SlideShare a Scribd company logo
1 of 31
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 1
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Outline
2
• Introduction and Context
– Key requirements for data security in Predix
– Managing data rights across platforms
• Principles applied (BlueTalon + Predix Team)
1. Bring business context to policies
2. Distribute enforcement, centralize policy decisions
3. Get visibility over data activities and actions requested
• How BlueTalon Works
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Predix: PaaS for the Industrial Internet
3
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 4
Authorization
Encryption
Authentication
Auditing
Masking
Security within PaaS for the Industrial Internet
Data
Network
Application
Endpoint
IaaS
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
BlueTalon: Data-Centric Security on Predix PaaS
5
Cloud
management
Edge
enforcement
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
6
• Security applied one system at a time
– Inconsistency, duplication, chaos
• Security applied with a central policy
– Consistency, efficiency, simplicity
BlueTalon: Data-Centric Security Across Data Platforms
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Security and Regulatory Trends that Affect Industrial Businesses
EAR violations criminal fines increased in excess of 5,000% YTY in 2014 and almost
1,000% in administrative penalties (Source: US DOC BIS)
Enforcement is on the Rise
ITAR violation risks
• Significant Accrual of Fines
• Denial of Export Privileges
• Mandatory Increase in Staffing
• Regular External Audits
• Loss of, or Completely Damaged, Public Reputation
Due to Facebook European Privacy Violations and NSA practices on Oct 6, 2015
European Court of Justice declares Safe Harbor invalid
Facebook is facing daily fines of €250,000 in Belgium after a data protection
court ruling for illegally tracking data from non members
Results of the 2013 Data Breach
• CEO steps down
• 46% drop in profits due to reputational damage
with $1.47 negative affect on EPS
• $100M Cost to upgrade affected systems
• 2014 SEC filing – Total expenses $252M
• On going settlement costs
Fines are Higher
Data Breaches Affect the Bottom Line
5
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Data Security Requirements in Predix
1. Data owners and regulatory entities define policies of use
- Definition of policies must be owned by business stakeholders
2. Automated enforcement of policies across data platforms
- Policies managed by business owners must be enforceable independent of data platform
- Enforcement of these policies must be demonstrable to auditors
- Enforcement must distributed and consistent
3. Preserving end user experience is paramount
- End users of the data must be able to use any tool they want
- Policy management processes/applications must be focused on business users
8
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Outline
9
• Introduction and Context
– Key requirements for data security in Predix
– Managing data rights across platforms
• Principles applied (BlueTalon + Predix Team)
1. Bring business context to policies
2. Distribute enforcement, centralize policy decisions
3. Get visibility over data activities and actions requested
• How BlueTalon Works
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
[1] Policies are Defined by Business within a Context
 “Patient information and exams are sensitive data”
 “Our contracts prohibit the use of machine diagnostics data
to redesign products”
 “Service managers should be able to see only their fleet data”
10
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
[1] Policies Applied at the Data Layer Enables Business
 Blocking
 Enabling
11
 “Patient information and exams are sensitive data”
 “Our contracts prohibit the use of customer data outside west coast”
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
[1] Controlling Access for Different Users & Needs
Row filtering
Field level
Cell level
Sub-cell level masking
12
Joyce looks up
her data
Her manager looks
up Joyce’s data
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
[1] Example of Controls Directly Applied On Data
• Access to client account is conditional, based on zipcode
• Data is partially masked
Results
Rules on Data
13
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
[1] Attributes Bring Context to Policies
type
location
title / role
group
function
clearance level
LOB
user session
location
timestamp
application
connection type
data
sensitivity
clearance required
action requested
