Protegrity expands enterprise big data protection capabilities

Protegrity released the Protegrity Data Security Platform 6.5, which expands the Protegrity Big Data Protector capabilities to include support and certification on many Apache Hadoop distributions.

In addition, the new File Protector Gateway Server provides another powerful yet flexible option for fine-grain data protection of sensitive data before it enters Hadoop or other data stores.

“Release 6.5 demonstrates Protegrity’s continued focus on centralized security management, and innovation in supporting enterprise-wide data protection. With advanced appliance clustering and infinitely scalable on-node protection capabilities to support parallel, distributed computing environments such as Hadoop and Teradata, the feature-rich flexibility of the Protegrity Data Security Platform allows companies to easily expand and control security throughout their enterprises,” said Yigal Rozenberg, Protegrity VP Products.

The Protegrity Big Data Protector has been certified to support even more distributions of Apache Hadoop, including IBM Big Insights, Pivotal, Hortonworks, Cloudera, and MapR. Utilizing strong encryption for coarse-grain file or volume protection, patent-pending Vaultless Tokenization on the node for fine-grain field level protection, and central policy control for access management, the Protegrity Big Data Protector secures all sensitive data in Hadoop from external and internal threats.

Users and business processes can continue to analyze the secure data for transformative decision-making insights, and as part of the Protegrity Data Security Platform, data is secured from the point of acquisition to deletion, across the heterogeneous enterprise.

The File Protector Gateway Server (FPGS) functions as a protected zone outside of Hadoop, or other data systems. It allows sensitive data elements in structured data files to be parsed and protected or un-protected using Protegrity Vaultless Tokenization, masking, or encryption before entering or leaving data systems. The FPGS uses a protection policy to determine the data elements to be protected/un-protected and the protection method to be used. After protecting/un-protecting data elements, the file can be moved elsewhere, to another machine, platform, or outside the enterprise, or remain in the FPGS in secure storage.

Don't miss