This document discusses enhancing data security with Pivotal Greenplum. It outlines how the liability of security breaches has increased due to new regulations and consumer expectations. It also discusses common security threats customers are concerned about like evolving threats and internal threats. The document then summarizes security controls customers are deploying like authentication, access control, encryption, and logging. It provides examples of partners that offer additional security controls for areas like encryption, data governance, auditing, and activity monitoring.
2. Cover w/ Image
Agenda
■ The liability of security breaches is
increasing
■ Threats that Pivotal Greenplum
customers concerned about today
■ Security controls Pivotal Greenplum
customers are deploying
■ Q&A
■ How to update your security policy
3. How has the liability of security
breaches increased?
ENHANCING DATA SECURITY WITH PIVOTAL GREENPLUM
4. ● New regulation
○ Growing scope
○ Greater financial penalties
● Evolving consumer expectations
○ Reputational impact of an incident is bigger
than ever
The increasing liability of security breaches
5. What security threats are Pivotal
Greenplum customers
concerned about?
ENHANCING DATA SECURITY WITH PIVOTAL GREENPLUM
6. ● Ongoing concerns
● Changing landscape
○ New regulation
○ Evolving threats
○ New Greenplum deployment models
● Increased focus on internal threats
Customer concerns from the field
7. Explain what you mean by
“ongoing security concerns”?
ENHANCING DATA SECURITY WITH PIVOTAL GREENPLUM
20. What are examples of evolving
threats and new deployment
models?
ENHANCING DATA SECURITY WITH PIVOTAL GREENPLUM
21. What are examples of internal
threats?
ENHANCING DATA SECURITY WITH PIVOTAL GREENPLUM
22. What security controls are
Pivotal Greenplum customers
deploying?
ENHANCING DATA SECURITY WITH PIVOTAL GREENPLUM
23. ● Authentication
● Access Control
● Encryption
● Logging for Audit
● Secure access to external data sources
Native Security Controls in Pivotal Greenplum
24. ● Encryption of persistent data
○ Full disk encryption
○ Backup encryption
● Encrypt network transmissions between nodes
Applying System Encryption to Pivotal Greenplum
25. Full System Encryption
Use Zettaset XCrypt Full Disk to encrypt data on disk and network
communication between cluster nodes.
Meet compliance
requirements
Fast, scalable, and
affordable
Simplified
Administration
Try out the trial edition available on
Pivotal Network!
Watch the Zettaset Webinar on
Sept 22
26. ● Granular Access Controls
○ Row Level Security
○ Remove or rewrite column contents
● Security of accessible data
○ Encryption
○ Tokenization
Data Governance Add-ons for Pivotal Greenplum
27. Field Encryption & Tokenization
Use Protegrity to obfuscate high value data fields to reduce risk of data
falling into the wrong hands.
Improve
organizational
security
Support more kinds
of users and their
usage
Don’t let security stop
your business
For more information see:
https://pivotal.io/pivotal-
greenplum/partners/protegrity
Watch the Protegrity Webinar on
Oct 3
28. Format-Preserving Encryption for Any Field Type
Microfocus Voltage SecureData Enterprise provides high performance
format-preserving encryption that protects any data in any common
data type.
Protect sensitive data
in production & test
systems
Doesn’t break
schemas
Data protection
policies travel with
the data
Find out more at:
https://software.microfocus.com/en-
us/products/voltage-data-encryption-
security/overview
New
Partner!
29. Attribute-based Access Control
Blue Talon provides Attribute-Based Access Control (ABAC) to expand
and simplify data access control options.
More finely control
data access policies
Support multi-cloud
deployments
Simplify view-based
security
Find out more at:
https://pivotal.io/pivotal-
greenplum/partners/bluetalon
Watch the Blue Talon Webinar on
Oct 23
30. Data-Governance & Data Access for Data Scientists
Immuta provides data governance and simplified access control across
all the data sources in your company.
Control the data
environment
Security connect,
manage, and monitor
data
Fast, personalized
access to data
Find out more at:
https://www.immuta.com/
New
Partner!
31. ● Content and config scanning
○ Identify sensitive content
○ Best practices for secure configuration
● User activity logging and alerting
Audit Add-ons for Pivotal Greenplum
32. Make Imperva slide here
Imperva data security solutions secure your data from attacks and
simplify regulatory compliance.
Discover sensitive
data
Find database
vulnerabilities
Monitor data activity
to discover risky
users
Find out more at:
https://www.imperva.com/products/
data-security/
New
Partner!