# of rows returned
data source
• Context helps assess whether the data request is legitimate
14
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Outline
15
• Introduction and Context
– Key requirements for data security in Predix
– Managing data rights across platforms
• Principles applied (BlueTalon + Predix Team)
1. Bring business context to policies
2. Distribute enforcement, centralize policy decisions
3. Get visibility over data activities and actions requested
• How BlueTalon Works
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
[2] Why Centralizing Policy Decisions, Distributing Enforcement?
• IoT Platforms and Predix are hybrid environments that make
use of multiple modern data management platforms:
– RDBMS
– Hadoop
– Spark
– Cassandra
– Cloud repositories
16
Cloud On-prem
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
[2] Centralize Decisions to Manage Polices from One Place
17
 Authorization — what a user or a role can do with the data
 Decision — against all rules, can a user see a data element
 Enforcement — apply the decision at the time of user’s request
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Example from Spark on Edge with BlueTalon on Predix
18
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Outline
19
• Introduction and Context
– Key requirements for data security in Predix
– Managing data rights across platforms
• Principles applied (BlueTalon + Predix Team)
1. Bring business context to policies
2. Distribute enforcement, centralize policy decisions
3. Get visibility over data activities and actions requested
• How BlueTalon Works
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 20
[3] Visibility Leverage the Same Enforcement Points
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Visibility into Data Activity
• Complete audit trail of data usage with contextual information
• Key to detection of unusual data access patterns
• Tracks policy changes to ensure compliance
What policy
was triggered
Original and
modified queriesWhat they
tried to do
21
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Feedback Loop with Visibility and Control
22
DATADataVisibility Control
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 23
Examples of Data Security Visibility Reports
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Outline
24
• Introduction and Context
– Key requirements for data security in Predix
– Managing data rights across platforms
• Principles applied (BlueTalon + Predix Team)
1. Bring business context to policies
2. Distribute enforcement, centralize policy decisions
3. Get visibility over data activities and actions requested
• How BlueTalon Works
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
How BlueTalon Delivers Data-Centric Security
Security
Admins
Hadoop RDBMS
Business Users, Data
Scientists, Developers
BlueTalon Enforcement Points
Any Application
Data Repositories
BlueTalon
Policy Engine
BlueTalon
Audit Engine
CloudSpark NoSQL
25
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 26
High Performance with BlueTalon
Single digit (<3%) overhead. Unnoticeable by end users!
6.9
125.55
7.03
124.98
Teragen
Terasort
Files (1TB, mins)
Without BlueTalon With BlueTalon
Queries
Tested in EMC lab Tested on GE Predix platform
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
How BlueTalon Works
Data Repositories
Applications
Business Users, Data Scientists, Developers
BlueTalon Enforcement Points
BlueTalon
Policy
Engine
Active
Directory
USER
REQUEST
2
3 USER
REQUEST
4
MODIFIED,
COMPLIANT
REQUEST
COMPLIANT
RESULTS5
6
BlueTalon
Auditing Security
Admins
1
BlueTalon
Policy
Console
Security
Admins
27
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Outline
28
• Introduction and Context
– Key requirements for data security in Predix
– Managing data rights across platforms
• Principles applied (BlueTalon + Predix Team)
1. Bring business context to policies
2. Distribute enforcement, centralize policy decisions
3. Get visibility over data activities and actions requested
• How BlueTalon Works
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
“Organizations expecting to implement big
data projects should consider BlueTalon
wherever sensitive data is or may be exposed.”
Merv Adrian, Gartner Group, “Cool Vendors in DBMS”, 2016
29
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED.
Contact use today!
30
• What’s your use case?
– Contact us today at 1-888-534-7154 or info@bluetalon.com
• Download BlueTalon today!
• http://pages.bluetalon-security.com/SecureAccess-for-WebHDFS
© 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 31

