IBM — Centrify Partnership Brings Identity Security to IBM Big Insights

IBM is truly the original Big Data company. Going back to 1911 when IBM (then called Computing-Tabulating-Recording Company, or C-T-R) acquired Herman Hollerith’s Tabulating Machine Co., IBM has continuously brought innovation and insight to data recorded with computing machines.  The Tabulating machine was invented by Mr. Hollerith to count the 1890 US Census. It sorted and counted information recorded by punching holes in cards, and Hollerith had begun selling the machines to governments, railroad companies and retailers. Thus began the Big Data era.  The idea that businesses could gather data and analyze it to obtain competitive advantage/improve efficiency became the driving…

Identity Management for Multi-Tiered Big Data Environments

Are you satisfied that your big data applications are protected against cyberthreats? Are you able to prove compliance across the big data stack? If not, read on! Big Data environments usually have clusters of nodes, and each node has, at the bottom layer, an operating system on which the big data and applications sit on. For example — imagine an IBM BigInsights customer using the Big SQL application, based on a Hortonworks cluster running on Linux operating system. It can be challenging to figure out how to properly secure each layer of this stack! To help understand this better, let’s…

Centrify Partners with Leading NoSQL Innovators: Couchbase, DataStax, MongoDB

Things are changing. No kidding right? One of the biggest changes you may not even notice is how data is stored by your company or your friendly neighborhood web application.  These days many of these workloads are handled by a NoSQL database. According to Market Research Media, the worldwide NoSQL market is expected to reach $3.4 billion by 2020 at a CAGR of 21% between 2015 and 2020. This represents a tremendous new market where companies like Couchbase ($115 million raised), MongoDB ($311 million raised), and DataStax ($190 million raised) have collectively raised more than $600 million to satisfy the insatiable…

Securing Your Big Data Environments Built on Hadoop or NoSQL?

Do you know the percent of all Big Data projects that must meet some level of compliance? According to a recent SANS survey, over 80% have to today. The logical conclusion is that you already have sensitive data that you need to protect — it’s not a case of “if.” So, how are you protecting data from cyberthreats and proving compliance? Over the last few years, Centrify has worked with the leading vendors in Hadoop to deliver their customers’ enterprise-grade identity and access management (IAM). We’re the industry’s first privileged identity management (PIM) solution for Big Data and announced our partnership with…

Simplify and Secure Hadoop with Centrify

Do you have to secure your company’s Hadoop cluster as it moves to production? Concerned about setting up and managing an MIT Kerberos implementation? We’ve been working with over 40 enterprises across six major verticals over the last few years to address their Big Data IAM challenges. This blog post describes some of the key challenges they’ve faced, and how we at Centrify have helped address them.  Active Directory Integration Often, Hadoop projects within an enterprise are piloted by business units and then moved to production once the use case is validated. And, one of the first decisions business units and…

How Centrify is Innovating in the Four Biggest Trends in IT … #1 Big Data

Recently at a CEO summit hosted by one of our investors I heard the CEO of VMware say that the four top of mind items for CIOs are Big Data, Mobile, Cloud and Security. This echoes what Gartner has been saying since late 2012 that these are the top 4 “big trends” that will “change IT.” Even IBM announced this week as part of their restructuring that these four areas are their most significant “strategic imperatives.”

Secure Identity for Hadoop @ Strata+Hadoop World 2015

The most interesting thing to me about Strata+Hadoop World was the stories about what everyone is doing with Hadoop or Big Data. We heard numerous stories about how data scientists are using Hadoop to analyze customer data, financial data, web site click traffic, etc. In fact, most of the people who came to the show were realizing the value of Hadoop technology, while very few were responsible for the IT infrastructure that it runs on (who we normally sell security solutions to). And the most common title at the show was Data Scientist, which got me thinking that we should have a Security…

Centrify and Cloudera Partner to Offer Privileged Identity Management for Hadoop

Information has become the lifeblood of our modern economy. Vast piles of data are stacking up everywhere in massive data centers all over the world. Whole companies and whole industries have been formed and evaporated trying to solve the fundamental challenge with so much data – how to get value from the data by understanding it all. Now that we know this data has so much value we must make sure we keep this valuable information secret from prying eyes. Perhaps you have heard about the great efforts Coca Cola has taken to protect the secret recipe for Coke? This is…

Hortonworks + Centrify Partner to Secure and Speed Big Data Deployments

Over the past six months, more than 10 of Hortonworks customers have come to us to explain how they were looking to start using Centrify to secure their Hortonworks Data Platform (HDP) environments. We took the time to understand and enable each of these customers’ use cases around secure and centralized identity management for HDP users and admins. With today’s big data solution announcement from Centrify, we have productized those use cases and lessons, and partnered with Hortonworks to certify the capabilities – allowing us to jointly take this solution to market. With this blog, I want to walk you through some…