookeeper*
Master*
HDFS*
Read/Write&
Store/Replicate&
Assign/Balance&
Delegate&Authority&
Delegate&Authority&
ApplicaAon*
ApplicaAon*
Row Col. Fam. Col. Qual. Visibility Timestamp Value
John Doe Notes 2012-09-12 PCP_JD 20120912
Patient suffers
from an acute 

John Doe Test Results Cholesterol JD|PCP_JD 20120912 183
John Doe Test Results Mental Health JD|PSYCH_JD 20120801 Pass
John Doe Test Results X-Ray JD|PCP_JD 20120513 1010110110100

ACCUMULO DATA FORMAT
11© 2014 Sqrrl | All Rights Reserved
Key Value
Cell-Level Tagging
DATA-CENTRIC ECOSYSTEM
12© 2014 Sqrrl | All Rights Reserved
DATA-CENTRIC SECURITY
ENABLES...
Secure Indexes
"  Challenge: Indexes reveal
information about the data
they represent
"  Solution: Preserve the
security model in an inverted
index with data-centric
security
Secure Knowledge-Bases
"  Challenge: Data
transformation obscures data
source and schema
"  Solution: Preserve the
security model in linked
documents with data-centric
security and fine-grained
access control
© 2014 Sqrrl | All Rights Reserved 13
Proxy Logs
BUILDING A SECURE KNOWLEDGE-BASE
14
Source Protocol Destination Port Bytes In Bytes Out
10.1.2.3 http google.com 80 73,824 15,632
10.1.2.4 https facebook.com 443 10,328 13,284,129
10.1.2.4 http google.com 80 623,249 93,125
10.1.2.3 unknown abcd1234.ru 31337 158 523,698,104
10.1.2.3 https netflix.com 443 434,855,357 1,392,994
10.1.2.4 https newcompany.com 443 23,084 583,331
10.1.2.3 ssh 10.1.2.5 22 204 158
© 2014 Sqrrl | All Rights Reserved
Proxy Logs
BUILDING A SECURE KNOWLEDGE-BASE
15
Source Protocol Destination Port Bytes In Bytes Out
10.1.2.3 http google.com 80 73,824 15,632
10.1.2.4 https facebook.com 443 10,328 13,284,129
10.1.2.4 http google.com 80 623,249 93,125
10.1.2.3 unknown abcd1234.ru 31337 158 523,698,104
10.1.2.3 https netflix.com 443 434,855,357 1,392,994
10.1.2.4 https newcompany.com 443 23,084 583,331
10.1.2.3 ssh 10.1.2.5 22 204 158
© 2014 Sqrrl | All Rights Reserved
Customer Access Logs
Time IP Address Username Location
12:38:01 10.1.2.4 johndoe Seattle
12:38:07 10.1.2.3 janedoe Boston
google.com
10.1.2.3
facebook.com
abcd1234.ru
netflix.com
10.1.2.4
10.1.2.5
johndoe
janedoe
Source Protocol Destination Port Bytes In Bytes Out
10.1.2.3 http google.com 80 73,824 15,632
10.1.2.4 https facebook.com 443 10,328 13,284,129
10.1.2.4 http google.com 80 623,249 93,125
10.1.2.3 unknown abcd1234.ru 31337 158 523,698,104
10.1.2.3 https netflix.com 443 434,855,357 1,392,994
10.1.2.4 https newcompany.com 443 23,084 583,331
10.1.2.3 ssh 10.1.2.5 22 204 158
BUILDING A SECURE KNOWLEDGE-BASE
© 2014 Sqrrl | All Rights Reserved 16
Data-centric security
makes this possible.
‱  Multi-Structured Data
‱  Multi-Layered Graph
‱  Multi-Level Security
‱  Multi-Tenancy
‱  Universal Search and
Discovery
‱  Simplified Infrastructure
‱  Rapid Application
Innovation
HOW TO LEARN MORE
Sqrrl Data, Inc.
"  Big Data Platform with Data-Centric Security
" sqrrl.com
Download our White Paper
" www.sqrrl.com/whitepaper
Request a demo or one-on-one workshop
"  www.sqrrl.com/contact
17© 2014 Sqrrl | All Rights Reserved
18
Coming Up
"  Big Data Techcon
March 31-April 2, Cambridge MA
"  Accumulo Summit
June 12, Greenbelt MD
Accumulosummit.com
"  “Data Driven Applications with Sqrrl Enterprise”
Webinar: March 12, 2pm EST
Keep up with us on social media:
www.twitter.com/SqrrlData
www.facebook.com/SqrrlData
www.linkedin.com/company/sqrrl
© 2014 Sqrrl | All Rights Reserved
Securely explore your data
THANK YOU
Adam Fuchs
CTO: Sqrrl Data, Inc.
February 26, 2014