More Related Content

What's hot

From Disaster to Recovery: Preparing Your IT for the Unexpected
From Disaster to Recovery: Preparing Your IT for the UnexpectedFrom Disaster to Recovery: Preparing Your IT for the Unexpected
From Disaster to Recovery: Preparing Your IT for the UnexpectedDataCore Software
 
Security and governance in the cloud
Security and governance in the cloudSecurity and governance in the cloud
Security and governance in the cloudJulian Knight
 
Health Decisions Webinar: January 2013 data warehouses
Health Decisions Webinar: January 2013 data warehousesHealth Decisions Webinar: January 2013 data warehouses
Health Decisions Webinar: January 2013 data warehousesSi Nahra
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan Holt
 
Next Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsNext Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsPT Datacomm Diangraha
 
Elastic Software Infrastructure to Support the Industrial Internet
Elastic Software Infrastructure to Support the Industrial InternetElastic Software Infrastructure to Support the Industrial Internet
Elastic Software Infrastructure to Support the Industrial InternetReal-Time Innovations (RTI)
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
 
Ensuring data integrity on cloud data storage
 Ensuring data integrity on cloud data storage Ensuring data integrity on cloud data storage
Ensuring data integrity on cloud data storageRatheesh Kumar R
 
Making Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyMaking Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyVeritas Technologies LLC
 
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...Veritas Technologies LLC
 
It's All about Insight: Unlocking Effective Risk Management for Your Unstruct...
It's All about Insight: Unlocking Effective Risk Management for Your Unstruct...It's All about Insight: Unlocking Effective Risk Management for Your Unstruct...
It's All about Insight: Unlocking Effective Risk Management for Your Unstruct...Veritas Technologies LLC
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)PT Datacomm Diangraha
 
Exploring the Benefits of an Integrated Classification Engine: Lessons in Eli...
Exploring the Benefits of an Integrated Classification Engine: Lessons in Eli...Exploring the Benefits of an Integrated Classification Engine: Lessons in Eli...
Exploring the Benefits of an Integrated Classification Engine: Lessons in Eli...Veritas Technologies LLC
 
Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Real-Time Innovations (RTI)
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44Jisc
 
Veritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike PalmerVeritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike PalmerVeritas Technologies LLC
 

What's hot (20)

From Disaster to Recovery: Preparing Your IT for the Unexpected
From Disaster to Recovery: Preparing Your IT for the UnexpectedFrom Disaster to Recovery: Preparing Your IT for the Unexpected
From Disaster to Recovery: Preparing Your IT for the Unexpected
 
Security and governance in the cloud
Security and governance in the cloudSecurity and governance in the cloud
Security and governance in the cloud
 
Health Decisions Webinar: January 2013 data warehouses
Health Decisions Webinar: January 2013 data warehousesHealth Decisions Webinar: January 2013 data warehouses
Health Decisions Webinar: January 2013 data warehouses
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_PresentationRyan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_Presentation
 
Next Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsNext Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of Things
 
Elastic Software Infrastructure to Support the Industrial Internet
Elastic Software Infrastructure to Support the Industrial InternetElastic Software Infrastructure to Support the Industrial Internet
Elastic Software Infrastructure to Support the Industrial Internet
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Ensuring data integrity on cloud data storage
 Ensuring data integrity on cloud data storage Ensuring data integrity on cloud data storage
Ensuring data integrity on cloud data storage
 
Making Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE EasyMaking Data Protection Simple, Affordable, and BE Easy
Making Data Protection Simple, Affordable, and BE Easy
 
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
Who Is Really Responsible: Public Cloud Misperceptions and the Need for Multi...
 
It's All about Insight: Unlocking Effective Risk Management for Your Unstruct...
It's All about Insight: Unlocking Effective Risk Management for Your Unstruct...It's All about Insight: Unlocking Effective Risk Management for Your Unstruct...
It's All about Insight: Unlocking Effective Risk Management for Your Unstruct...
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)Endpoint Protection as a Service (EPaaS)
Endpoint Protection as a Service (EPaaS)
 
Exploring the Benefits of an Integrated Classification Engine: Lessons in Eli...
Exploring the Benefits of an Integrated Classification Engine: Lessons in Eli...Exploring the Benefits of an Integrated Classification Engine: Lessons in Eli...
Exploring the Benefits of an Integrated Classification Engine: Lessons in Eli...
 
Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
 
4.2.cloud storage
4.2.cloud storage4.2.cloud storage
4.2.cloud storage
 
Veritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike PalmerVeritas Solution Day 2017, France, keynote by Mike Palmer
Veritas Solution Day 2017, France, keynote by Mike Palmer
 

Similar to Security of IoT Data: Implementing Data-Centric Security and User Access Strategy

Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsCillian Kieran
 
GDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationGDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationDenodo
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User InformationDenodo
 
Getting to Approval Faster Through Technology Innovation
Getting to Approval Faster Through Technology InnovationGetting to Approval Faster Through Technology Innovation
Getting to Approval Faster Through Technology InnovationPAREXEL International
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Building the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingBuilding the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingSrinivas Koushik
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceCloudera, Inc.
 
