Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Protect Your Data From RDBMS to NoSQL

DZone's Guide to

Protect Your Data From RDBMS to NoSQL

When (RDBMS>NoSQL) data migration is in the wind, there are a couple of tools you can keep in mind to make sure it's secure.

· Database Zone
Free Resource

Check out the IT Market Clock report for recommendations on how to consolidate and replace legacy databases. Brought to you in partnership with MariaDB.

The only constant in life is change, and those of us in technology know this to be true. Technologies that were experiments just five years ago are now de-facto standards. To stay competitive, organizations need to keep up with the latest business tech trends and adapt their infrastructure accordingly.  

Today, C-Suites seek competitive advantage through big data. But, to fully benefit, organizations need to draw on various forms of data:

  • Structured data in a range of heterogeneous applications and databases.
  • Unstructured data that comes in an increasing number of file types.

Doing this frequently requires migration from a relational database management schema structure (RDBMS) to a NoSQL big data solution like Couchbase.

Migration from RDMBS to NoSQL, or, for that matter, any data migration, requires careful planning and sizing to ensure a smooth transition. Couchbase 4.5 makes the transition from relational to NoSQL easier than ever, with features like query editing and auto schema discovery with the Query Workbench, high-speed backup/restore. Security has to be part of this as well.

Security is an ever-changing battlefield. Rules of engagement and organizational "terrain" — always in flux — require a vigilant eye for potential data vulnerabilities. Any migration requires an analysis of your defensive and offensive positions to make sure your data are protected from theft.  Couchbase 4.5 also added several important security features such as X.509 Certificates and role-based access control.

With the combined Couchbase and Vormetric solution, you can secure your data resources to address security policies and compliance mandates and to maintain your organization's reputation (and your career). This can only be accomplished through data encryption with integrated key management, privileged user access policies, and security intelligence.

While some vendors offer big data encryption capabilities, these offerings only secure specific big data nodes, not the original data sources that feed into the big data environment or the analytics that come out of the environment. Further, these big data encryption offerings don't secure all the log files and configuration information associated with the big data environment itself.

Because of these disparate approaches to big data security, IT teams have to contend with fragmented key and policy management. This adds administrative effort, while making it difficult to apply standards consistently. Further, these point approaches tend to degrade performance, which is a big concern in processing-intensive big data environments.

Vormetric and Couchbase offer a combined solution that empowers you to take advantage of all of the benefits of big data — while also maximizing the security and compliance needs of your sensitive data. In addition to transparent encryption, this unified solution offers:

  • Granular privileged-user-access controls.
  • Tokenization with dynamic masking, which can enhance system efficiency.
  • Security intelligence.
  • Full scalability.

Organizations need this kind of comprehensive coverage to secure sensitive data across their big data environments — including big data sources, infrastructure, and analytic results. By using this single, unified security solution, you can be confident your organization will benefit from the latest and greatest big data applications while keeping secure your most sensitive and valuable asset – your data.

Interested in reducing database costs by moving from Oracle Enterprise to open source subscription?  Read the total cost of ownership (TCO) analysis. Brought to you in partnership with MariaDB.

Topics:
environment ,security ,big data applications ,nosql ,nodes ,encryption

Published at DZone with permission of Michael Rothschild. See the original article here.

Opinions expressed by DZone contributors are their own.

THE DZONE NEWSLETTER

Dev Resources & Solutions Straight to Your Inbox

Thanks for subscribing!

Awesome! Check your inbox to verify your email so you can start receiving the latest in tech news and resources.

X

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}