Telecom and IT companies are thriving to be innovative and want to maximize their revenues. For these reasons, they are seeking for the right tools protect the massive volumes, types, formats, and the velocity of the data. The telecommunications industry vertical is a primary target for hackers, as this industry vertical carries vast amounts of personal data collected using the cell/smart phones, satellites, and the internet. This industry vertical is managing huge chunks of data stored in silos and scattered across the organization, which needs to be protected. Therefore, to ensure the data safety, big data telecom organizations and IT service providers are boosting up their data security investments significantly. In addition, various programs, such as Global Information Society Project Program on Telecommunication Policy, and strict telecom and regulatory policies have been introduced to combat the telecom and IT industry vertical’s data threats. Big data security solutions help mitigate the impact of threats that are prevailing in this industry vertical, to avoid losses. The latest predictions from the Communications Fraud Control Association (CFCA) 2015 industry survey reveals that telecom operators globally incur an average loss of 13% or USD 294 billion, due to the numerous uncollected revenue and frauds prevailing in this industry vertical. Additionally, big data security is facilitating more secure data surroundings by monitoring and analyzing data.
Voltage SecureData Enterprise is data-centric protection for big data. It protects the world’s largest brands and neutralizes breach impact by securing sensitive data-at-rest, in-use, and in motion. It provides advanced encryption, tokenization, and secure key management that protect sensitive data across enterprise applications, data processing IT, cloud, payments ecosystems, mission-critical transactions, storage, and big data platforms.
Checkpoint Next-Generation SmartEvent evaluates and searches logs with unparalleled speed and scale. It is capable to analyze billions of logs per day, and search over a hundred million logs in a matter of seconds. This speed and scale enable forensic investigation and regulatory compliance with easy access to terabytes of historical logs. SmartEvent offers full threat visibility with a single view of security risks. It helps to take control and command the security event through real-time forensic and event investigation, compliance and reporting. It also responds to security incidents immediately and gains network true insights.
Imperva Inc. enables the successful deployment of security solutions that protect critical data and applications over the enterprise cloud or on-premises network. The solutions provided by the company improves the overall accuracy, decrease complexity, increase enterprise performance, and broaden deployment options to the customers. Advanced technologies provided by the company delivers innovative protection against complex, multi-vector data threats and attacks. Imperva SecureSphere solution integrates multi-layer security architecture to enable advanced level protection without any complex infrastructure requirement.
Vormetric Transparent Encryption enterprise encryption software provides data-at-rest encryption with centralized key management, privileged user access control, and detailed data access audit logging. This protects data wherever it resides, on-premises, across multiple clouds and within big data, and container environments. The deployment is user-friendly, easy, scalable and quick, with agents installed at operating file-system or device layer, and encryption and decryption are transparent to all applications that run above it. The software is designed to meet data security compliance and best practice requirements with minimal disruption, effort, and cost.
Hortonworks helps customers maintain the high levels of protection their enterprise data demands by creating centralized security administration and management into the DNA of the Hortonworks Data Platform (HDP). HDP provides an enterprise-ready data platform with rich competences spanning security, governance, and operations. By executing security at the platform level, Hortonworks ensures that security is consistently administered to any application built on top of the data platform, and makes it easier to build or retire data application without impacting security. To be consistent with its mission to develop, distribute and support 100% open-source Apache Hadoop data platform, Hortonworks immediately incorporated the XA Secure technology into the Hortonworks Data Platform (HDP), while also converting the commercial solution into an open Apache community project called Apache Ranger.
- NetFlow/IPFIX records
- URL/URI information
- SIP request information
- HTTP response codes
- DNS queries
- DHCP queries (future)
- Certificate information (future)
- Custom data (future)
Zettaset is a distribution-agnostic management platform that already delivers a robust and comprehensive enterprise-ready Big Data security suite, and automates Hadoop configuration and management. BDEncrypt Plus encryption solution is certified with the MapR Converged Data Platform, the industry’s only converged data platform that integrates the power of Hadoop and Spark with global event streaming, real-time database capabilities, and enterprise storage. With this certification, Zettaset has completed a detailed evaluation and test process with MapR Converged Data Platform, ensuring that sensitive data-in-motion and data-at-rest is protected with fine-grained, role-based access control.
The Pivotal approach to threat detection centers on cybersecurity analytics at scale. It is a data lake-centric approach, which permits Pivotal to improve its threat detection models using additional data sources most traditional security providers overlook. Along with network flows, Pivotal’s approach also merges data such as Active Directory logs, human resources data and LDAP data.