Securing Sensitive Data - Vertica

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Solution Flyer

Security

Securing Sensitive Data


Micro Focus® Voltage SecureData for Vertica

Voltage SecureData for Vertica cited reason for the lack of a proper security Accountability Act (HIPAA). Voltage SecureData
Solution Snapshot implementation is that the administration inter- calls for de-identifying the data as close to its
Voltage SecureData is a comprehensive data feres with—and slows down—business due to source as possible, transforming the sensitive
protection framework that secures data as it is its complex, cumbersome, and intrusive nature. data elements with usable, yet de-identified,
captured, processed, and stored across a vari- equivalents that retain their format, behavior,
ety of devices, operating systems, databases, Protect Data-in-Use for Analytics and meaning. This protected form of the data
and applications. Voltage SecureData is avail- Vertica + Voltage Add-on provides easy-to- can then be used in subsequent applications,
able for Vertica as the Vertica + Voltage Add-on. configure data security capabilities you expect analytic engines, data transfers, and data stores
in an enterprise system. Authentication and while readily and securely re-identified for those
authorization are just the start. With the Voltage specific applications and users that require it.
Vertica Analytics Platform
Add-on for Vertica, the privacy of sensitive infor-
Vertica ia a blazingly fast SQL analytics da-
mation is preserved end-to-end across an en- Vertica + Voltage Add-on Benefits
tabase, enabling enterprises to access and
terprise’s IT infrastructure—from the moment of ■■ The ability to protect data as close to its
derive meaningful insight into big data in sub
capture through business analysis applications source as possible.
-seconds or minutes rather than hours or days.
and to the back-end data store. This data-cen-
Vertica powers the world’s most data driven or- ■■ Support for encryption, tokenization,
tric approach caters to the security needs of Big
ganizations, delivering unmatched speed and and data masking protection techniques.
Data analytics solutions such as Vertica.
scale with the full suite of advanced analytics
■■ Data usable for many applications in its
and in database machine learning.
With Voltage SecureData format-preserving de-identified state.
encryption and tokenization technologies, pro- ■■ The ability to re-identity data securely
Vertica can be deployed on premise in your
tection is applied to the data field and subfield and when required—only by authorized
own data center, in a private cloud or in public
level. This preserves characteristics of the orig- users and applications.
clouds including Amazon, Azure, and Google
inal data, including numbers, symbols, letters,
cloud platform. This same unified Vertica en- ■■ Enables significant reduction of audit scope
and numeric relationships such as date and
gine can be deployed natively on Apache and costs associated with PCI compliance
salary ranges. It also maintains referential integ-
Hadoop. Vertica SQL on Hadoop accelerates rity across distributed data sets so joined data ■■ Protection techniques backed by security
data exploration and SQL analytics while run- tables continue to operate properly. Voltage proofs and standards.
ning natively on an organization’s preferred SecureData protects data-at-rest, in-motion, ■■ High performance, high scalability, and well
Hadoop distribution. and in-use, so the majority of analytics can matched with Big Data speeds.
be performed on the de-identified data in its
■■ Broad platform and application support—
The Challenge: Securing protected form. Data scientists need not have
inside and outside Vertica.
Sensitive Data access to live payment card, personal, or pro-
As with any enterprise data architecture deploy- tected health information in order to deliver ■■ Supports the encryption and
ment, you face many security and regulatory business insights. pseudonymization guidance in the new
compliance challenges, especially when auto- GDPR (General Data Protection Regulation)
matically replicating data across multiple nodes, Solution Highlights legislation for EU data subjects.
handling multiple types of data, or enabling ac- Voltage SecureData brings a unique proven
cess by many different users with varying ana- data-centric approach to the protection of Security from the Source
lytic needs. sensitive data in Vertica. It also helps in signifi- Voltage SecureData encryption and tokenization
cantly reducing the scope of regulatory com- protection can be applied at the source before it
Sometimes the security options are not imple- pliance audits, such as Payment Card Industry gets into Big Data analytics environments. It can
mented in an optimal way. The most commonly (PCI) and Health Insurance Portability and also be evoked during an extract, transform, and
Contact us at:
www.microfocus.com
Figure 1. Options for securing data in Vertica Analytics platform

load (ETL) transfer to a landing zone or in the pro- ■■ Option 4: Using de-identified data within
cess of transferring data into Vertica analytic pro- Vertica
grams. Once the secure data is in Vertica, it can ■■ Option 5: Using re-identified data from
be used in its de-identified state for additional Vertica
processing and analysis without further interac-
■■ Option 6: Exporting data and re-identifying
tion with the Voltage SecureData system. When
outside Vertica (ETL / BI / Batch)
needed, analytic programs that run on Vertica
can securely access the clear text by utilizing the
Voltage SecureData high-speed decryption and About Voltage SecureData
de-tokenization interfaces, with the appropriate Voltage SecureData drives leadership in data-
level of authentication and authorization. centric security and encryption solutions. With
over 80 patents and 51 years of expertise, we
If processed data needs to be exported to protect some of the world’s largest brands and
downstream processing in the clear, for exam- neutralize breach impact by securing sensitive
ple, to perform actions such as customer mail- data at rest, in use, and in motion. Our solutions
ings there are multiple options for re-identifying provide advanced encryption, tokenization,
the data securely in Vertica. and key management that protect sensitive
data across enterprise applications, data
How It Works processing IT, cloud, payments ecosystems,
Six specific options with Voltage SecureData mission-critical transactions, storage, and Big
that protects sensitive data used in Vertica Big Data platforms. Voltage SecureData solves
Data analytics environments are listed here: one of the industry’s biggest challenges—how
■■ Option 1: Apply data protection during
to simplify the protection of sensitive data in
Vertica data-load process via Vertica’s even the most complex use cases.
User defined extention (UDx)
Learn More at
■■ Option 2: Apply data protection close to
www.microfocus.com/securedata
the application
www.vertica.com
■■ Option 3: Apply data protection for bulk
file loads

361-000029-003 | 4AA6-0855 | H | DS | 07/18 | © 2018 Micro Focus or one of its affiliates. Micro Focus and the Micro Focus logo, among others,
are trademarks or registered trademarks of Micro Focus or its subsidiaries or affiliated companies in the United Kingdom, United States and other countries.
All other marks are the property of their respective owners.

You might also like