SlideShare una empresa de Scribd logo
1 de 31
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 1
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Outline
2
• Introduction and Context
– Key requirements for data security in Predix
– Managing data rights across platforms
• Principles applied (BlueTalon + Predix Team)
1. Bring business context to policies
2. Distribute enforcement, centralize policy decisions
3. Get visibility over data activities and actions requested
• How BlueTalon Works
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Predix: PaaS for the Industrial Internet
3
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 4
Authorization
Encryption
Authentication
Auditing
Masking
Security within PaaS for the Industrial Internet
Data
Network
Application
Endpoint
IaaS
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
BlueTalon: Data-Centric Security on Predix PaaS
5
Cloud
management
Edge
enforcement
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
6
• Security applied one system at a time
– Inconsistency, duplication, chaos
• Security applied with a central policy
– Consistency, efficiency, simplicity
BlueTalon: Data-Centric Security Across Data Platforms
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Security and Regulatory Trends that Affect Industrial Businesses
EAR violations criminal fines increased in excess of 5,000% YTY in 2014 and almost
1,000% in administrative penalties (Source: US DOC BIS)
Enforcement is on the Rise
ITAR violation risks
• Significant Accrual of Fines
• Denial of Export Privileges
• Mandatory Increase in Staffing
• Regular External Audits
• Loss of, or Completely Damaged, Public Reputation
Due to Facebook European Privacy Violations and NSA practices on Oct 6, 2015
European Court of Justice declares Safe Harbor invalid
Facebook is facing daily fines of €250,000 in Belgium after a data protection
court ruling for illegally tracking data from non members
Results of the 2013 Data Breach
• CEO steps down
• 46% drop in profits due to reputational damage
with $1.47 negative affect on EPS
• $100M Cost to upgrade affected systems
• 2014 SEC filing – Total expenses $252M
• On going settlement costs
Fines are Higher
Data Breaches Affect the Bottom Line
5
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Data Security Requirements in Predix
1. Data owners and regulatory entities define policies of use
- Definition of policies must be owned by business stakeholders
2. Automated enforcement of policies across data platforms
- Policies managed by business owners must be enforceable independent of data platform
- Enforcement of these policies must be demonstrable to auditors
- Enforcement must distributed and consistent
3. Preserving end user experience is paramount
- End users of the data must be able to use any tool they want
- Policy management processes/applications must be focused on business users
8
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Outline
9
• Introduction and Context
– Key requirements for data security in Predix
– Managing data rights across platforms
• Principles applied (BlueTalon + Predix Team)
1. Bring business context to policies
2. Distribute enforcement, centralize policy decisions
3. Get visibility over data activities and actions requested
• How BlueTalon Works
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
[1] Policies are Defined by Business within a Context
 “Patient information and exams are sensitive data”
 “Our contracts prohibit the use of machine diagnostics data
to redesign products”
 “Service managers should be able to see only their fleet data”
10
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
[1] Policies Applied at the Data Layer Enables Business
 Blocking
 Enabling
11
 “Patient information and exams are sensitive data”
 “Our contracts prohibit the use of customer data outside west coast”
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
[1] Controlling Access for Different Users & Needs
Row filtering
Field level
Cell level
Sub-cell level masking
12
Joyce looks up
her data
Her manager looks
up Joyce’s data
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
[1] Example of Controls Directly Applied On Data
• Access to client account is conditional, based on zipcode
• Data is partially masked
Results
Rules on Data
13
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
[1] Attributes Bring Context to Policies
type
location
title / role
group
function
clearance level
LOB
user session
location
timestamp
application
connection type
data
sensitivity
clearance required
action requested
