SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
FEATURES, FUNCTIONS, ARCHITECTURE
OF BIGDATAREVEALED FOR DATA
PROTECTION, COMPLIANCE AND
DATA MANAGEMENT ESPECIALLY FOR
GDPR AND CCPA
- A SINGLE BIG DATA APPLICATION, (APACHE/HDFS, AMAZON HDFS AND AWS S3,
AND MICROSOFT AZURE) BUILT TO MANAGE BIG DATA AND ALL DATA.
- DELIVERING REPEATABLE, COLLABORATIVE, AUTOMATED, AND ACCURATE RESULTS
FOR ALL INDUSTRIES TO MEET REGULATORY COMPLIANCES SUCH AS GDPR, CCPA,
HIPAA, AND OTHERS, NOW AND THOSE THAT WILL APPEAR IN THE NEAR FUTURE.
- DATA PRIVACY AND PROTECTION USING THE LATEST TECHNOLOGIES &
LANGUAGES.
DATA PROTECTION IMPACT ASSESSMENTS – THE ABILITY TO FIRST UNDERSTAND
YOUR CORPORATE DATA ASSETS, CREATE META DATA CATALOGS TO NAVIGATE
AND REMEDIATE A COMPANIES DATA ASSETS, CREATE A CORE FOUNDATION
FOR THE REST OF DATA COMPLIANCE INCLUDING REMEDIATION AND AS
NEEDED FOR COMPLIANCE AND ANALYTICS TO AVOID REGULATORY
HEADACHES. HERE IS HOW BIGDATAREVEALED DELIVERS:
• BigDataRevealed (BDR) is delivered with an extensive pattern recognition engine
and library that users are able to augment. Contains patterns of Personal
information, Regulated Information or any pattern the company desires to search.
BDR will also search for static values such as an individual’s name, email, phone …
• Once this process has completed, BDR will display results allowing staff to
collaborate and select Remediation measures for legacy and Big Data environments
via Encryption and other security measures.
• This Information will become the core nucleus for most of the following features,
functions, and ability to deliver the mass requirements of the Regulatory world.
OUR MANY YEARS OF EXPERIENCE HAVE TAUGHT US TO NEVER INTERFERE
OR RUN LABOR INTENSIVE PROCESSES AGAINST OPERATIONAL SYSTEMS,
ESPECIALLY IF IT NEGATIVELY EFFECTS THE CUSTOMERS EXPERIENCE WITH
YOUR COMPANY. TO MINIMIZE THE IMPACT ON YOUR OPERATING SYSTEMS,
AND TO FACILITATE CERTAIN DIFFICULT REGULATORY REQUIREMENTS THAT
CANNOT BE MET ACROSS VARYING DATABASES AND OPERATING SYSTEMS,
BDR HAS ARCHITECTED AN ECOSYSTEM BUILT IN APACHE HADOOP THAT IS
QUICK TO INGEST DATA, ABLE TO ACCURATELY STORE FOLDERS AND GROUP
THEM IF DESIRED, PROTECT THE DATA WHILE INGESTING DATA STREAMS, AND
MOST IMPORTANTLY, ABLE TO DELIVER ON THE MORE DIFFICULT
REGULATORY REQUIREMENTS AND DO SO WITH MUCH GREATER ACCURACY
AND TIMELINESS.
• Metadata created above will be used to deliver Compliance results that your Company and its
Customers need.
• BDR can become the new Central Repository for your Companies complete Data Assets including;
• Legacy Data
• OCR
• Office, PDF and .pst email Data
• Biometrics Data
• And most any other forms of data
DATA PROTECTION IMPACT ASSESSMENTS – RESULTS FOR EVALUATION OF
REMEDIATIONS SUCH AS:
• Determine, by viewing Metadata, which exposed Personal Data columns
should be immediately Encrypted, Sequestered, or even eliminated.
• Allow collaboration and communication between stakeholders, data
management team members, Executive levels, DPO, ETL and others regarding
their opinions and reasons for the data to be;
• Available for production, point of sale or ongoing analytics
• If Point of Sale or Customer Service applications need to access encrypted consumers PII,
BigDataRevealed offers APIs (Spring framework) to decrypt a single customer’s data for
display and then re-encrypt any additions or changes made before updating the databases.
Your production applications are never interrupted or degraded and your database is secure.
• Only a single customer’s data is exposed during this process.
• Share and integrate the BigDataRevealed MetaData Catalog with your Companies
existing metadata systems.
OTHER IMPORTANT VALUES OF THE BIGDATAREVEALED METADATA
CATALOGS FOR THE PROTECTION OF PII IN YOUR LEGACY SYSTEMS.
• The ability of BDR Metadata to store all Files, Columns and Rows coupled with the
type of run and action performed allows for:
• The ETL, Data Management, DPO, Compliance team and others to determine what legacy
data may need to be:
• Deleted
• Encrypted
• Sequestered
• Evaluated in more detail
• Reported to Consumers that requested how their data is being used and what data of theirs you
have stored and why
• BigDataRevealed then allows these processes to be performed using its library of
200 Spring Framework API’s. These API’s can be stand alone, within operational and
production applications, or most anywhere they are needed. They are all written in
Spark / Java for flexibility, speed, scalability and again ease of use through the
Spring Framework.
OTHER IMPORTANT VALUES OF THE BIGDATAREVEALED INGESTION OF
LEGACY DATA AS WELL AS IOT AND STREAMING DATA.
• The ability of the BDR Spark Java Ingestion API, it also reads and processes IoT,
Social Media and other forms of streaming data and can:
• Determine PII Data, on the fly
• Process or notify other systems of the PII
• Determine PII through its pattern recognition and NLP Engines and based on earlier user
parameters and requests;
• Encrypt this PII data before it resides in data at rest or in other systems
• Delete this PII data if it matches a Customer that has Opted-Out
• Creates the metadata of its findings for later use
• Best determine file folder names for the files and …
• Do not allow re-inclusions of PII data into your data ecosystem for a customer that has
‘Opted-Out’. While you process IoT, Third Party data streams, or any other streams of data
assets, BDR can isolate information for these customers and keep their data from re-entering
your environment, which would be a compliance violation.
THE REASON BIGDATAREVEALED USES HBASE IS PRIMARILY FOR CONTINUAL
IOT AND STREAMING DATA TO ALLOW CONTINUAL READING OF THE
RESULTS. HDFS DOES NOT ALLOW READING OF SUCH RESULTS TILL A JOB IS
COMPLETED. WE ALSO USE HBASE FOR QUICK RESPONSE TO OUR
SUMMARIZED CHARTS, GRAPHS AND GAUGES.
• HBase adds speed and flexibility for BDR queries and drills into data for a
more granulated view.
• Hbase along with MySQL is easier for storing various summaries of our
processes and provides faster and easier retrieval, especially from third
party applications that may not read HDFS efficiently or at all.