Weitere Àhnliche Inhalte

Was ist angesagt?

Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...Saul Tannenbaum
 
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera CaresGrace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera CaresCloudera, Inc.
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. Dscoopnewsgroup
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the UnionCloudera, Inc.
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionSplunk
 
Machine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting StartedMachine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting StartedSqrrl
 
Data Tools and the Data Scientist Shortage
Data Tools and the Data Scientist ShortageData Tools and the Data Scientist Shortage
Data Tools and the Data Scientist ShortageWes McKinney
 
Fighting cybersecurity threats with Apache Spot
Fighting cybersecurity threats with Apache SpotFighting cybersecurity threats with Apache Spot
Fighting cybersecurity threats with Apache Spotmarkgrover
 
SplunkLive! Customer Presentation - Penn State Hershey Medical Center
SplunkLive! Customer Presentation - Penn State Hershey Medical CenterSplunkLive! Customer Presentation - Penn State Hershey Medical Center
SplunkLive! Customer Presentation - Penn State Hershey Medical CenterSplunk
 
Getting Started with Splunk Enterprises
Getting Started with Splunk EnterprisesGetting Started with Splunk Enterprises
Getting Started with Splunk EnterprisesSplunk
 
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...Cloudera, Inc.
 
WWW19: SGX-PySpark: Secure Distributed Data Analytics
WWW19: SGX-PySpark: Secure Distributed Data AnalyticsWWW19: SGX-PySpark: Secure Distributed Data Analytics
WWW19: SGX-PySpark: Secure Distributed Data AnalyticsLEGATO project
 
Get full visibility and find hidden security issues
Get full visibility and find hidden security issuesGet full visibility and find hidden security issues
Get full visibility and find hidden security issuesElasticsearch
 
Hadoop Hadoop & Spark meetup - Altiscale
Hadoop Hadoop & Spark meetup - AltiscaleHadoop Hadoop & Spark meetup - Altiscale
Hadoop Hadoop & Spark meetup - AltiscaleMark Kerzner
 

Was ist angesagt? (15)

Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
 
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera CaresGrace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
Machine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting StartedMachine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting Started
 
Data Tools and the Data Scientist Shortage
Data Tools and the Data Scientist ShortageData Tools and the Data Scientist Shortage
Data Tools and the Data Scientist Shortage
 
Fighting cybersecurity threats with Apache Spot
Fighting cybersecurity threats with Apache SpotFighting cybersecurity threats with Apache Spot
Fighting cybersecurity threats with Apache Spot
 
SplunkLive! Customer Presentation - Penn State Hershey Medical Center
SplunkLive! Customer Presentation - Penn State Hershey Medical CenterSplunkLive! Customer Presentation - Penn State Hershey Medical Center
SplunkLive! Customer Presentation - Penn State Hershey Medical Center
 
Getting Started with Splunk Enterprises
Getting Started with Splunk EnterprisesGetting Started with Splunk Enterprises
Getting Started with Splunk Enterprises
 
