On-Demand Webinars

It’s an inconvenient truth that proven and well-understood data security methods were designed to work with relational database management systems. Over the decades, certain habits became second nature to security-minded IT professionals. But many of these habits are now fundamentally incompatible with Big Data/NoSQL environments.

This presentation will walk you through the data security implications of key differences between NoSQL and relational databases. You’ll leave the session knowing:

  • Signs that Big Data/NoSQL may be coming to your organization
  • 7 security habits that expose Big Data to a breach...or cause major delays/rework
  • How early adopters are making new security habits in the era of Big Data

Once you have viewed the webinar, download the 5 Signs of Big Data tip sheet for more details on how you identify (and secure) your organization's under-the-radar Big Data projects.

This webinar was recorded on April 8, 2014 and lasts 30 minutes.


David Tishgart, Director of Alliances at Gazzang

View the Replay Now!

You can have the world’s best use case for Big Data, and a mouth-watering proof of concept; but before you can build a real business case, you’re going to need to figure out how much actual data to plan for. Regardless of whether you will rack your own gear or head to the cloud, you have some math to do. You don’t have to go it alone. Hear from Doug Needham, an experienced Enterprise Architect, on the essentials for sizing up your Big Data project.

He’ll share:

  • Common flaws in estimating data volumes
  • Data management utilities that should always factor into your estimates
  • Approaches to planning for growth
  • How to respond if you’re asked to cut back your estimates

Once you have viewed the webinar, download the white paper for more details on how you can use Gazzang to secure your Big Data project.

This webinar was recorded on March 18, 2014 and lasts 60 minutes.


Doug Needham, Enterprise Architect at Clear Measures
Jennifer Darrouzet, Director of Product Marketing at Gazzang

View the Replay Now!

Data security is an absolute requirement for any organization -- large or small -- that handles debit, credit and pre-paid cards. But navigating, understanding and complying with PCI-DSS (Payment Card Industry - Data Security Standards) regulations can be tough. In this webinar, we'll examine the guidelines for securing payment card data and show you how a combined solution from DataStax and Gazzang can put you on course for compliance.

Once you have viewed the webinar, download the white paper for more details on how you can use Gazzang and DataStax to comply with PCI-DSS.

This webinar was recorded on February 20, 2014 and lasts 60 minutes.


Pavan Venkatesh, Senior Product Manager at DataStax
Sam Heywood, VP of Product and Marketing at Gazzang

View the Replay Now!

Take a peek under the hood of the Big Data application that’s bringing transparency to the healthcare marketplace - watch this replay for a presentation by Robert Stewart, Castlight’s Chief Architect.

View the Replay Now!

Data in Couchbase server may contain either sensitive, protected information or key intellectual property. Sensitive data comes in many forms - names, addresses, medical records, school transcripts, buying habits, credit card numbers, corporate intellectual property. Typically, this information is distributed throughout the cluster calling for the underlying data files to be protected. Gazzang for Couchbase offers a powerful, policy-driven solution that enables you to encrypt your data stored in Couchbase Server.

In this webinar you'll see:

  • An overview of Couchbase Server
  • The main use cases for data encryption and key management
  • An overview of Gazzang zNcrypt and Gazzang zTrustee
  • How to ensure your security solution integrates seamlessly with Couchbase without impacting performance
  • What do you need to get started
  • A demo of how Gazzang works in Couchbase

This webinar was recorded on November 13, 2013 and lasts a little over 1 hour.

View the Replay Now!

The final HIPAA Omnibus Rule is now in effect, requiring organizations to perform, among other things, a four-step risk assessment of potential breaches of Protected Health Information (PHI). Join RISC Management and Gazzang for a webinar to understand what constitutes a breach and how best to protect regulated data such as ePHI. Learn how to successfully navigate the breach risk assessment requirements and minimize your chances of having to report a breach.

This webinar was recorded on November 6, 2013 and lasts 1 hour.

David Tishgart, Senior Director of Marketing at Gazzang, the Big Data security experts
Chris Heuman, Practice Leader for RISC Management, an organization dedicated to data privacy and information security.

View the Replay Now!

During this webinar, we'll look at how data security techniques including encryption, key management and authentication can help Covered Entities and Business Associates avoid costly missteps and achieve HIPAA compliance in the cloud. We will also hear from the CTO of Tonic Health about how Gazzang is helping the company deliver a secure and HIPAA-compliant iPad application.

This webinar was recorded on May 29, 2013 and lasts 50 minutes.

Boris Glants, CTO at TonicHealth
David Tishgart, Director of Product Marketing at Gazzang
Robert Linden, Senior Solutions Architect at Gazzang

View the Replay Now!

Satisfy your Security and Compliance office in this webinar offered by DataStax, the company that develops Apache Cassandra™, and Gazzang, provider of data security solutions for big data and cloud environments.

See how scalable, software-based data security can help you protect the sensitive and confidential information in your online transactional business applications and comply with:

  • European privacy regulations

This webinar was recorded on May 22 and lasts one hour.

Greg Greenstreet, VP of Engineering for Gnip
Robin Shumacher, VP of Products for DataStax
Sam Heywood, VP of Products for Gazzang

View the Replay Now

Pop Quiz: What's the quickest way to spin up a secure version of MongoDB? In this webinar, we'll explore the real-life use case of a non-profit education collaborative that wanted to secure sensitive student and teacher data on MongoDB using Gazzang zNcrypt. This kind of information requires a high level of security and confidentiality, but how do you protect this data in a distributed database with hundreds of nodes? We will demonstrate how Chef can help you architect security with Gazzang zNcrypt into your MongoDB environment at the deployment stage.

Matt Ray, Senior Technical Evangelist at Opscode
Sandeep Parikh, Product Management at 10gen
Eddie Garcia, Vice President of Development at Gazzang

View the Replay Now

How are you managing your cryptographic keys, SSL certificates, database tokens and other important information objects? Does the thought of a data breach or compliance audit keep you up at night?

Join us for a webinar and demo of Gazzang zTrustee™, a single, secure SaaS-based vault that protects these critical IT secrets from unauthorized access and can help you meet strict data security regulations.

In this webinar we will show you how you can:

  • Safely and securely store your keys, certificates, lines of code and other important bits of IT information as opaque objects.
  • Automate the deposit and retrieval processes and policies for those objects.
  • Eliminate "key sprawl" in your enterprise environment.
  • Generate and view comprehensive audit reports on key creation, updates, rotation, requests, approvals and other historical information.
Robert Linden, Senior Solutions Architect at Gazzang
David Tishgart, Senior Director of Marketing at Gazzang

View the Replay Now