Beware of the Risk Behind Big Data
Beware of the Risk Behind Big DataBeware of the Risk Behind Big Data
Beware of the Risk Behind Big DataEMC
 
Impact of cloud services on software development life
Impact of cloud services on software development life Impact of cloud services on software development life
Impact of cloud services on software development life Mohamed M. Yazji
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution Google
 
InfoSphere BigInsights
InfoSphere BigInsightsInfoSphere BigInsights
InfoSphere BigInsightsWilfried Hoge
 
Best Practices for Monitoring Cloud Networks
Best Practices for Monitoring Cloud NetworksBest Practices for Monitoring Cloud Networks
Best Practices for Monitoring Cloud NetworksThousandEyes
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptxNguyenNM
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013David Linthicum
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behindMatt Mandich
 
Cloud Data Management: The Future of Data Storage and Management
Cloud Data Management: The Future of Data Storage and ManagementCloud Data Management: The Future of Data Storage and Management
Cloud Data Management: The Future of Data Storage and ManagementFredReynolds2
 
Data Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudData Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudData Blueprint
 
Data Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudData Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudDATAVERSITY
 
MongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital DecouplingMongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital DecouplingMongoDB
 

Similar to Security of IoT Data: Implementing Data-Centric Security and User Access Strategy (20)

Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
 
GDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationGDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data Virtualization
 
Govern and Protect Your End User Information
Govern and Protect Your End User InformationGovern and Protect Your End User Information
Govern and Protect Your End User Information
 
Getting to Approval Faster Through Technology Innovation
Getting to Approval Faster Through Technology InnovationGetting to Approval Faster Through Technology Innovation
Getting to Approval Faster Through Technology Innovation
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Building the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingBuilding the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud Computing
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 
Beware of the Risk Behind Big Data
Beware of the Risk Behind Big DataBeware of the Risk Behind Big Data
Beware of the Risk Behind Big Data
 
Impact of cloud services on software development life
Impact of cloud services on software development life Impact of cloud services on software development life
Impact of cloud services on software development life
 
SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution SureSkills GDPR - Discover the Smart Solution
SureSkills GDPR - Discover the Smart Solution
 
InfoSphere BigInsights
InfoSphere BigInsightsInfoSphere BigInsights
InfoSphere BigInsights
 
Best Practices for Monitoring Cloud Networks
Best Practices for Monitoring Cloud NetworksBest Practices for Monitoring Cloud Networks
Best Practices for Monitoring Cloud Networks
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behind
 
Cloud Data Management: The Future of Data Storage and Management
Cloud Data Management: The Future of Data Storage and ManagementCloud Data Management: The Future of Data Storage and Management
Cloud Data Management: The Future of Data Storage and Management
 
Data Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudData Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: Cloud
 
Data Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudData Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: Cloud
 
MongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital DecouplingMongoDB World 2019: Data Digital Decoupling
MongoDB World 2019: Data Digital Decoupling
 

More from Altoros

Maturing with Kubernetes
Maturing with KubernetesMaturing with Kubernetes
Maturing with KubernetesAltoros
 
Kubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity AssessmentKubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity AssessmentAltoros
 
Journey Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment MaturityJourney Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment MaturityAltoros
 
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksSGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksAltoros
 
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...Altoros
 
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
A Zero-Knowledge Proof:  Improving Privacy on a BlockchainA Zero-Knowledge Proof:  Improving Privacy on a Blockchain
A Zero-Knowledge Proof: Improving Privacy on a BlockchainAltoros
 
Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.Altoros
 
Containers and Kubernetes
Containers and KubernetesContainers and Kubernetes
Containers and KubernetesAltoros
 
Distributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter TradingDistributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter TradingAltoros
 
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple NodesAltoros
 
Deploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with KubesprayDeploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with KubesprayAltoros
 