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
 
WWW19: SGX-PySpark: Secure Distributed Data Analytics
WWW19: SGX-PySpark: Secure Distributed Data AnalyticsWWW19: SGX-PySpark: Secure Distributed Data Analytics
WWW19: SGX-PySpark: Secure Distributed Data Analytics
 
Get full visibility and find hidden security issues
Get full visibility and find hidden security issuesGet full visibility and find hidden security issues
Get full visibility and find hidden security issues
 
Apache Spot
Apache SpotApache Spot
Apache Spot
 
Hadoop Hadoop & Spark meetup - Altiscale
Hadoop Hadoop & Spark meetup - AltiscaleHadoop Hadoop & Spark meetup - Altiscale
Hadoop Hadoop & Spark meetup - Altiscale
 

Ähnlich wie Sqrrl February Webinar: Breaking Down Data Silos

What's Next for Google's BigTable
What's Next for Google's BigTableWhat's Next for Google's BigTable
What's Next for Google's BigTableSqrrl
 
Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Niel Dunnage
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoopNiel Dunnage
 
Blockchain and Apache NiFi
Blockchain and Apache NiFiBlockchain and Apache NiFi
Blockchain and Apache NiFiTimothy Spann
 
Taming Big Data with Big SQL 3.0
Taming Big Data with Big SQL 3.0Taming Big Data with Big SQL 3.0
Taming Big Data with Big SQL 3.0Nicolas Morales
 
Internet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry DisruptionInternet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry Disruptionimec
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseSplunk
 
Will SDN kill Ethernet Fabrics?
Will SDN kill Ethernet Fabrics?Will SDN kill Ethernet Fabrics?
Will SDN kill Ethernet Fabrics?Brocade
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityPaul Morse
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...Government Technology and Services Coalition
 
Getting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionGetting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionSplunk
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Cisco DevNet
 
stackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutionsstackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutionsGaurav "GP" Pal
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything Cisco Canada
 
An Introduction to Hadoop and Cloudera: Nashville Cloudera User Group, 10/23/14
An Introduction to Hadoop and Cloudera: Nashville Cloudera User Group, 10/23/14An Introduction to Hadoop and Cloudera: Nashville Cloudera User Group, 10/23/14
An Introduction to Hadoop and Cloudera: Nashville Cloudera User Group, 10/23/14iwrigley
 
Snowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at ScaleSnowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at ScaleAdam Doyle
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromPROIDEA
 
Fast data for fitness 10 nov 2020
Fast data for fitness 10 nov 2020Fast data for fitness 10 nov 2020
Fast data for fitness 10 nov 2020Timothy Spann
 

Ähnlich wie Sqrrl February Webinar: Breaking Down Data Silos (20)

What's Next for Google's BigTable
What's Next for Google's BigTableWhat's Next for Google's BigTable
What's Next for Google's BigTable
 
Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoop
 
Blockchain and Apache NiFi
Blockchain and Apache NiFiBlockchain and Apache NiFi
Blockchain and Apache NiFi
 
Taming Big Data with Big SQL 3.0
Taming Big Data with Big SQL 3.0Taming Big Data with Big SQL 3.0
Taming Big Data with Big SQL 3.0
 
Internet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry DisruptionInternet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry Disruption
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Will SDN kill Ethernet Fabrics?
Will SDN kill Ethernet Fabrics?Will SDN kill Ethernet Fabrics?
Will SDN kill Ethernet Fabrics?
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
 
Getting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionGetting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout Session
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation
 
stackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutionsstackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutions
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
 
An Introduction to Hadoop and Cloudera: Nashville Cloudera User Group, 10/23/14
An Introduction to Hadoop and Cloudera: Nashville Cloudera User Group, 10/23/14An Introduction to Hadoop and Cloudera: Nashville Cloudera User Group, 10/23/14
An Introduction to Hadoop and Cloudera: Nashville Cloudera User Group, 10/23/14
 