THE ‘SEARCH CUSTOMER FEATURE’ SHOWS HOW BIGDATAREVEALED CALLS
THE SPRING FRAMEWORK API’S TO FIRST SEARCH FOR CUSTOMER DATA
STORED IN NON ENCRYPTED FORMAT. IF IT DOES NOT FIND A MATCH IT WILL
THEN FIND THE SECURED ENCRYPTION KEY, ENCRYPT THE INPUT DATA AND
SEARCH FOR THE CUSTOMER DATA USING ENCRYPTED VALUES. IF IT THEN
FINDS THE DATA, IT WILL TEMPORARILY DECRYPT THE DATA, PASS IT TO THE
OPERATIONAL SYSTEMS FOR NORMAL UNINTERRUPTED PROCESSING AND
THEN MAKE SURE THE DATA IS RE-ENCRYPTED ONCE AGAIN AND DELETE ALL
UNENCRYPTED DATA FROM MEMORY. THIS IS USEFUL AND IN MOST CASES
NECESSARY FOR CONTINUAL UNINTERRUPTED POINT OF SALE, CUSTOMER
SERVICE AND OTHER CUSTOMER RELATED OPERATIONS, PRODUCTION
SYSTEMS AND FOR DATA SCIENTISTS AND DATA MANAGEMENT PEOPLE TO
GET TEMPORARY ACCESS TO ENCRYPTED DATA AS NEEDED AND AS THEY
HAVE AUTHORITY TOO.
POINT OF SALE – WE CAN ACCEPT NON-ENCRYPTED DATA FROM A
CUSTOMER AND SEARCH FOR IT’S ENCRYPTED VALUE IN DATABASES. WE
THEN ARE ABLE TO DECRYPT THE RECORDS FOUND AND RETURN THE
INFORMATION TO THE POINT OF SALE OR CUSTOMER SERVICE APPLICATION.
AFTER VARIOUS PROCESSES HAVE BEEN RUN, SUCH AS THE DISCOVERY OF
PII, DETERMINING WHICH DATA FIELDS NEED REMEDIATION, SETTING UP
PROCESSES FOR INGESTION OF IOT AND SOCIAL MEDIA STREAMS,
BIGDATAREVEALED HAS A SYSTEM TO ASSIGN TASKS TO INDIVIDUALS AND
TO MONITOR THE PROGRESS OF THOSE TASKS VIA INTERACTIVE NOTE
GENERATION.
• The results of these tasks can be shared at the file levels within the
BigDataRevealed Metadata Catalog interface to support collaborative efforts.
• The assignee’s can request additional assistance, reject the task and even assign
the task to another individual.
BIGDATAREVEALED PROVIDES MANY TYPES OF PROCESSES THAT RUN
AGAINST A VARIETY OF DATA ASSETS AND DATA TYPES. LETS LOOK AT SOME
OF THESE.
• BigDataRevealed runs its Discovery of PII Patterns, fixed values, indirect identifiers,
encrypted data for these and many other file types of data:
• Hadoop HDFS, Hbase
• Amazon AWS S3
• Data At Rest
• Semi-Structured Data
• Streaming Data from Company, Social Media, Third parties and …
• Office Documents, PDF’s, OCR, Text, .PST email files and many others ,,,
• BigDataRevealed has it’s own OCR capability for PII Discovery and other processes.
• BigDataRevealed has its own Biometrics Engine to search for Facial Recognition,
Object Recognition, Finger Prints and much more …. Using the same open source
OpenCV as Google.
BIGDATAREVEALED PROVIDES A VARIETY OF PROCESSES THAT RUN AGAINST
A VARIETY OF DATA AND DATA TYPES. LET’S LOOK AT SOME OF THESE RUN
PROCESSES:
• BigDataRevealed runs its Discovery of PII Patterns and fixed values
• BigDataRevealed run a process called Quick Business Classification that:
• Identifies all User Selected PII Patterns and lists for each Column in the File:
• How may times and what percentage of a file’s columns contained each of the Discovered
Patterns.
• Allows the User to Drill down into the data to the HDFS system Single source of record to view
the surrounding data to identify the context of the PII and how it is used and if it is a false
positive or not
• Data Discovery Delivers
• See Next Page
BIGDATAREVEALED PROVIDES A VARIETY OF PROCESSES THAT RUN AGAINST
A VARIETY OF DATA AND DATA TYPES. LET’S LOOK AT SOME OF THESE RUN
PROCESSES:
• Data Discovery Delivers:
• Stores a list of all the unique data patterns and values in a file
• Allows for the other processes to have the information needed to accurately drill to the system source of record
• Show various data profiling stats such as;
• Duplicates
• Zeros/nulls
• Percentage of the file containing each pattern
• Minimum, Maximum and average of numeric values and …
• Outlier Discovery
• Based on the mean and average values of numeric data:
• Find within the user selected ranges what values are considered Outliers for:
• Anti Money Laundering
• Parts about to break down
• ….
• Indirect identifiers – See next page
BIGDATAREVEALED PROVIDES A VARIETY OF PROCESSES THAT RUN AGAINST
A VARIETY OF DATA AND DATA TYPES. LET’S LOOK AT SOME OF THESE RUN
PROCESSES:
• Indirect identifiers:
• BDR discovers groups of fields that by themselves do not identify an individual, or very small
group of individuals, but when grouped together will identify a person or small group of
people. Such as Zip Code, Date of Birth and Gender…
• Processing, Discovery and Searching of .PST Outlook email files:
• Drill and search the results after Pattern or Value discovery
• Search the same for and view the same for email attachments
• ….
BIGDATAREVEALED ALLOWS FOR THE USERS TO EASILY SETUP AND RUN ALL
THE AVAILABLE PROCESSES THAT HAVE BEEN DISCUSSED IN THIS
POWERPOINT. THE USERS CAN ALSO;
• Add to, or modify the pattern search library
• Add any values they desire to be searched for, particularly to process a Citizens Right of
Erasure request (Right to be forgotten).
• The ability to download and view the BigDataRevealed Metadata Catalogues, or to
disseminate to others and integrate into other metadata tools.
• Use the Data Scientists Workbench or the new more executive style dashboard
• …
BIGDATAREVEALED OFFERS A MEANS FOR CITIZENS TO CREATE THEIR OWN
NEW AND UNIQUE IDENTITIES FOR THE PURPOSE OF INTERACTIVE REQUEST
PROCESSING:
• Request to delete, add or modify Consent of the use of the Citizens PII
• Request the Citizens Right of Erasure
• Request one of the many Regulatory Rights of Citizens found in both GDPR and CCPA
such as;
• What data of mine do you have
• How are you using my data
• To whom have you disclosed my data
• Allow for bilateral communications between the Citizen and the Company
• Using the Citizens PII submitted with their request, BDR automates the Discovery process of
their PII and thereby expedites the entire process.
• …
BIGDATAREVEALED OFFERS A MEANS FOR CITIZENS TO CREATE THEIR OWN
NEW AND UNIQUE IDENTITIES FOR THE PURPOSE OF INTERACTIVE REQUEST
PROCESSING:
• Allow a Company to build a central processing site for all Citizens and companies to
communicate and fulfill required Regulations. Thereby making it easier for the Citizen to
make requests of many companies, and for many companies to have one location to pick
up all their Citizen requests.
• Reach us at 847-440-4439

