Cloudera

Comprehensive Security for the Enterprise
Webinar Series

Cloudera allows you to build an enterprise data hub that includes the breadth of security required for your big data applications. Through innovations like Sentry and project Rhino, only Cloudera offers the breadth of security capabilities required to meet the stringent requirements of every enterprise.

I | Compliance Ready Hadoop
Available on-demand

II | Guarding the Perimeter and Controlling Access
Available on-demand

III | Protecting Data-At-Rest and In Motion
7/22, 10 - 11am PT

IV | Visibility Through a Single End-to-End Governance Solution
8/7, 10 - 11am PT




Protecting Data-At-Rest & In Motion
Visibility Through a Single End-to-End Governance Solution

Yes, I would like to start receiving email updates from Cloudera.

I agree to Cloudera's terms and conditions.

Compliance Ready Hadoop: Comprehensive Security for the Enterprise

Data security is no longer a checkbox in the IT or operations departments but a top business priority for most enterprises. As compliance pressures mount, the requirements and restrictions on data and data access come under increased scrutiny. Security in Hadoop is no exception. Join us to learn how security in Hadoop is quickly changing, and what the key requirements are for taking Hadoop to the next level in your organization.

Watch on-demand >

Protecting Data-At-Rest and In Motion

As discussed in the webinar, “Compliance-Ready Hadoop” on June 19th, there are four pillars of security that must be achieved to offer comprehensive security. Cloudera offers all four: perimeter, access, data, and visibility. In this webinar, we will focus on the pillar of data. With Cloudera’s recent acquisition of Gazzang, Cloudera is able to protect your data through encryption and powerful key management - all integrated into Cloudera Navigator. This webinar will discuss how you can use Navigator capabilities such as Encrypt and Key Trustee to secure data and enable compliance. Additionally, we will discuss our joint work with Intel on Project Rhino (an initiative to improve data security in Hadoop). Finally, we will hear from a security architect at a financial services company that is using encryption and key management to meet financial regulatory requirements.

This will be a technical webinar discussing features including Encrypt, Key Trustee, Process-Based Access Controls, and Rhino Encryption. There will be a Q&A following this webinar.

Guarding the Perimeter and Controlling Access

As discussed in the webinar, “Compliance-Ready Hadoop” on June 19th, there are four pillars of security that must be achieved to offer comprehensive security. Cloudera offers all four: perimeter, access, data, and visibility. In this webinar, we will focus on the pillars of perimeter and access. One of the benefits of Hadoop is that it easily allows for multiple entry points both for data flow and user access. We will discuss how Cloudera allows you to preserve the agility of having multiple entry points while also providing strong, easy to manage authentication. Additionally, we will discuss how Cloudera provides unified authorization to easily control access for multiple data processing engines.

This is a technical webinar discussing features including Kerberos and Apache Sentry.

Watch on-demand >

Visibility Through a Single End-to-End Governance Solution

As discussed in the webinar, “Compliance-Ready Hadoop” on June 19th, there are four pillars of security that must be achieved to offer comprehensive security. Cloudera offers all four: perimeter, access, data, and visibility. In this webinar, we will focus on the pillar of visibility. To provide visibility and transparency into your data and usage, Cloudera Enterprise has Navigator, the only native end-to-end governance solution for Apache Hadoop. This webinar will discuss why Navigator is a key part of comprehensive security and discuss its key features including: auditing, access control, data discovery and exploration, lineage, and lifecycle management. We will also include a live demo of the Navigator interface to show how you can use it to meet compliance regulations. Finally, we will look at where Navigator is headed in the future.

This will be a technical webinar discussing features including Navigator auditing, Navigator lineage, and Navigator discovery.