# of rows returned
data source
• Context helps assess whether the data request is legitimate
14
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Outline
15
• Introduction and Context
– Key requirements for data security in Predix
– Managing data rights across platforms
• Principles applied (BlueTalon + Predix Team)
1. Bring business context to policies
2. Distribute enforcement, centralize policy decisions
3. Get visibility over data activities and actions requested
• How BlueTalon Works
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
[2] Why Centralizing Policy Decisions, Distributing Enforcement?
• IoT Platforms and Predix are hybrid environments that make
use of multiple modern data management platforms:
– RDBMS
– Hadoop
– Spark
– Cassandra
– Cloud repositories
16
Cloud On-prem
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
[2] Centralize Decisions to Manage Polices from One Place
17
 Authorization — what a user or a role can do with the data
 Decision — against all rules, can a user see a data element
 Enforcement — apply the decision at the time of user’s request
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Example from Spark on Edge with BlueTalon on Predix
18
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Outline
19
• Introduction and Context
– Key requirements for data security in Predix
– Managing data rights across platforms
• Principles applied (BlueTalon + Predix Team)
1. Bring business context to policies
2. Distribute enforcement, centralize policy decisions
3. Get visibility over data activities and actions requested
• How BlueTalon Works
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 20
[3] Visibility Leverage the Same Enforcement Points
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Visibility into Data Activity
• Complete audit trail of data usage with contextual information
• Key to detection of unusual data access patterns
• Tracks policy changes to ensure compliance
What policy
was triggered
Original and
modified queriesWhat they
tried to do
21
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Feedback Loop with Visibility and Control
22
DATADataVisibility Control
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 23
Examples of Data Security Visibility Reports
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Outline
24
• Introduction and Context
– Key requirements for data security in Predix
– Managing data rights across platforms
• Principles applied (BlueTalon + Predix Team)
1. Bring business context to policies
2. Distribute enforcement, centralize policy decisions
3. Get visibility over data activities and actions requested
• How BlueTalon Works
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
How BlueTalon Delivers Data-Centric Security
Security
Admins
Hadoop RDBMS
Business Users, Data
Scientists, Developers
BlueTalon Enforcement Points
Any Application
Data Repositories
BlueTalon
Policy Engine
BlueTalon
Audit Engine
CloudSpark NoSQL
25
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 26
High Performance with BlueTalon
Single digit (<3%) overhead. Unnoticeable by end users!
6.9
125.55
7.03
124.98
Teragen
Terasort
Files (1TB, mins)
Without BlueTalon With BlueTalon
Queries
Tested in EMC lab Tested on GE Predix platform
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
How BlueTalon Works
Data Repositories
Applications
Business Users, Data Scientists, Developers
BlueTalon Enforcement Points
BlueTalon
Policy
Engine
Active
Directory
USER
REQUEST
2
3 USER
REQUEST
4
MODIFIED,
COMPLIANT
REQUEST
COMPLIANT
RESULTS5
6
BlueTalon
Auditing Security
Admins
1
BlueTalon
Policy
Console
Security
Admins
27
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Outline
28
• Introduction and Context
– Key requirements for data security in Predix
– Managing data rights across platforms
• Principles applied (BlueTalon + Predix Team)
1. Bring business context to policies
2. Distribute enforcement, centralize policy decisions
3. Get visibility over data activities and actions requested
• How BlueTalon Works
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
“Organizations expecting to implement big
data projects should consider BlueTalon
wherever sensitive data is or may be exposed.”
Merv Adrian, Gartner Group, “Cool Vendors in DBMS”, 2016
29
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Contact use today!
30
• What’s your use case?
– Contact us today at 1-888-534-7154 or info@bluetalon.com
• Download BlueTalon today!
• http://pages.bluetalon-security.com/SecureAccess-for-WebHDFS
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 31