Shanghai Breakout: Access Management with Aruba ClearPass
Shanghai Breakout: Access Management with Aruba ClearPassShanghai Breakout: Access Management with Aruba ClearPass
Shanghai Breakout: Access Management with Aruba ClearPass
 
Snowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at ScaleSnowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at Scale
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
Fast data for fitness 10 nov 2020
Fast data for fitness 10 nov 2020Fast data for fitness 10 nov 2020
Fast data for fitness 10 nov 2020
 

Mehr von Sqrrl

Transitioning Government Technology
Transitioning Government TechnologyTransitioning Government Technology
Transitioning Government TechnologySqrrl
 
Leveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your HuntsLeveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your HuntsSqrrl
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkSqrrl
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphUser and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphSqrrl
 
Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Sqrrl
 
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingSqrrl
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Sqrrl
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivitySqrrl
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert TriageSqrrl
 
The Linked Data Advantage
The Linked Data AdvantageThe Linked Data Advantage
The Linked Data AdvantageSqrrl
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl
 
Benchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value StoreBenchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value StoreSqrrl
 
Scalable Graph Clustering with Pregel
Scalable Graph Clustering with PregelScalable Graph Clustering with Pregel
Scalable Graph Clustering with PregelSqrrl
 
April 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlApril 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlSqrrl
 
Sqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl
 
Performance Models for Apache Accumulo
Performance Models for Apache AccumuloPerformance Models for Apache Accumulo
Performance Models for Apache AccumuloSqrrl
 
Sqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl
 
Sqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl November Webinar: Encryption and Security in AccumuloSqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl November Webinar: Encryption and Security in AccumuloSqrrl
 

Mehr von Sqrrl (20)

Transitioning Government Technology
Transitioning Government TechnologyTransitioning Government Technology
Transitioning Government Technology
 
Leveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your HuntsLeveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your Hunts
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphUser and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
 
Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)
 
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar Users
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker Activity
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert Triage
 
The Linked Data Advantage
The Linked Data AdvantageThe Linked Data Advantage
The Linked Data Advantage
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber Hunting
 
Benchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value StoreBenchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value Store
 
Scalable Graph Clustering with Pregel
Scalable Graph Clustering with PregelScalable Graph Clustering with Pregel
Scalable Graph Clustering with Pregel
 
April 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlApril 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with Sqrrl
 
Sqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch Webinar
 
Performance Models for Apache Accumulo
Performance Models for Apache AccumuloPerformance Models for Apache Accumulo
Performance Models for Apache Accumulo
 
Sqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric Security
 
Sqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl November Webinar: Encryption and Security in AccumuloSqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl November Webinar: Encryption and Security in Accumulo
 

KĂŒrzlich hochgeladen

Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Call Girls In Bellandur ☎ 7737669865 đŸ„” Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 đŸ„” Book Your One night StandCall Girls In Bellandur ☎ 7737669865 đŸ„” Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 đŸ„” Book Your One night Standamitlee9823
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...amitlee9823
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...amitlee9823
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxolyaivanovalion
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptDr. Soumendra Kumar Patra
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...amitlee9823
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 

KĂŒrzlich hochgeladen (20)

Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Call Girls In Bellandur ☎ 7737669865 đŸ„” Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 đŸ„” Book Your One night StandCall Girls In Bellandur ☎ 7737669865 đŸ„” Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 đŸ„” Book Your One night Stand
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptx
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 