UAA for Kubernetes
UAA for KubernetesUAA for Kubernetes
UAA for KubernetesAltoros
 
Troubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud FoundryTroubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud FoundryAltoros
 
Continuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCFContinuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCFAltoros
 
How to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment UnattendedHow to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment UnattendedAltoros
 
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and LogsCloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and LogsAltoros
 
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based SolutionSmart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based SolutionAltoros
 
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry TilesNavigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry TilesAltoros
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoTAltoros
 
Over-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and TreatmentOver-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and TreatmentAltoros
 

More from Altoros (20)

Maturing with Kubernetes
Maturing with KubernetesMaturing with Kubernetes
Maturing with Kubernetes
 
Kubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity AssessmentKubernetes Platform Readiness and Maturity Assessment
Kubernetes Platform Readiness and Maturity Assessment
 
Journey Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment MaturityJourney Through Four Stages of Kubernetes Deployment Maturity
Journey Through Four Stages of Kubernetes Deployment Maturity
 
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain NetworksSGX: Improving Privacy, Security, and Trust Across Blockchain Networks
SGX: Improving Privacy, Security, and Trust Across Blockchain Networks
 
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
Using the Cloud Foundry and Kubernetes Stack as a Part of a Blockchain CI/CD ...
 
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
A Zero-Knowledge Proof:  Improving Privacy on a BlockchainA Zero-Knowledge Proof:  Improving Privacy on a Blockchain
A Zero-Knowledge Proof: Improving Privacy on a Blockchain
 
Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.Crap. Your Big Data Kitchen Is Broken.
Crap. Your Big Data Kitchen Is Broken.
 
Containers and Kubernetes
Containers and KubernetesContainers and Kubernetes
Containers and Kubernetes
 
Distributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter TradingDistributed Ledger Technology for Over-the-Counter Trading
Distributed Ledger Technology for Over-the-Counter Trading
 
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes5-Step Deployment of Hyperledger Fabric on Multiple Nodes
5-Step Deployment of Hyperledger Fabric on Multiple Nodes
 
Deploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with KubesprayDeploying Kubernetes on GCP with Kubespray
Deploying Kubernetes on GCP with Kubespray
 
UAA for Kubernetes
UAA for KubernetesUAA for Kubernetes
UAA for Kubernetes
 
Troubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud FoundryTroubleshooting .NET Applications on Cloud Foundry
Troubleshooting .NET Applications on Cloud Foundry
 
Continuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCFContinuous Integration and Deployment with Jenkins for PCF
Continuous Integration and Deployment with Jenkins for PCF
 
How to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment UnattendedHow to Never Leave Your Deployment Unattended
How to Never Leave Your Deployment Unattended
 
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and LogsCloud Foundry Monitoring How-To: Collecting Metrics and Logs
Cloud Foundry Monitoring How-To: Collecting Metrics and Logs
 
Smart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based SolutionSmart Baggage Tracking: End-to-End Sensor-Based Solution
Smart Baggage Tracking: End-to-End Sensor-Based Solution
 
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry TilesNavigating the Ecosystem of Pivotal Cloud Foundry Tiles
Navigating the Ecosystem of Pivotal Cloud Foundry Tiles
 
AI as a Catalyst for IoT
AI as a Catalyst for IoTAI as a Catalyst for IoT
AI as a Catalyst for IoT
 
Over-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and TreatmentOver-Engineering: Causes, Symptoms, and Treatment
Over-Engineering: Causes, Symptoms, and Treatment
 

Recently uploaded

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 

Recently uploaded (20)

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Security of IoT Data: Implementing Data-Centric Security and User Access Strategy