Más contenido relacionado

La actualidad más candente

From Disaster to Recovery: Preparing Your IT for the Unexpected
From Disaster to Recovery: Preparing Your IT for the UnexpectedFrom Disaster to Recovery: Preparing Your IT for the Unexpected
From Disaster to Recovery: Preparing Your IT for the UnexpectedDataCore Software
 
Security and governance in the cloud
Security and governance in the cloudSecurity and governance in the cloud
Security and governance in the cloudJulian Knight
 
Health Decisions Webinar: January 2013 data warehouses
Health Decisions Webinar: January 2013 data warehousesHealth Decisions Webinar: January 2013 data warehouses
Health Decisions Webinar: January 2013 data warehousesSi Nahra
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan Holt
 
Next Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsNext Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsPT Datacomm Diangraha
 
Elastic Software Infrastructure to Support the Industrial Internet
Elastic Software Infrastructure to Support the Industrial InternetElastic Software Infrastructure to Support the Industrial Internet
Elastic Software Infrastructure to Support the Industrial InternetReal-Time Innovations (RTI)
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
 
Ensuring data integrity on cloud data storage
 Ensuring data integrity on cloud data storage Ensuring data integrity on cloud data storage
Ensuring data integrity on cloud data storageRatheesh Kumar R
 
Making Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyMaking Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyVeritas Technologies LLC
 
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...Veritas Technologies LLC
 
It's All about Insight: Unlocking Effective Risk Management for Your Unstruct...
It's All about Insight: Unlocking Effective Risk Management for Your Unstruct...It's All about Insight: Unlocking Effective Risk Management for Your Unstruct...
It's All about Insight: Unlocking Effective Risk Management for Your Unstruct...Veritas Technologies LLC
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)PT Datacomm Diangraha
 
Exploring the Benefits of an Integrated Classification Engine: Lessons in Eli...
Exploring the Benefits of an Integrated Classification Engine: Lessons in Eli...Exploring the Benefits of an Integrated Classification Engine: Lessons in Eli...
Exploring the Benefits of an Integrated Classification Engine: Lessons in Eli...Veritas Technologies LLC
 
Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Real-Time Innovations (RTI)
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44Jisc
 
Veritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike PalmerVeritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike PalmerVeritas Technologies LLC
 

La actualidad más candente (20)

From Disaster to Recovery: Preparing Your IT for the Unexpected
From Disaster to Recovery: Preparing Your IT for the UnexpectedFrom Disaster to Recovery: Preparing Your IT for the Unexpected
From Disaster to Recovery: Preparing Your IT for the Unexpected
 
Security and governance in the cloud
Security and governance in the cloudSecurity and governance in the cloud
Security and governance in the cloud
 
Health Decisions Webinar: January 2013 data warehouses
Health Decisions Webinar: January 2013 data warehousesHealth Decisions Webinar: January 2013 data warehouses
Health Decisions Webinar: January 2013 data warehouses
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_Presentation
 
Next Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsNext Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of Things
 
Elastic Software Infrastructure to Support the Industrial Internet
Elastic Software Infrastructure to Support the Industrial InternetElastic Software Infrastructure to Support the Industrial Internet
Elastic Software Infrastructure to Support the Industrial Internet
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Ensuring data integrity on cloud data storage
 Ensuring data integrity on cloud data storage Ensuring data integrity on cloud data storage
Ensuring data integrity on cloud data storage
 
Making Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyMaking Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE Easy
 
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
 
It's All about Insight: Unlocking Effective Risk Management for Your Unstruct...
It's All about Insight: Unlocking Effective Risk Management for Your Unstruct...It's All about Insight: Unlocking Effective Risk Management for Your Unstruct...
It's All about Insight: Unlocking Effective Risk Management for Your Unstruct...
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)
 
Exploring the Benefits of an Integrated Classification Engine: Lessons in Eli...
Exploring the Benefits of an Integrated Classification Engine: Lessons in Eli...Exploring the Benefits of an Integrated Classification Engine: Lessons in Eli...
Exploring the Benefits of an Integrated Classification Engine: Lessons in Eli...
 
Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
 
4.2.cloud storage
4.2.cloud storage4.2.cloud storage
4.2.cloud storage
 
Veritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike PalmerVeritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike Palmer
 

Similar a Security of IoT Data: Implementing Data-Centric Security and User Access Strategy

Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsCillian Kieran
 
GDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationGDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationDenodo
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User InformationDenodo
 
Getting to Approval Faster Through Technology Innovation
Getting to Approval Faster Through Technology InnovationGetting to Approval Faster Through Technology Innovation
Getting to Approval Faster Through Technology InnovationPAREXEL International
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Building the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingBuilding the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingSrinivas Koushik
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceCloudera, Inc.
 
Beware of the Risk Behind Big Data
Beware of the Risk Behind Big DataBeware of the Risk Behind Big Data
Beware of the Risk Behind Big DataEMC
 
Impact of cloud services on software development life
Impact of cloud services on software development life Impact of cloud services on software development life
Impact of cloud services on software development life Mohamed M. Yazji
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution Google
 
InfoSphere BigInsights
InfoSphere BigInsightsInfoSphere BigInsights
InfoSphere BigInsightsWilfried Hoge
 
Best Practices for Monitoring Cloud Networks
Best Practices for Monitoring Cloud NetworksBest Practices for Monitoring Cloud Networks
Best Practices for Monitoring Cloud NetworksThousandEyes
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptxNguyenNM
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013David Linthicum
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behindMatt Mandich
 
