Dell has announced it will spin off its SecureWorks product portfolio. SecureWorks is very late to the cloud and virtualization security market, and it may never get there. EMC RSA ignored the cloud and virtualization security market and now is struggling to find a footing in the larger IoT market. VCE has no security reference architecture other than a growing list of products. When everyone is hailing Dell plus EMC as one of the largest mergers (which it is), how is security going to play as a part of the combined portfolio?
Have you noticed lately that the term “big data” is being used with increasing frequency? It seems that working with big data is one of the more desired and in-demand skill sets in the technology space. What you think “big data” is, and what do you think it represents? One definition to consider is this one from Wikipedia: “Big data usually includes data sets with sizes beyond the ability of commonly used software tools to capture, curate, manage, and process the data within a tolerable elapsed time.” So, who benefits the most from its use? Have you stopped to consider just what makes up big data? Let’s explore that question a little deeper.
Jaspersoft, an industry-leading BI platform, has announced its first release since being acquired by TIBCO back in April. With version 5.6, Jaspersoft has enhanced its platform with a new big data connectivity architecture and new analytic calculations, extended its interactive reporting features, and improved the overall platform performance. This release also introduces a new product for advanced embedded analytics: Visualize.js. Continue reading Jaspersoft BI Platform Adds Big Data Capabilities
The software-defined data center (SDDC) requires a new breed of security tools that not only handle the velocity of data being generated within a secure hybrid cloud but also handle the volume and variety of data. In fact, this new breed of security tools uses big data backends to manage the data being received, though it asks different questions of the data than normal for the products: security questions. The new breed of security tools either started as some form of performance management tool or employs performance management techniques to provide the data to to be queried. Continue reading SDDC Security Tools of the Future
At the recent Misti Big Data Security conference many forms of securing big data were discussed from encrypting the entire big data pool to just encrypting the critical bits of data within the pool. On several of the talks there was general discussion on securing Hadoop as well as access to the pool of data. These security measures include RBAC, encryption of data in motion between hadoop nodes as well as tokenization or encryption on ingest of data. What was missing was greater control of who can access specific data once that data was in the pool. How could role based access controls by datum be put into effect? Is such protection too expensive given the time critical nature of analytics or are there other ways to implement datum security? Continue reading Big Data Security
A big part of the secure hybrid cloud is the need for multi-tenant analytics to determine when security events and compliance issues happen. However, analytics cover many different aspects of security within the hybrid cloud, from being a control point for compliance to handling vulnerability scanning. What are the requirements for multi-tenant analytics? Continue reading Analytics within the Secure Hybrid Cloud