February 1, 2017 By Kathryn Zeidenstein 2 min read

IBM Security Guardium Data Protection completed its official certification for both Cloudera and Hortonworks platforms, extending its big data security capabilities by integrating more deeply with the platforms.

IBM Security Guardium Dives Deeper Into Big Data Security

The problem of big data security is not an easy one to solve. There are certainly best practices, but the actual implementation can be complex when there are multiple components and entry points to the big data lake.

Guardium was the first offering to provide rich, non-native big data security capabilities for Hadoop environments back in 2012. Since then, Guardium has continued to evolve its support to include more components, enhanced reporting and even the ability to block unauthorized traffic.

IBM Guardium Certifies New Big Data Security Capabilities

IBM Guardium Certifies New Big Data Security Capabilities

Simplify Activity Data Collection

These certifications are significant because they represent an alternative deployment model that simplifies the process and enables Guardium to support the auditing of encrypted traffic with no complex agent modifications. For both Hadoop big data platforms, Guardium is now integrating with native auditing capabilities provided by Cloudera Navigator and Hortonworks Ranger, which provide auditing on their respective platforms.

Moving the nuts-and-bolts work of data collection back to the Hadoop vendor enables organizations to easily collect Hadoop activity in the Guardium data protection platform. Guardium enhances this data by providing security-specific analytics, sophisticated reporting capabilities, compliance workflows and real-time alerting.

The Guardium platform normalizes these capabilities across the entire data landscape, including data warehouses, online transaction processing (OLTP) environments, NoSQL systems, native z/OS and even file access on both mainframe and non-mainframe environments.

Learn More at Our Tech Talks

For a technical deep dive into these new integrations, please register for our two upcoming tech talks. “Data Protection for Cloudera Hadoop Using IBM Security Guardium: A Deep Dive” will take place on Feb. 8. That will be followed by “Data Protection for Hortonworks Hadoop Using IBM Security Guardium: A Deep Dive” on Feb. 23.

More from

Cyberattack on American Water: A warning to critical infrastructure

3 min read - American Water, the largest publicly traded United States water and wastewater utility, recently experienced a cybersecurity incident that forced the company to disconnect key systems, including its customer billing platform. As the company’s investigation continues, there are growing concerns about the vulnerabilities that persist in the water sector, which has increasingly become a target for cyberattacks. The breach is a stark reminder of the critical infrastructure risks that have long plagued the industry. While the water utility has confirmed that…

What’s behind unchecked CVE proliferation, and what to do about it

4 min read - The volume of Common Vulnerabilities and Exposures (CVEs) has reached staggering levels, placing immense pressure on organizations' cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid-2024, nearly 27,500 had already been identified.Meanwhile, Coalition's 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit 34,888—a 25% increase compared to the previous year. This upward trend presents a significant challenge for organizations trying to manage vulnerabilities and mitigate potential exploits.What’s behind…

Quishing: A growing threat hiding in plain sight

4 min read - Our mobile devices go everywhere we go, and we can use them for almost anything. For businesses, the accessibility of mobile devices has also made it easier to create more interactive ways to introduce new products and services while improving user experiences across different industries. Quick-response (QR) codes are a good example of this in action and help mobile devices quickly navigate to web pages or install new software by simply scanning an image.However, legitimate organizations aren’t the only ones…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today