Protect Your Data From RDBMS to NoSQL
Protect Your Data From RDBMS to NoSQL
When (RDBMS>NoSQL) data migration is in the wind, there are a couple of tools you can keep in mind to make sure it's secure.
Join the DZone community and get the full member experience.Join For Free
Running out of memory? Learn how Redis Enterprise enables large dataset analysis with the highest throughput and lowest latency while reducing costs over 75%!
The only constant in life is change, and those of us in technology know this to be true. Technologies that were experiments just five years ago are now de-facto standards. To stay competitive, organizations need to keep up with the latest business tech trends and adapt their infrastructure accordingly.
Today, C-Suites seek competitive advantage through big data. But, to fully benefit, organizations need to draw on various forms of data:
- Structured data in a range of heterogeneous applications and databases.
- Unstructured data that comes in an increasing number of file types.
Doing this frequently requires migration from a relational database management schema structure (RDBMS) to a NoSQL big data solution like Couchbase.
Migration from RDMBS to NoSQL, or, for that matter, any data migration, requires careful planning and sizing to ensure a smooth transition. Couchbase 4.5 makes the transition from relational to NoSQL easier than ever, with features like query editing and auto schema discovery with the Query Workbench, high-speed backup/restore. Security has to be part of this as well.
Security is an ever-changing battlefield. Rules of engagement and organizational "terrain" — always in flux — require a vigilant eye for potential data vulnerabilities. Any migration requires an analysis of your defensive and offensive positions to make sure your data are protected from theft. Couchbase 4.5 also added several important security features such as X.509 Certificates and role-based access control.
With the combined Couchbase and Vormetric solution, you can secure your data resources to address security policies and compliance mandates and to maintain your organization's reputation (and your career). This can only be accomplished through data encryption with integrated key management, privileged user access policies, and security intelligence.
While some vendors offer big data encryption capabilities, these offerings only secure specific big data nodes, not the original data sources that feed into the big data environment or the analytics that come out of the environment. Further, these big data encryption offerings don't secure all the log files and configuration information associated with the big data environment itself.
Because of these disparate approaches to big data security, IT teams have to contend with fragmented key and policy management. This adds administrative effort, while making it difficult to apply standards consistently. Further, these point approaches tend to degrade performance, which is a big concern in processing-intensive big data environments.
Vormetric and Couchbase offer a combined solution that empowers you to take advantage of all of the benefits of big data — while also maximizing the security and compliance needs of your sensitive data. In addition to transparent encryption, this unified solution offers:
- Granular privileged-user-access controls.
- Tokenization with dynamic masking, which can enhance system efficiency.
- Security intelligence.
- Full scalability.
Organizations need this kind of comprehensive coverage to secure sensitive data across their big data environments — including big data sources, infrastructure, and analytic results. By using this single, unified security solution, you can be confident your organization will benefit from the latest and greatest big data applications while keeping secure your most sensitive and valuable asset – your data.
Published at DZone with permission of Michael Rothschild . See the original article here.
Opinions expressed by DZone contributors are their own.