Comprehensive Security for the Enterprise II: Guarding the Perimeter and Controlling Access

One of the benefits of Hadoop is that it easily allows for multiple entry points both for data flow and user access. Here we discuss how Cloudera allows you to preserve the agility of having multiple entry points while also providing strong, easy to manage authentication. Additionally, we discuss how Cloudera provides unified authorization to easily control access for multiple data processing engines.

Date: Thursday, Jul 10 2014

Description

As discussed in the webinar, “Compliance-Ready Hadoop” on June 19th, there are four pillars of security that must be achieved to offer comprehensive security. Cloudera offers all four: perimeter, access, data, and visibility. In this webinar, we will focus on the pillars of perimeter and access. One of the benefits of Hadoop is that it easily allows for multiple entry points both for data flow and user access. We will discuss how Cloudera allows you to preserve the agility of having multiple entry points while also providing strong, easy to manage authentication. Additionally, we will discuss how Cloudera provides unified authorization to easily control access for multiple data processing engines.

This is a technical webinar discussing features including Kerberos and Apache Sentry.

Next Steps