Cloud Data Management: The Future of Data Storage and Management
Cloud Data Management: The Future of Data Storage and ManagementCloud Data Management: The Future of Data Storage and Management
Cloud Data Management: The Future of Data Storage and ManagementFredReynolds2
 
Data Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudData Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudData Blueprint
 
Data Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudData Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudDATAVERSITY
 
MongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital DecouplingMongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital DecouplingMongoDB
 

Similar a Security of IoT Data: Implementing Data-Centric Security and User Access Strategy (20)

Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
 
GDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationGDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data Virtualization
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User Information
 
Getting to Approval Faster Through Technology Innovation
Getting to Approval Faster Through Technology InnovationGetting to Approval Faster Through Technology Innovation
Getting to Approval Faster Through Technology Innovation
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Building the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingBuilding the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud Computing
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 
Beware of the Risk Behind Big Data
Beware of the Risk Behind Big DataBeware of the Risk Behind Big Data
Beware of the Risk Behind Big Data
 
Impact of cloud services on software development life
Impact of cloud services on software development life Impact of cloud services on software development life
Impact of cloud services on software development life
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution
 
InfoSphere BigInsights
InfoSphere BigInsightsInfoSphere BigInsights
InfoSphere BigInsights
 
Best Practices for Monitoring Cloud Networks
Best Practices for Monitoring Cloud NetworksBest Practices for Monitoring Cloud Networks
Best Practices for Monitoring Cloud Networks
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behind
 
Cloud Data Management: The Future of Data Storage and Management
Cloud Data Management: The Future of Data Storage and ManagementCloud Data Management: The Future of Data Storage and Management
Cloud Data Management: The Future of Data Storage and Management
 
Data Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudData Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: Cloud
 
Data Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudData Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: Cloud
 
MongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital DecouplingMongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital Decoupling
 

Más de Altoros

Maturing with Kubernetes
Maturing with KubernetesMaturing with Kubernetes
Maturing with KubernetesAltoros
 
Kubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity AssessmentKubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity AssessmentAltoros
 
Journey Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment MaturityJourney Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment MaturityAltoros
 
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksSGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksAltoros
 
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...Altoros
 
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
A Zero-Knowledge Proof:  Improving Privacy on a BlockchainA Zero-Knowledge Proof:  Improving Privacy on a Blockchain
A Zero-Knowledge Proof: Improving Privacy on a BlockchainAltoros
 
Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.Altoros
 
Containers and Kubernetes
Containers and KubernetesContainers and Kubernetes
Containers and KubernetesAltoros
 
Distributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter TradingDistributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter TradingAltoros
 
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple NodesAltoros
 
Deploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with KubesprayDeploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with KubesprayAltoros
 
UAA for Kubernetes
UAA for KubernetesUAA for Kubernetes
UAA for KubernetesAltoros
 
Troubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud FoundryTroubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud FoundryAltoros
 
Continuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCFContinuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCFAltoros
 
How to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment UnattendedHow to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment UnattendedAltoros
 
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and LogsCloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and LogsAltoros
 
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based SolutionSmart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based SolutionAltoros
 
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry TilesNavigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry TilesAltoros
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoTAltoros
 
Over-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and TreatmentOver-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and TreatmentAltoros
 

Más de Altoros (20)

Maturing with Kubernetes
Maturing with KubernetesMaturing with Kubernetes
Maturing with Kubernetes
 
Kubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity AssessmentKubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity Assessment
 
Journey Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment MaturityJourney Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment Maturity
 
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksSGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
 
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
 
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
A Zero-Knowledge Proof:  Improving Privacy on a BlockchainA Zero-Knowledge Proof:  Improving Privacy on a Blockchain
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
 
Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.
 
