5 Security Requirements For Big Data Hadoop Implementations


Encryption Must Work With Access Control Technology

The encryption and the access-control technology must allow users with different credentials to have the appropriate selective access to data in the Hadoop cluster, Dataguise said. Carefully deploy encryption. Security experts say poorly implemented encryption is a huge weakness that could make the deployment meaningless.



Next Page