Más contenido relacionado

La actualidad más candente

Data Marketplace - Rethink the Data
Data Marketplace - Rethink the DataData Marketplace - Rethink the Data
Data Marketplace - Rethink the DataDenodo
 
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...Denodo
 
The Value of the Modern Data Architecture with Apache Hadoop and Teradata
The Value of the Modern Data Architecture with Apache Hadoop and Teradata The Value of the Modern Data Architecture with Apache Hadoop and Teradata
The Value of the Modern Data Architecture with Apache Hadoop and Teradata Hortonworks
 
XA Secure | Whitepaper on data security within Hadoop
XA Secure | Whitepaper on data security within HadoopXA Secure | Whitepaper on data security within Hadoop
XA Secure | Whitepaper on data security within Hadoopbalajiganesan03
 
Big Data Week 2016 - Worldpay - Deploying Secure Clusters
Big Data Week 2016  - Worldpay - Deploying Secure ClustersBig Data Week 2016  - Worldpay - Deploying Secure Clusters
Big Data Week 2016 - Worldpay - Deploying Secure ClustersDavid Walker
 
Microsoft SQL Azure - Scaling Out with SQL Azure Whitepaper
Microsoft SQL Azure - Scaling Out with SQL Azure WhitepaperMicrosoft SQL Azure - Scaling Out with SQL Azure Whitepaper
Microsoft SQL Azure - Scaling Out with SQL Azure WhitepaperMicrosoft Private Cloud
 
Understanding Metadata: Why it's essential to your big data solution and how ...
Understanding Metadata: Why it's essential to your big data solution and how ...Understanding Metadata: Why it's essential to your big data solution and how ...
Understanding Metadata: Why it's essential to your big data solution and how ...Zaloni
 
Open Development
Open DevelopmentOpen Development
Open DevelopmentMedsphere
 
Data Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data ArchitectureData Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data ArchitectureZaloni
 
Big Data and Data Virtualization
Big Data and Data VirtualizationBig Data and Data Virtualization
Big Data and Data VirtualizationKenneth Peeples
 