Sqrrl February Webinar: Breaking Down Data Silos

  • 1. Securely explore your data BREAKING DOWN DATA SILOS WITH SQRRL ENTERPRISE Adam Fuchs CTO: Sqrrl Data, Inc. February 26, 2014
  • 2. DATABASES ARE GREAT! ‱  Decouple data providers and consumers ‱  Enable independent development Database Data Provider Data Consumer ... but how can we handle complex security policies? © 2014 Sqrrl | All Rights Reserved 2
  • 3. COMPLEX SECURITY POLICIES Healthcare Example PII Sensitive Diagnoses Doctor’s Notes 3© 2014 Sqrrl | All Rights Reserved
  • 4. TRADITIONAL SECURITY Build security policy logic into the application Database Data Provider Security Policy Data Consumer Security © 2014 Sqrrl | All Rights Reserved 4 Application Implements Security Through: ‱  Database Views ‱  Query Rewriting
  • 5. MORE COMPLEX SECURITY... 5 Claims Data EMRs Public Records Genomic Data Healthcare Fraud / Automated Diagnosis App © 2014 Sqrrl | All Rights Reserved
  • 6. COMBINATORIAL COMPLEXITY Database Data Provider Security Policy Data Consumer Security Data Consumer Security Data Consumer Security Data Provider Security Policy Data Provider Security Policy © 2014 Sqrrl | All Rights Reserved 6
  • 7. COMBINATORIAL COMPLEXITY Database Data Provider Security Policy Data Consumer Security Data Consumer Security Data Consumer Security Data Provider Security Policy Data Provider Security Policy ‱  Security complexity grows with sources ‱  Leads to apps specializing on security ‱  Apps should be focused on analytics ‱  App maintenance, policy changes complicate the story ‱  Cannot scale without data-centric security © 2014 Sqrrl | All Rights Reserved 7
  • 8. ADVANCES IN IDENTITY AND AUTHORIZATION MANAGEMENT Federated Identity "  Use common services for authentication "  Leverage technology like OpenID, PKI, Single Sign- On, Kerberos "  Reduces administrative burden for user management Federated Authorization "  Delegate authorization to common services "  Leverage technology like OAuth, SAML, LDAP, AD "  Ties into Data-Centric Security concept © 2014 Sqrrl | All Rights Reserved 8
  • 9. DATA-CENTRIC SECURITY ‱  Move policy enforcement out of the app and into the database ‱  Separate development of analysis from security ‱  Layer with traditional security elements ‱  Access control, auditing, encryption, ... Data carries with it information needed to make access control decisions. © 2014 Sqrrl | All Rights Reserved 9
  • 10. ‱  Sorted Key/Value Store ‱  Fine-grained access control (cell-level security) ‱  Modeled after Google’s Bigtable ‱  Distributed, Shared-Nothing Architecture ‱  Scales to 10s of Petabytes ‱  Originally Developed in the US Intelligence Community ‱  Now Open-Source, Apache Software Foundation: accumulo.apache.org © 2014 Sqrrl | All Rights Reserved In# Memory* Map* Write*Ahead* Log* (For*Recovery)* Sorted,* Indexe d*File* Sorted,* Indexe d*File* Sorted,* Indexe d*File* Tablet'Data'Flow' Reads& Iterator* Tree* Minor& Compac 0on& Merging&/&Major& Compac0on& Iterator* Tree* Writes& Iterator* Tree* Scan& Tablet*Server* Tablet* Tablet*Server* Tablet* Tablet*Server* Tablet* ApplicaAon* Zookeeper* Zookeeper* Zookeeper* Master* HDFS* Read/Write& Store/Replicate& Assign/Balance& Delegate&Authority& Delegate&Authority& ApplicaAon* ApplicaAon*
  • 11. Row Col. Fam. Col. Qual. Visibility Timestamp Value John Doe Notes 2012-09-12 PCP_JD 20120912 Patient suffers from an acute 
