5 Security Requirements For Big Data Hadoop Implementations

Encryption Must Work With Access Control Technology

The encryption and the access-control technology must allow users with different credentials to have the appropriate selective access to data in the Hadoop cluster, Dataguise said. Carefully deploy encryption. Security experts say poorly implemented encryption is a huge weakness that could make the deployment meaningless.

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.