Webinar - Risky Business: How to Balance Innovation & Risk in Big Data
Webinar - Risky Business: How to Balance Innovation & Risk in Big DataWebinar - Risky Business: How to Balance Innovation & Risk in Big Data
Webinar - Risky Business: How to Balance Innovation & Risk in Big DataZaloni
 
Webinar -Data Warehouse Augmentation: Cut Costs, Increase Power
Webinar -Data Warehouse Augmentation: Cut Costs, Increase PowerWebinar -Data Warehouse Augmentation: Cut Costs, Increase Power
Webinar -Data Warehouse Augmentation: Cut Costs, Increase PowerZaloni
 
Data Services Marketplace
Data Services MarketplaceData Services Marketplace
Data Services MarketplaceDenodo
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...emermell
 
How Real TIme Data Changes the Data Warehouse
How Real TIme Data Changes the Data WarehouseHow Real TIme Data Changes the Data Warehouse
How Real TIme Data Changes the Data Warehousemark madsen
 
Enterprise Archiving with Apache Hadoop Featuring the 2015 Gartner Magic Quad...
Enterprise Archiving with Apache Hadoop Featuring the 2015 Gartner Magic Quad...Enterprise Archiving with Apache Hadoop Featuring the 2015 Gartner Magic Quad...
Enterprise Archiving with Apache Hadoop Featuring the 2015 Gartner Magic Quad...LindaWatson19
 
Pervasive analytics through data & analytic centricity
Pervasive analytics through data & analytic centricityPervasive analytics through data & analytic centricity
Pervasive analytics through data & analytic centricityCloudera, Inc.
 

La actualidad más candente (20)

Datalake Architecture
Datalake ArchitectureDatalake Architecture
Datalake Architecture
 
Data Marketplace - Rethink the Data
Data Marketplace - Rethink the DataData Marketplace - Rethink the Data
Data Marketplace - Rethink the Data
 
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
Why a Data Services Marketplace is Critical for a Successful Data-Driven Ente...
 
The Value of the Modern Data Architecture with Apache Hadoop and Teradata
The Value of the Modern Data Architecture with Apache Hadoop and Teradata The Value of the Modern Data Architecture with Apache Hadoop and Teradata
The Value of the Modern Data Architecture with Apache Hadoop and Teradata
 
XA Secure | Whitepaper on data security within Hadoop
XA Secure | Whitepaper on data security within HadoopXA Secure | Whitepaper on data security within Hadoop
XA Secure | Whitepaper on data security within Hadoop
 
Big Data Week 2016 - Worldpay - Deploying Secure Clusters
Big Data Week 2016  - Worldpay - Deploying Secure ClustersBig Data Week 2016  - Worldpay - Deploying Secure Clusters
Big Data Week 2016 - Worldpay - Deploying Secure Clusters
 
Microsoft SQL Azure - Scaling Out with SQL Azure Whitepaper
Microsoft SQL Azure - Scaling Out with SQL Azure WhitepaperMicrosoft SQL Azure - Scaling Out with SQL Azure Whitepaper
Microsoft SQL Azure - Scaling Out with SQL Azure Whitepaper
 
Understanding Metadata: Why it's essential to your big data solution and how ...
Understanding Metadata: Why it's essential to your big data solution and how ...Understanding Metadata: Why it's essential to your big data solution and how ...
Understanding Metadata: Why it's essential to your big data solution and how ...
 
Open Development
Open DevelopmentOpen Development
Open Development
 
Data Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data ArchitectureData Lakes - The Key to a Scalable Data Architecture
Data Lakes - The Key to a Scalable Data Architecture
 
Big Data and Data Virtualization
Big Data and Data VirtualizationBig Data and Data Virtualization
Big Data and Data Virtualization
 
Data Lake,beyond the Data Warehouse
Data Lake,beyond the Data WarehouseData Lake,beyond the Data Warehouse
Data Lake,beyond the Data Warehouse
 
Webinar - Risky Business: How to Balance Innovation & Risk in Big Data
Webinar - Risky Business: How to Balance Innovation & Risk in Big DataWebinar - Risky Business: How to Balance Innovation & Risk in Big Data
Webinar - Risky Business: How to Balance Innovation & Risk in Big Data
 
Webinar -Data Warehouse Augmentation: Cut Costs, Increase Power
Webinar -Data Warehouse Augmentation: Cut Costs, Increase PowerWebinar -Data Warehouse Augmentation: Cut Costs, Increase Power
Webinar -Data Warehouse Augmentation: Cut Costs, Increase Power
 
Data Services Marketplace
Data Services MarketplaceData Services Marketplace
Data Services Marketplace
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
 
How Real TIme Data Changes the Data Warehouse
How Real TIme Data Changes the Data WarehouseHow Real TIme Data Changes the Data Warehouse
How Real TIme Data Changes the Data Warehouse
 
Big Data Security and Governance
Big Data Security and GovernanceBig Data Security and Governance
Big Data Security and Governance
 
Enterprise Archiving with Apache Hadoop Featuring the 2015 Gartner Magic Quad...
Enterprise Archiving with Apache Hadoop Featuring the 2015 Gartner Magic Quad...Enterprise Archiving with Apache Hadoop Featuring the 2015 Gartner Magic Quad...
Enterprise Archiving with Apache Hadoop Featuring the 2015 Gartner Magic Quad...
 