  • 1. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 1
  • 2. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Outline 2 • Introduction and Context – Key requirements for data security in Predix – Managing data rights across platforms • Principles applied (BlueTalon + Predix Team) 1. Bring business context to policies 2. Distribute enforcement, centralize policy decisions 3. Get visibility over data activities and actions requested • How BlueTalon Works
  • 3. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Predix: PaaS for the Industrial Internet 3
  • 4. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 4 Authorization Encryption Authentication Auditing Masking Security within PaaS for the Industrial Internet Data Network Application Endpoint IaaS
  • 5. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. BlueTalon: Data-Centric Security on Predix PaaS 5 Cloud management Edge enforcement
  • 6. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 6 • Security applied one system at a time – Inconsistency, duplication, chaos • Security applied with a central policy – Consistency, efficiency, simplicity BlueTalon: Data-Centric Security Across Data Platforms
  • 7. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Security and Regulatory Trends that Affect Industrial Businesses EAR violations criminal fines increased in excess of 5,000% YTY in 2014 and almost 1,000% in administrative penalties (Source: US DOC BIS) Enforcement is on the Rise ITAR violation risks • Significant Accrual of Fines • Denial of Export Privileges • Mandatory Increase in Staffing • Regular External Audits • Loss of, or Completely Damaged, Public Reputation Due to Facebook European Privacy Violations and NSA practices on Oct 6, 2015 European Court of Justice declares Safe Harbor invalid Facebook is facing daily fines of €250,000 in Belgium after a data protection court ruling for illegally tracking data from non members Results of the 2013 Data Breach • CEO steps down • 46% drop in profits due to reputational damage with $1.47 negative affect on EPS • $100M Cost to upgrade affected systems • 2014 SEC filing – Total expenses $252M • On going settlement costs Fines are Higher Data Breaches Affect the Bottom Line 5
  • 8. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Data Security Requirements in Predix 1. Data owners and regulatory entities define policies of use - Definition of policies must be owned by business stakeholders 2. Automated enforcement of policies across data platforms - Policies managed by business owners must be enforceable independent of data platform - Enforcement of these policies must be demonstrable to auditors - Enforcement must distributed and consistent 3. Preserving end user experience is paramount - End users of the data must be able to use any tool they want - Policy management processes/applications must be focused on business users 8
  • 9. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Outline 9 • Introduction and Context – Key requirements for data security in Predix – Managing data rights across platforms • Principles applied (BlueTalon + Predix Team) 1. Bring business context to policies 2. Distribute enforcement, centralize policy decisions 3. Get visibility over data activities and actions requested • How BlueTalon Works
  • 10. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. [1] Policies are Defined by Business within a Context  “Patient information and exams are sensitive data”  “Our contracts prohibit the use of machine diagnostics data to redesign products”  “Service managers should be able to see only their fleet data” 10
  • 11. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. [1] Policies Applied at the Data Layer Enables Business  Blocking  Enabling 11  “Patient information and exams are sensitive data”  “Our contracts prohibit the use of customer data outside west coast”
  • 12. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. [1] Controlling Access for Different Users & Needs Row filtering Field level Cell level Sub-cell level masking 12 Joyce looks up her data Her manager looks up Joyce’s data
  • 13. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. [1] Example of Controls Directly Applied On Data • Access to client account is conditional, based on zipcode • Data is partially masked Results Rules on Data 13
  • 14. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. [1] Attributes Bring Context to Policies type location title / role group function clearance level LOB user session location timestamp application connection type data sensitivity clearance required action requested # of rows returned data source • Context helps assess whether the data request is legitimate 14
  • 15. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Outline 15 • Introduction and Context – Key requirements for data security in Predix – Managing data rights across platforms • Principles applied (BlueTalon + Predix Team) 1. Bring business context to policies 2. Distribute enforcement, centralize policy decisions 3. Get visibility over data activities and actions requested • How BlueTalon Works
  • 16. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. [2] Why Centralizing Policy Decisions, Distributing Enforcement? • IoT Platforms and Predix are hybrid environments that make use of multiple modern data management platforms: – RDBMS – Hadoop – Spark – Cassandra – Cloud repositories 16 Cloud On-prem
