|By Marketwired .||
|January 16, 2013 11:24 AM EST||
SAN MATEO, CA -- (Marketwire) -- 01/16/13 --
- DSE 3.0 delivers core security features to the Cassandra NoSQL community and advanced security features to modern enterprises
- New release features internal and external authentication, object permission management, transparent data encryption, data auditing, client-to-node encryption, and an enterprise-class administration interface for easy and secure database management
- Customers such as HealthCare Anytime rely on DSE to securely and effectively manage their big data analytics
DataStax, the company that powers the big data apps that transform business, today announced the early adopter program (EAP) launch of DataStax Enterprise (DSE) 3.0. The new version provides core security capabilities to the entire Cassandra community, as well as the advanced data protection that businesses expect in an enterprise-grade database. DSE 3.0 supplies the type of security framework that allows modern enterprises to confidently adopt NoSQL databases as they safely scale their big data infrastructure.
"DSE 3.0 combines the security and easy manageability that modern businesses require for their enterprise-class applications," said Robin Schumacher, vice president of products, DataStax. "Our new version features both internal and external authentication, easy object permission management, transparent data encryption, data auditing, secured client to node transport, and an improved visual administration environment that enables businesses to easily and securely deploy and manage large database clusters both on premise and in the cloud."
Security For The Community
DataStax Enterprise Edition is a complete big data platform, built on Apache Cassandra, that is architected to manage real-time, analytic, and enterprise search data all in the same database cluster. With the release of DSE 3.0, DataStax is providing security features both to the open source community and to the enterprise. For the Cassandra NoSQL community, DataStax is making the following security enhancements freely available to everyone who uses Apache Cassandra:
- Authentication based on internally controlled login accounts and passwords
- Object permission management based on the familiar relational database GRANT/REVOKE paradigm
- Client-to-node encryption, which protects data in flight from client machines to a database cluster
Security For The Enterprise
In addition to the general security features being made available to the entire Cassandra NoSQL community, DSE 3.0 supplies the following features to enterprises that require advanced security when handling mission-critical data:
- External authentication via LDAP and Kerberos, which are the most trusted external security packages in use today, especially by governments and financial institutions. External authentication allows DSE to provide single sign on capability to all Cassandra, Hadoop, and Solr nodes in a DSE cluster
- Transparent data encryption protects data at rest from theft, and from unauthorized read access at the file system level
- Data auditing enables administrators to create granular audit trails of some or all activity in a database cluster
"The addition of new security features in both Apache Cassandra and DataStax Enterprise is indicative of the ongoing maturation of NoSQL databases in-keeping with an increasing interest from Web companies and traditional enterprises alike," said Matt Aslett, research manager, data management and analytics, 451 Research. "The full range of security features delivered in DSE 3.0 is not likely to be necessary for every project, but having authentication, encryption and auditing on the list of features will likely help open doors to adoption by mainstream users."
Streamlined, Big Data Management
DSE 3.0 also simplifies management of big data systems and supplies greater ease of use for day-to-day administration tasks. OpsCenter Enterprise 3.0, a visual browser-based solution for managing big data platforms, provides the following new features:
- Visual Enterprise provisioning simplifies and streamlines the creation and management of new clusters both on-premise and in the cloud. Users can create, configure and monitor new clusters from scratch within minutes in point-and-click fashion
- Visual restore management provides visual ways to restore a database cluster from backups. Both full restore as well as object-level restore from full backups, are supported, which enables admins to easily carry out restore operations with confidence
- Visual object management offers increased support for visually creating and managing all database objects in a DSE cluster
- Automated software update notifications keeps administrators aware of new software versions that are available from the Apache community as well as DataStax
"DSE 3.0 lets us easily manage our big data needs and gain important insights that help us serve our customers, and ultimately patients, more effectively," said Terrell Deppe, chief technology officer, HealthCare Anytime. "We are committed to protecting patient health information, and DSE's new security features greatly enhance the strength of our solutions. These features have arrived at just the right time for us because the volume and velocity of our data is bigger than ever."
DataStax powers the big data apps that transform business for more than 200 customers, including startups and 20 of the Fortune 100. DataStax delivers a massively scalable, flexible and continuously available big data platform built on Apache Cassandra. DataStax integrates enterprise-ready Cassandra, Apache Hadoop for analytics and Apache Solr for search across multi-datacenters and in the cloud.
Companies such as Adobe, Healthcare Anytime, eBay and Netflix rely on DataStax to transform their businesses. Based in San Mateo, Calif., DataStax is backed by industry-leading investors: Lightspeed Venture Partners, Crosslink Capital and Meritech Capital Partners. For more information, visit DataStax or follow us @DataStax.
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Oct. 1, 2016 11:15 AM EDT Reads: 866
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Oct. 1, 2016 10:45 AM EDT Reads: 595
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
Oct. 1, 2016 10:30 AM EDT Reads: 709
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Oct. 1, 2016 10:30 AM EDT Reads: 1,724
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Oct. 1, 2016 10:00 AM EDT Reads: 517
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
Oct. 1, 2016 10:00 AM EDT Reads: 3,196
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Oct. 1, 2016 10:00 AM EDT Reads: 3,319
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Oct. 1, 2016 09:45 AM EDT Reads: 834
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
Oct. 1, 2016 09:15 AM EDT Reads: 1,676
SYS-CON Events announced today that Sheng Liang to Keynote at SYS-CON's 19th Cloud Expo, which will take place on November 1-3, 2016 at the Santa Clara Convention Center in Santa Clara, California.
Oct. 1, 2016 09:15 AM EDT Reads: 198
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
Oct. 1, 2016 08:45 AM EDT Reads: 5,510
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
Oct. 1, 2016 08:30 AM EDT Reads: 3,422
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
Oct. 1, 2016 08:30 AM EDT Reads: 2,510
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Oct. 1, 2016 08:00 AM EDT Reads: 2,287
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Oct. 1, 2016 08:00 AM EDT Reads: 1,313
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
Oct. 1, 2016 07:00 AM EDT Reads: 1,867
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Oct. 1, 2016 06:00 AM EDT Reads: 1,955
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
Oct. 1, 2016 05:45 AM EDT Reads: 1,348
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
Oct. 1, 2016 05:30 AM EDT Reads: 656
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
Oct. 1, 2016 05:15 AM EDT Reads: 1,446