Pervasive analytics through data & analytic centricity
Pervasive analytics through data & analytic centricityPervasive analytics through data & analytic centricity
Pervasive analytics through data & analytic centricity
 

Similar a Gdpr ccpa automated compliance - spark java application features and functions of -- big datarevealed april version 3.5

Lecture4 big data technology foundations
Lecture4 big data technology foundationsLecture4 big data technology foundations
Lecture4 big data technology foundationshktripathy
 
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization Denodo
 
Intro to big data and applications -day 3
Intro to big data and applications -day 3Intro to big data and applications -day 3
Intro to big data and applications -day 3Parviz Vakili
 
Data Fabric - Why Should Organizations Implement a Logical and Not a Physical...
Data Fabric - Why Should Organizations Implement a Logical and Not a Physical...Data Fabric - Why Should Organizations Implement a Logical and Not a Physical...
Data Fabric - Why Should Organizations Implement a Logical and Not a Physical...Denodo
 
Intro to Data Science on Hadoop
Intro to Data Science on HadoopIntro to Data Science on Hadoop
Intro to Data Science on HadoopCaserta
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Steven Meister
 
Hadoop-based architecture approaches
Hadoop-based architecture approachesHadoop-based architecture approaches
Hadoop-based architecture approachesMiraj Godha
 
The CIO guide to Big Data Archiving
The CIO guide to Big Data ArchivingThe CIO guide to Big Data Archiving
The CIO guide to Big Data ArchivingLindaWatson19
 
New Innovations in Information Management for Big Data - Smarter Business 2013
New Innovations in Information Management for Big Data - Smarter Business 2013New Innovations in Information Management for Big Data - Smarter Business 2013
New Innovations in Information Management for Big Data - Smarter Business 2013IBM Sverige
 
Defining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business EnvironmentDefining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business EnvironmentCaserta
 
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...Steven Meister
 
Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!Jeffrey T. Pollock
 
Big-Data-Analytics.8592259.powerpoint.pdf
Big-Data-Analytics.8592259.powerpoint.pdfBig-Data-Analytics.8592259.powerpoint.pdf
Big-Data-Analytics.8592259.powerpoint.pdfrajsharma159890
 
Traditional BI vs. Business Data Lake – A Comparison
Traditional BI vs. Business Data Lake – A ComparisonTraditional BI vs. Business Data Lake – A Comparison
Traditional BI vs. Business Data Lake – A ComparisonCapgemini
 
What's New in Pentaho 7.0?
What's New in Pentaho 7.0?What's New in Pentaho 7.0?
What's New in Pentaho 7.0?Xpand IT
 

Similar a Gdpr ccpa automated compliance - spark java application features and functions of -- big datarevealed april version 3.5 (20)

Lecture4 big data technology foundations
Lecture4 big data technology foundationsLecture4 big data technology foundations
Lecture4 big data technology foundations
 
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization
DAMA & Denodo Webinar: Modernizing Data Architecture Using Data Virtualization
 
Intro to big data and applications -day 3
Intro to big data and applications -day 3Intro to big data and applications -day 3
Intro to big data and applications -day 3
 
Data Fabric - Why Should Organizations Implement a Logical and Not a Physical...
Data Fabric - Why Should Organizations Implement a Logical and Not a Physical...Data Fabric - Why Should Organizations Implement a Logical and Not a Physical...
Data Fabric - Why Should Organizations Implement a Logical and Not a Physical...
 
Big data
Big dataBig data
Big data
 
Intro to Data Science on Hadoop
Intro to Data Science on HadoopIntro to Data Science on Hadoop
Intro to Data Science on Hadoop
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
 
Hadoop-based architecture approaches
Hadoop-based architecture approachesHadoop-based architecture approaches
Hadoop-based architecture approaches
 
The CIO guide to Big Data Archiving
The CIO guide to Big Data ArchivingThe CIO guide to Big Data Archiving
The CIO guide to Big Data Archiving
 
New Innovations in Information Management for Big Data - Smarter Business 2013
New Innovations in Information Management for Big Data - Smarter Business 2013New Innovations in Information Management for Big Data - Smarter Business 2013
New Innovations in Information Management for Big Data - Smarter Business 2013
 
Defining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business EnvironmentDefining and Applying Data Governance in Today’s Business Environment
Defining and Applying Data Governance in Today’s Business Environment
 
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
 
Big data architecture
Big data architectureBig data architecture
Big data architecture
 
Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!
 
Big-Data-Analytics.8592259.powerpoint.pdf
Big-Data-Analytics.8592259.powerpoint.pdfBig-Data-Analytics.8592259.powerpoint.pdf
Big-Data-Analytics.8592259.powerpoint.pdf
 
big_data.ppt
big_data.pptbig_data.ppt
big_data.ppt
 
big_data.ppt
big_data.pptbig_data.ppt
big_data.ppt
 
big_data.ppt
big_data.pptbig_data.ppt
big_data.ppt
 
Traditional BI vs. Business Data Lake – A Comparison
Traditional BI vs. Business Data Lake – A ComparisonTraditional BI vs. Business Data Lake – A Comparison
Traditional BI vs. Business Data Lake – A Comparison
 
What's New in Pentaho 7.0?
What's New in Pentaho 7.0?What's New in Pentaho 7.0?
What's New in Pentaho 7.0?
 

