Beef Up Your Big Data Security

Analyzing the massive amount of unstructured data – email addresses, phone records, GPS locations, social security numbers, health records, intellectual property – in your environment can be a boost to your business. But if that information winds up in the wrong hands, the results could be disastrous.

Gazzang zNcrypt™ helps organizations transparently encrypt big data in the cloud or on premises. The solution leverages file- and block-level encryption, the latter of which is well suited for big data projects because of its extremely high performance during the cryptographic process. zNcrypt process-based access control lists support the unique requirements of Apache Cassandra, Apache Hadoop, Couchbase Server, MongoDB, Riak and other big data applications, to help you meet security and compliance needs.

As your big data environment rapidly expands, adding new nodes, servers and images, this dramatically increases the volume of cryptographic keys and other security objects  that need to be properly secured and managed.  Gazzang zTrustee™ delivers that protection with its ultra-secure, policy-driven “vault” for keys, certificates, tokens and other critical security strings.

For organizations running big data jobs in the AWS infrastructure, Gazzang CloudEncrypt™ is a a portfolio of products designed for Amazon Web Services (AWS) to help organizations realize the enormous benefits of the public cloud and maintain a secure, compliant, production-ready environment. Users get flexible, elastic, pre-packaged security, no matter where their sensitive data moves in the Amazon cloud. Available for Amazon EC2, Amazon Elastic Beanstalk, Amazon EMR, and StarCluster.

No longer do you have to choose between security and performance. Gazzang can provide the protection you need while maintaining the highest levels of data availability and performance you've come to expect from big data.

Learn how Gazzang can help you Secure the Big Data Lifecycle.

For more information on why Big Data architectures require transparent data encryption, check out this Securing Big Data blog from research firm, Securosis.