Containers and Kubernetes
Containers and KubernetesContainers and Kubernetes
Containers and Kubernetes
 
Distributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter TradingDistributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter Trading
 
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
 
Deploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with KubesprayDeploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with Kubespray
 
UAA for Kubernetes
UAA for KubernetesUAA for Kubernetes
UAA for Kubernetes
 
Troubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud FoundryTroubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud Foundry
 
Continuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCFContinuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCF
 
How to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment UnattendedHow to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment Unattended
 
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and LogsCloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
 
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based SolutionSmart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based Solution
 
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry TilesNavigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoT
 
Over-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and TreatmentOver-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and Treatment
 

Último

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Security of IoT Data: Implementing Data-Centric Security and User Access Strategy

  • 1. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 1
  • 2. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Outline 2 • Introduction and Context – Key requirements for data security in Predix – Managing data rights across platforms • Principles applied (BlueTalon + Predix Team) 1. Bring business context to policies 2. Distribute enforcement, centralize policy decisions 3. Get visibility over data activities and actions requested • How BlueTalon Works
  • 3. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Predix: PaaS for the Industrial Internet 3
  • 4. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 4 Authorization Encryption Authentication Auditing Masking Security within PaaS for the Industrial Internet Data Network Application Endpoint IaaS
  • 5. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. BlueTalon: Data-Centric Security on Predix PaaS 5 Cloud management Edge enforcement
  • 6. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 6 • Security applied one system at a time – Inconsistency, duplication, chaos • Security applied with a central policy – Consistency, efficiency, simplicity BlueTalon: Data-Centric Security Across Data Platforms
  • 7. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Security and Regulatory Trends that Affect Industrial Businesses EAR violations criminal fines increased in excess of 5,000% YTY in 2014 and almost 1,000% in administrative penalties (Source: US DOC BIS) Enforcement is on the Rise ITAR violation risks • Significant Accrual of Fines • Denial of Export Privileges • Mandatory Increase in Staffing • Regular External Audits • Loss of, or Completely Damaged, Public Reputation Due to Facebook European Privacy Violations and NSA practices on Oct 6, 2015 European Court of Justice declares Safe Harbor invalid Facebook is facing daily fines of €250,000 in Belgium after a data protection court ruling for illegally tracking data from non members Results of the 2013 Data Breach • CEO steps down • 46% drop in profits due to reputational damage with $1.47 negative affect on EPS • $100M Cost to upgrade affected systems • 2014 SEC filing – Total expenses $252M • On going settlement costs Fines are Higher Data Breaches Affect the Bottom Line 5
  • 8. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Data Security Requirements in Predix 1. Data owners and regulatory entities define policies of use - Definition of policies must be owned by business stakeholders 2. Automated enforcement of policies across data platforms - Policies managed by business owners must be enforceable independent of data platform - Enforcement of these policies must be demonstrable to auditors - Enforcement must distributed and consistent 3. Preserving end user experience is paramount - End users of the data must be able to use any tool they want - Policy management processes/applications must be focused on business users 8
  • 9. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Outline 9 • Introduction and Context – Key requirements for data security in Predix – Managing data rights across platforms • Principles applied (BlueTalon + Predix Team) 1. Bring business context to policies 2. Distribute enforcement, centralize policy decisions 3. Get visibility over data activities and actions requested • How BlueTalon Works
  • 10. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. [1] Policies are Defined by Business within a Context  “Patient information and exams are sensitive data”  “Our contracts prohibit the use of machine diagnostics data to redesign products”  “Service managers should be able to see only their fleet data” 10
  • 11. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. [1] Policies Applied at the Data Layer Enables Business  Blocking  Enabling 11  “Patient information and exams are sensitive data”  “Our contracts prohibit the use of customer data outside west coast”
  • 12. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. [1] Controlling Access for Different Users & Needs Row filtering Field level Cell level Sub-cell level masking 12 Joyce looks up her data Her manager looks up Joyce’s data
  • 13. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. [1] Example of Controls Directly Applied On Data • Access to client account is conditional, based on zipcode • Data is partially masked Results Rules on Data 13
  • 14. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. [1] Attributes Bring Context to Policies type location title / role group function clearance level LOB user session location timestamp application connection type data sensitivity clearance required action requested # of rows returned data source • Context helps assess whether the data request is legitimate 14