Más de Steven Meister

Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...
Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...
Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...Steven Meister
 
Gdpr, analytics, big data compliance beta
Gdpr, analytics, big data compliance betaGdpr, analytics, big data compliance beta
Gdpr, analytics, big data compliance betaSteven Meister
 
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...Steven Meister
 
Privacy assurance initiative
Privacy assurance initiativePrivacy assurance initiative
Privacy assurance initiativeSteven Meister
 
GDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and EvaluationGDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and EvaluationSteven Meister
 
Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...
Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...
Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...Steven Meister
 
I have listed 3 informative youtube videos on the eu gdpr
I have listed 3 informative youtube videos on the eu gdprI have listed 3 informative youtube videos on the eu gdpr
I have listed 3 informative youtube videos on the eu gdprSteven Meister
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesSteven Meister
 
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...Steven Meister
 
Big datarevealed hadoop catalog
Big datarevealed hadoop catalogBig datarevealed hadoop catalog
Big datarevealed hadoop catalogSteven Meister
 

Más de Steven Meister (10)

Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...
Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...
Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...
 
Gdpr, analytics, big data compliance beta
Gdpr, analytics, big data compliance betaGdpr, analytics, big data compliance beta
Gdpr, analytics, big data compliance beta
 
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
Steven Meister GDPR and Regulatory Compliance and Big Data Excelerator Profes...
 
Privacy assurance initiative
Privacy assurance initiativePrivacy assurance initiative
Privacy assurance initiative
 
GDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and EvaluationGDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and Evaluation
 
Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...
Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...
Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...
 
I have listed 3 informative youtube videos on the eu gdpr
I have listed 3 informative youtube videos on the eu gdprI have listed 3 informative youtube videos on the eu gdpr
I have listed 3 informative youtube videos on the eu gdpr
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficulties
 
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...
 
Big datarevealed hadoop catalog
Big datarevealed hadoop catalogBig datarevealed hadoop catalog
Big datarevealed hadoop catalog
 

Último

While-For-loop in python used in college
While-For-loop in python used in collegeWhile-For-loop in python used in college
While-For-loop in python used in collegessuser7a7cd61
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our WorldEduminds Learning
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptxNLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptxBoston Institute of Analytics
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)jennyeacort
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...GQ Research
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSINGmarianagonzalez07
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...ssuserf63bd7
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhijennyeacort
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...limedy534
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfgstagge
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfchwongval
 
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理e4aez8ss
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 

Último (20)

While-For-loop in python used in college
While-For-loop in python used in collegeWhile-For-loop in python used in college
While-For-loop in python used in college
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our World
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptxNLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
NLP Project PPT: Flipkart Product Reviews through NLP Data Science.pptx
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
 
RadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdfRadioAdProWritingCinderellabyButleri.pdf
RadioAdProWritingCinderellabyButleri.pdf
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdf
 
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 

Gdpr ccpa automated compliance - spark java application features and functions of -- big datarevealed april version 3.5