 John Doe Test Results Cholesterol JD|PCP_JD 20120912 183 John Doe Test Results Mental Health JD|PSYCH_JD 20120801 Pass John Doe Test Results X-Ray JD|PCP_JD 20120513 1010110110100
 ACCUMULO DATA FORMAT 11© 2014 Sqrrl | All Rights Reserved Key Value Cell-Level Tagging
  • 12. DATA-CENTRIC ECOSYSTEM 12© 2014 Sqrrl | All Rights Reserved
  • 13. DATA-CENTRIC SECURITY ENABLES... Secure Indexes "  Challenge: Indexes reveal information about the data they represent "  Solution: Preserve the security model in an inverted index with data-centric security Secure Knowledge-Bases "  Challenge: Data transformation obscures data source and schema "  Solution: Preserve the security model in linked documents with data-centric security and fine-grained access control © 2014 Sqrrl | All Rights Reserved 13
  • 14. Proxy Logs BUILDING A SECURE KNOWLEDGE-BASE 14 Source Protocol Destination Port Bytes In Bytes Out 10.1.2.3 http google.com 80 73,824 15,632 10.1.2.4 https facebook.com 443 10,328 13,284,129 10.1.2.4 http google.com 80 623,249 93,125 10.1.2.3 unknown abcd1234.ru 31337 158 523,698,104 10.1.2.3 https netflix.com 443 434,855,357 1,392,994 10.1.2.4 https newcompany.com 443 23,084 583,331 10.1.2.3 ssh 10.1.2.5 22 204 158 © 2014 Sqrrl | All Rights Reserved
  • 15. Proxy Logs BUILDING A SECURE KNOWLEDGE-BASE 15 Source Protocol Destination Port Bytes In Bytes Out 10.1.2.3 http google.com 80 73,824 15,632 10.1.2.4 https facebook.com 443 10,328 13,284,129 10.1.2.4 http google.com 80 623,249 93,125 10.1.2.3 unknown abcd1234.ru 31337 158 523,698,104 10.1.2.3 https netflix.com 443 434,855,357 1,392,994 10.1.2.4 https newcompany.com 443 23,084 583,331 10.1.2.3 ssh 10.1.2.5 22 204 158 © 2014 Sqrrl | All Rights Reserved Customer Access Logs Time IP Address Username Location 12:38:01 10.1.2.4 johndoe Seattle 12:38:07 10.1.2.3 janedoe Boston google.com 10.1.2.3 facebook.com abcd1234.ru netflix.com 10.1.2.4 10.1.2.5 johndoe janedoe Source Protocol Destination Port Bytes In Bytes Out 10.1.2.3 http google.com 80 73,824 15,632 10.1.2.4 https facebook.com 443 10,328 13,284,129 10.1.2.4 http google.com 80 623,249 93,125 10.1.2.3 unknown abcd1234.ru 31337 158 523,698,104 10.1.2.3 https netflix.com 443 434,855,357 1,392,994 10.1.2.4 https newcompany.com 443 23,084 583,331 10.1.2.3 ssh 10.1.2.5 22 204 158
  • 16. BUILDING A SECURE KNOWLEDGE-BASE © 2014 Sqrrl | All Rights Reserved 16 Data-centric security makes this possible. ‱  Multi-Structured Data ‱  Multi-Layered Graph ‱  Multi-Level Security ‱  Multi-Tenancy ‱  Universal Search and Discovery ‱  Simplified Infrastructure ‱  Rapid Application Innovation
  • 17. HOW TO LEARN MORE Sqrrl Data, Inc. "  Big Data Platform with Data-Centric Security " sqrrl.com Download our White Paper " www.sqrrl.com/whitepaper Request a demo or one-on-one workshop "  www.sqrrl.com/contact 17© 2014 Sqrrl | All Rights Reserved
  • 18. 18 Coming Up "  Big Data Techcon March 31-April 2, Cambridge MA "  Accumulo Summit June 12, Greenbelt MD Accumulosummit.com "  “Data Driven Applications with Sqrrl Enterprise” Webinar: March 12, 2pm EST Keep up with us on social media: www.twitter.com/SqrrlData www.facebook.com/SqrrlData www.linkedin.com/company/sqrrl © 2014 Sqrrl | All Rights Reserved
  • 19. Securely explore your data THANK YOU Adam Fuchs CTO: Sqrrl Data, Inc. February 26, 2014