  • 17. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. [2] Centralize Decisions to Manage Polices from One Place 17  Authorization — what a user or a role can do with the data  Decision — against all rules, can a user see a data element  Enforcement — apply the decision at the time of user’s request
  • 18. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Example from Spark on Edge with BlueTalon on Predix 18
  • 19. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Outline 19 • Introduction and Context – Key requirements for data security in Predix – Managing data rights across platforms • Principles applied (BlueTalon + Predix Team) 1. Bring business context to policies 2. Distribute enforcement, centralize policy decisions 3. Get visibility over data activities and actions requested • How BlueTalon Works
  • 20. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 20 [3] Visibility Leverage the Same Enforcement Points
  • 21. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Visibility into Data Activity • Complete audit trail of data usage with contextual information • Key to detection of unusual data access patterns • Tracks policy changes to ensure compliance What policy was triggered Original and modified queriesWhat they tried to do 21
  • 22. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Feedback Loop with Visibility and Control 22 DATADataVisibility Control
  • 23. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 23 Examples of Data Security Visibility Reports
  • 24. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Outline 24 • Introduction and Context – Key requirements for data security in Predix – Managing data rights across platforms • Principles applied (BlueTalon + Predix Team) 1. Bring business context to policies 2. Distribute enforcement, centralize policy decisions 3. Get visibility over data activities and actions requested • How BlueTalon Works
  • 25. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. How BlueTalon Delivers Data-Centric Security Security Admins Hadoop RDBMS Business Users, Data Scientists, Developers BlueTalon Enforcement Points Any Application Data Repositories BlueTalon Policy Engine BlueTalon Audit Engine CloudSpark NoSQL 25
  • 26. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 26 High Performance with BlueTalon Single digit (<3%) overhead. Unnoticeable by end users! 6.9 125.55 7.03 124.98 Teragen Terasort Files (1TB, mins) Without BlueTalon With BlueTalon Queries Tested in EMC lab Tested on GE Predix platform
  • 27. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. How BlueTalon Works Data Repositories Applications Business Users, Data Scientists, Developers BlueTalon Enforcement Points BlueTalon Policy Engine Active Directory USER REQUEST 2 3 USER REQUEST 4 MODIFIED, COMPLIANT REQUEST COMPLIANT RESULTS5 6 BlueTalon Auditing Security Admins 1 BlueTalon Policy Console Security Admins 27
  • 28. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Outline 28 • Introduction and Context – Key requirements for data security in Predix – Managing data rights across platforms • Principles applied (BlueTalon + Predix Team) 1. Bring business context to policies 2. Distribute enforcement, centralize policy decisions 3. Get visibility over data activities and actions requested • How BlueTalon Works
  • 29. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. “Organizations expecting to implement big data projects should consider BlueTalon wherever sensitive data is or may be exposed.” Merv Adrian, Gartner Group, “Cool Vendors in DBMS”, 2016 29
  • 30. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. Contact use today! 30 • What’s your use case? – Contact us today at 1-888-534-7154 or info@bluetalon.com • Download BlueTalon today! • http://pages.bluetalon-security.com/SecureAccess-for-WebHDFS
  • 31. © 2017 BLUETALON, INC. ALL RIGHTS RESERVED. 31

Editor's Notes

  1. Characteristics of Predix that inform security decisions Multiple data and analytics platforms provided as a single service Each service contains data storage and analytics tools integrated seamlessly Diverse user population with different needs Differentiated access to a variety of data elements at any level Highly regulated Industrial data  Security controls need to accommodate a variety of regulations
  2. Characteristics of Predix that inform security decisions Multiple data and analytics platforms provided as a single service Each service contains data storage and analytics tools integrated seamlessly Diverse user population with different needs Differentiated access to a variety of data elements at any level Highly regulated Industrial data  Security controls need to accommodate a variety of regulations
  3. Characteristics of Predix that inform security decisions Multiple data and analytics platforms provided as a single service Each service contains data storage and analytics tools integrated seamlessly Diverse user population with different needs Differentiated access to a variety of data elements at any level Highly regulated Industrial data  Security controls need to accommodate a variety of regulations
  4. Characteristics of Predix that inform security decisions Multiple data and analytics platforms provided as a single service Each service contains data storage and analytics tools integrated seamlessly Diverse user population with different needs Differentiated access to a variety of data elements at any level Highly regulated Industrial data  Security controls need to accommodate a variety of regulations