  • 1. FEATURES, FUNCTIONS, ARCHITECTURE OF BIGDATAREVEALED FOR DATA PROTECTION, COMPLIANCE AND DATA MANAGEMENT ESPECIALLY FOR GDPR AND CCPA - A SINGLE BIG DATA APPLICATION, (APACHE/HDFS, AMAZON HDFS AND AWS S3, AND MICROSOFT AZURE) BUILT TO MANAGE BIG DATA AND ALL DATA. - DELIVERING REPEATABLE, COLLABORATIVE, AUTOMATED, AND ACCURATE RESULTS FOR ALL INDUSTRIES TO MEET REGULATORY COMPLIANCES SUCH AS GDPR, CCPA, HIPAA, AND OTHERS, NOW AND THOSE THAT WILL APPEAR IN THE NEAR FUTURE. - DATA PRIVACY AND PROTECTION USING THE LATEST TECHNOLOGIES & LANGUAGES.
  • 2. DATA PROTECTION IMPACT ASSESSMENTS – THE ABILITY TO FIRST UNDERSTAND YOUR CORPORATE DATA ASSETS, CREATE META DATA CATALOGS TO NAVIGATE AND REMEDIATE A COMPANIES DATA ASSETS, CREATE A CORE FOUNDATION FOR THE REST OF DATA COMPLIANCE INCLUDING REMEDIATION AND AS NEEDED FOR COMPLIANCE AND ANALYTICS TO AVOID REGULATORY HEADACHES. HERE IS HOW BIGDATAREVEALED DELIVERS: • BigDataRevealed (BDR) is delivered with an extensive pattern recognition engine and library that users are able to augment. Contains patterns of Personal information, Regulated Information or any pattern the company desires to search. BDR will also search for static values such as an individual’s name, email, phone … • Once this process has completed, BDR will display results allowing staff to collaborate and select Remediation measures for legacy and Big Data environments via Encryption and other security measures. • This Information will become the core nucleus for most of the following features, functions, and ability to deliver the mass requirements of the Regulatory world.
  • 3. OUR MANY YEARS OF EXPERIENCE HAVE TAUGHT US TO NEVER INTERFERE OR RUN LABOR INTENSIVE PROCESSES AGAINST OPERATIONAL SYSTEMS, ESPECIALLY IF IT NEGATIVELY EFFECTS THE CUSTOMERS EXPERIENCE WITH YOUR COMPANY. TO MINIMIZE THE IMPACT ON YOUR OPERATING SYSTEMS, AND TO FACILITATE CERTAIN DIFFICULT REGULATORY REQUIREMENTS THAT CANNOT BE MET ACROSS VARYING DATABASES AND OPERATING SYSTEMS, BDR HAS ARCHITECTED AN ECOSYSTEM BUILT IN APACHE HADOOP THAT IS QUICK TO INGEST DATA, ABLE TO ACCURATELY STORE FOLDERS AND GROUP THEM IF DESIRED, PROTECT THE DATA WHILE INGESTING DATA STREAMS, AND MOST IMPORTANTLY, ABLE TO DELIVER ON THE MORE DIFFICULT REGULATORY REQUIREMENTS AND DO SO WITH MUCH GREATER ACCURACY AND TIMELINESS. • Metadata created above will be used to deliver Compliance results that your Company and its Customers need. • BDR can become the new Central Repository for your Companies complete Data Assets including; • Legacy Data • OCR • Office, PDF and .pst email Data • Biometrics Data • And most any other forms of data
  • 4. DATA PROTECTION IMPACT ASSESSMENTS – RESULTS FOR EVALUATION OF REMEDIATIONS SUCH AS: • Determine, by viewing Metadata, which exposed Personal Data columns should be immediately Encrypted, Sequestered, or even eliminated. • Allow collaboration and communication between stakeholders, data management team members, Executive levels, DPO, ETL and others regarding their opinions and reasons for the data to be; • Available for production, point of sale or ongoing analytics • If Point of Sale or Customer Service applications need to access encrypted consumers PII, BigDataRevealed offers APIs (Spring framework) to decrypt a single customer’s data for display and then re-encrypt any additions or changes made before updating the databases. Your production applications are never interrupted or degraded and your database is secure. • Only a single customer’s data is exposed during this process. • Share and integrate the BigDataRevealed MetaData Catalog with your Companies existing metadata systems.
  • 5. OTHER IMPORTANT VALUES OF THE BIGDATAREVEALED METADATA CATALOGS FOR THE PROTECTION OF PII IN YOUR LEGACY SYSTEMS. • The ability of BDR Metadata to store all Files, Columns and Rows coupled with the type of run and action performed allows for: • The ETL, Data Management, DPO, Compliance team and others to determine what legacy data may need to be: • Deleted • Encrypted • Sequestered • Evaluated in more detail • Reported to Consumers that requested how their data is being used and what data of theirs you have stored and why • BigDataRevealed then allows these processes to be performed using its library of 200 Spring Framework API’s. These API’s can be stand alone, within operational and production applications, or most anywhere they are needed. They are all written in Spark / Java for flexibility, speed, scalability and again ease of use through the Spring Framework.
  • 6. OTHER IMPORTANT VALUES OF THE BIGDATAREVEALED INGESTION OF LEGACY DATA AS WELL AS IOT AND STREAMING DATA. • The ability of the BDR Spark Java Ingestion API, it also reads and processes IoT, Social Media and other forms of streaming data and can: • Determine PII Data, on the fly • Process or notify other systems of the PII • Determine PII through its pattern recognition and NLP Engines and based on earlier user parameters and requests; • Encrypt this PII data before it resides in data at rest or in other systems • Delete this PII data if it matches a Customer that has Opted-Out • Creates the metadata of its findings for later use • Best determine file folder names for the files and … • Do not allow re-inclusions of PII data into your data ecosystem for a customer that has ‘Opted-Out’. While you process IoT, Third Party data streams, or any other streams of data assets, BDR can isolate information for these customers and keep their data from re-entering your environment, which would be a compliance violation.
  • 7. THE REASON BIGDATAREVEALED USES HBASE IS PRIMARILY FOR CONTINUAL IOT AND STREAMING DATA TO ALLOW CONTINUAL READING OF THE RESULTS. HDFS DOES NOT ALLOW READING OF SUCH RESULTS TILL A JOB IS COMPLETED. WE ALSO USE HBASE FOR QUICK RESPONSE TO OUR SUMMARIZED CHARTS, GRAPHS AND GAUGES. • HBase adds speed and flexibility for BDR queries and drills into data for a more granulated view. • Hbase along with MySQL is easier for storing various summaries of our processes and provides faster and easier retrieval, especially from third party applications that may not read HDFS efficiently or at all.