  • 15. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Outline 15 • Introduction and Context – Key requirements for data security in Predix – Managing data rights across platforms • Principles applied (BlueTalon + Predix Team) 1. Bring business context to policies 2. Distribute enforcement, centralize policy decisions 3. Get visibility over data activities and actions requested • How BlueTalon Works
  • 16. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. [2] Why Centralizing Policy Decisions, Distributing Enforcement? • IoT Platforms and Predix are hybrid environments that make use of multiple modern data management platforms: – RDBMS – Hadoop – Spark – Cassandra – Cloud repositories 16 Cloud On-prem
  • 17. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. [2] Centralize Decisions to Manage Polices from One Place 17  Authorization — what a user or a role can do with the data  Decision — against all rules, can a user see a data element  Enforcement — apply the decision at the time of user’s request
  • 18. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Example from Spark on Edge with BlueTalon on Predix 18
  • 19. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Outline 19 • Introduction and Context – Key requirements for data security in Predix – Managing data rights across platforms • Principles applied (BlueTalon + Predix Team) 1. Bring business context to policies 2. Distribute enforcement, centralize policy decisions 3. Get visibility over data activities and actions requested • How BlueTalon Works
  • 20. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 20 [3] Visibility Leverage the Same Enforcement Points
  • 21. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Visibility into Data Activity • Complete audit trail of data usage with contextual information • Key to detection of unusual data access patterns • Tracks policy changes to ensure compliance What policy was triggered Original and modified queriesWhat they tried to do 21
  • 22. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Feedback Loop with Visibility and Control 22 DATADataVisibility Control
  • 23. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 23 Examples of Data Security Visibility Reports
  • 24. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Outline 24 • Introduction and Context – Key requirements for data security in Predix – Managing data rights across platforms • Principles applied (BlueTalon + Predix Team) 1. Bring business context to policies 2. Distribute enforcement, centralize policy decisions 3. Get visibility over data activities and actions requested • How BlueTalon Works
  • 25. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. How BlueTalon Delivers Data-Centric Security Security Admins Hadoop RDBMS Business Users, Data Scientists, Developers BlueTalon Enforcement Points Any Application Data Repositories BlueTalon Policy Engine BlueTalon Audit Engine CloudSpark NoSQL 25
  • 26. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 26 High Performance with BlueTalon Single digit (<3%) overhead. Unnoticeable by end users! 6.9 125.55 7.03 124.98 Teragen Terasort Files (1TB, mins) Without BlueTalon With BlueTalon Queries Tested in EMC lab Tested on GE Predix platform
  • 27. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. How BlueTalon Works Data Repositories Applications Business Users, Data Scientists, Developers BlueTalon Enforcement Points BlueTalon Policy Engine Active Directory USER REQUEST 2 3 USER REQUEST 4 MODIFIED, COMPLIANT REQUEST COMPLIANT RESULTS5 6 BlueTalon Auditing Security Admins 1 BlueTalon Policy Console Security Admins 27
  • 28. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Outline 28 • Introduction and Context – Key requirements for data security in Predix – Managing data rights across platforms • Principles applied (BlueTalon + Predix Team) 1. Bring business context to policies 2. Distribute enforcement, centralize policy decisions 3. Get visibility over data activities and actions requested • How BlueTalon Works
  • 29. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. “Organizations expecting to implement big data projects should consider BlueTalon wherever sensitive data is or may be exposed.” Merv Adrian, Gartner Group, “Cool Vendors in DBMS”, 2016 29
  • 30. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Contact use today! 30 • What’s your use case? – Contact us today at 1-888-534-7154 or info@bluetalon.com • Download BlueTalon today! • http://pages.bluetalon-security.com/SecureAccess-for-WebHDFS
  • 31. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 31

Notas del editor

  1. Characteristics of Predix that inform security decisions Multiple data and analytics platforms provided as a single service Each service contains data storage and analytics tools integrated seamlessly Diverse user population with different needs Differentiated access to a variety of data elements at any level Highly regulated Industrial data  Security controls need to accommodate a variety of regulations
  2. Characteristics of Predix that inform security decisions Multiple data and analytics platforms provided as a single service Each service contains data storage and analytics tools integrated seamlessly Diverse user population with different needs Differentiated access to a variety of data elements at any level Highly regulated Industrial data  Security controls need to accommodate a variety of regulations
  3. Characteristics of Predix that inform security decisions Multiple data and analytics platforms provided as a single service Each service contains data storage and analytics tools integrated seamlessly Diverse user population with different needs Differentiated access to a variety of data elements at any level Highly regulated Industrial data  Security controls need to accommodate a variety of regulations
  4. Characteristics of Predix that inform security decisions Multiple data and analytics platforms provided as a single service Each service contains data storage and analytics tools integrated seamlessly Diverse user population with different needs Differentiated access to a variety of data elements at any level Highly regulated Industrial data  Security controls need to accommodate a variety of regulations