  • 8. THE ‘SEARCH CUSTOMER FEATURE’ SHOWS HOW BIGDATAREVEALED CALLS THE SPRING FRAMEWORK API’S TO FIRST SEARCH FOR CUSTOMER DATA STORED IN NON ENCRYPTED FORMAT. IF IT DOES NOT FIND A MATCH IT WILL THEN FIND THE SECURED ENCRYPTION KEY, ENCRYPT THE INPUT DATA AND SEARCH FOR THE CUSTOMER DATA USING ENCRYPTED VALUES. IF IT THEN FINDS THE DATA, IT WILL TEMPORARILY DECRYPT THE DATA, PASS IT TO THE OPERATIONAL SYSTEMS FOR NORMAL UNINTERRUPTED PROCESSING AND THEN MAKE SURE THE DATA IS RE-ENCRYPTED ONCE AGAIN AND DELETE ALL UNENCRYPTED DATA FROM MEMORY. THIS IS USEFUL AND IN MOST CASES NECESSARY FOR CONTINUAL UNINTERRUPTED POINT OF SALE, CUSTOMER SERVICE AND OTHER CUSTOMER RELATED OPERATIONS, PRODUCTION SYSTEMS AND FOR DATA SCIENTISTS AND DATA MANAGEMENT PEOPLE TO GET TEMPORARY ACCESS TO ENCRYPTED DATA AS NEEDED AND AS THEY HAVE AUTHORITY TOO. POINT OF SALE – WE CAN ACCEPT NON-ENCRYPTED DATA FROM A CUSTOMER AND SEARCH FOR IT’S ENCRYPTED VALUE IN DATABASES. WE THEN ARE ABLE TO DECRYPT THE RECORDS FOUND AND RETURN THE INFORMATION TO THE POINT OF SALE OR CUSTOMER SERVICE APPLICATION.
  • 9. AFTER VARIOUS PROCESSES HAVE BEEN RUN, SUCH AS THE DISCOVERY OF PII, DETERMINING WHICH DATA FIELDS NEED REMEDIATION, SETTING UP PROCESSES FOR INGESTION OF IOT AND SOCIAL MEDIA STREAMS, BIGDATAREVEALED HAS A SYSTEM TO ASSIGN TASKS TO INDIVIDUALS AND TO MONITOR THE PROGRESS OF THOSE TASKS VIA INTERACTIVE NOTE GENERATION. • The results of these tasks can be shared at the file levels within the BigDataRevealed Metadata Catalog interface to support collaborative efforts. • The assignee’s can request additional assistance, reject the task and even assign the task to another individual.
  • 10. BIGDATAREVEALED PROVIDES MANY TYPES OF PROCESSES THAT RUN AGAINST A VARIETY OF DATA ASSETS AND DATA TYPES. LETS LOOK AT SOME OF THESE. • BigDataRevealed runs its Discovery of PII Patterns, fixed values, indirect identifiers, encrypted data for these and many other file types of data: • Hadoop HDFS, Hbase • Amazon AWS S3 • Data At Rest • Semi-Structured Data • Streaming Data from Company, Social Media, Third parties and … • Office Documents, PDF’s, OCR, Text, .PST email files and many others ,,, • BigDataRevealed has it’s own OCR capability for PII Discovery and other processes. • BigDataRevealed has its own Biometrics Engine to search for Facial Recognition, Object Recognition, Finger Prints and much more …. Using the same open source OpenCV as Google.
  • 11. BIGDATAREVEALED PROVIDES A VARIETY OF PROCESSES THAT RUN AGAINST A VARIETY OF DATA AND DATA TYPES. LET’S LOOK AT SOME OF THESE RUN PROCESSES: • BigDataRevealed runs its Discovery of PII Patterns and fixed values • BigDataRevealed run a process called Quick Business Classification that: • Identifies all User Selected PII Patterns and lists for each Column in the File: • How may times and what percentage of a file’s columns contained each of the Discovered Patterns. • Allows the User to Drill down into the data to the HDFS system Single source of record to view the surrounding data to identify the context of the PII and how it is used and if it is a false positive or not • Data Discovery Delivers • See Next Page
  • 12. BIGDATAREVEALED PROVIDES A VARIETY OF PROCESSES THAT RUN AGAINST A VARIETY OF DATA AND DATA TYPES. LET’S LOOK AT SOME OF THESE RUN PROCESSES: • Data Discovery Delivers: • Stores a list of all the unique data patterns and values in a file • Allows for the other processes to have the information needed to accurately drill to the system source of record • Show various data profiling stats such as; • Duplicates • Zeros/nulls • Percentage of the file containing each pattern • Minimum, Maximum and average of numeric values and … • Outlier Discovery • Based on the mean and average values of numeric data: • Find within the user selected ranges what values are considered Outliers for: • Anti Money Laundering • Parts about to break down • …. • Indirect identifiers – See next page
  • 13. BIGDATAREVEALED PROVIDES A VARIETY OF PROCESSES THAT RUN AGAINST A VARIETY OF DATA AND DATA TYPES. LET’S LOOK AT SOME OF THESE RUN PROCESSES: • Indirect identifiers: • BDR discovers groups of fields that by themselves do not identify an individual, or very small group of individuals, but when grouped together will identify a person or small group of people. Such as Zip Code, Date of Birth and Gender… • Processing, Discovery and Searching of .PST Outlook email files: • Drill and search the results after Pattern or Value discovery • Search the same for and view the same for email attachments • ….
  • 14. BIGDATAREVEALED ALLOWS FOR THE USERS TO EASILY SETUP AND RUN ALL THE AVAILABLE PROCESSES THAT HAVE BEEN DISCUSSED IN THIS POWERPOINT. THE USERS CAN ALSO; • Add to, or modify the pattern search library • Add any values they desire to be searched for, particularly to process a Citizens Right of Erasure request (Right to be forgotten). • The ability to download and view the BigDataRevealed Metadata Catalogues, or to disseminate to others and integrate into other metadata tools. • Use the Data Scientists Workbench or the new more executive style dashboard • …
  • 15. BIGDATAREVEALED OFFERS A MEANS FOR CITIZENS TO CREATE THEIR OWN NEW AND UNIQUE IDENTITIES FOR THE PURPOSE OF INTERACTIVE REQUEST PROCESSING: • Request to delete, add or modify Consent of the use of the Citizens PII • Request the Citizens Right of Erasure • Request one of the many Regulatory Rights of Citizens found in both GDPR and CCPA such as; • What data of mine do you have • How are you using my data • To whom have you disclosed my data • Allow for bilateral communications between the Citizen and the Company • Using the Citizens PII submitted with their request, BDR automates the Discovery process of their PII and thereby expedites the entire process. • …
  • 16. BIGDATAREVEALED OFFERS A MEANS FOR CITIZENS TO CREATE THEIR OWN NEW AND UNIQUE IDENTITIES FOR THE PURPOSE OF INTERACTIVE REQUEST PROCESSING: • Allow a Company to build a central processing site for all Citizens and companies to communicate and fulfill required Regulations. Thereby making it easier for the Citizen to make requests of many companies, and for many companies to have one location to pick up all their Citizen requests. • Reach us at 847-440-4439