SlideShare uma empresa Scribd logo
1 de 19
Baixar para ler offline
Securely explore your data
BREAKING DOWN
DATA SILOS WITH
SQRRL ENTERPRISE
Adam Fuchs
CTO: Sqrrl Data, Inc.
February 26, 2014
DATABASES ARE GREAT!
•  Decouple data providers and consumers
•  Enable independent development
Database
Data Provider Data Consumer
... but how can we handle complex
security policies?
© 2014 Sqrrl | All Rights Reserved 2
COMPLEX SECURITY POLICIES
Healthcare Example
PII
Sensitive Diagnoses
Doctor’s Notes
3© 2014 Sqrrl | All Rights Reserved
TRADITIONAL SECURITY
Build security policy logic into the application
Database
Data Provider
Security
Policy
Data Consumer
Security
© 2014 Sqrrl | All Rights Reserved 4
Application Implements Security Through:
•  Database Views
•  Query Rewriting
MORE COMPLEX SECURITY...
5
Claims Data
EMRs
Public
Records
Genomic Data
Healthcare Fraud / Automated Diagnosis App
© 2014 Sqrrl | All Rights Reserved
COMBINATORIAL COMPLEXITY
Database
Data Provider
Security
Policy
Data Consumer
Security
Data Consumer
Security
Data Consumer
Security
Data Provider
Security
Policy
Data Provider
Security
Policy
© 2014 Sqrrl | All Rights Reserved 6
COMBINATORIAL COMPLEXITY
Database
Data
Provider
Security
Policy
Data
Consumer
Security
Data
Consumer
Security
Data
Consumer
Security
Data
Provider
Security
Policy
Data
Provider
Security
Policy
•  Security complexity
grows with sources
•  Leads to apps
specializing on security
•  Apps should be focused
on analytics
•  App maintenance, policy
changes complicate the
story
•  Cannot scale without
data-centric security
© 2014 Sqrrl | All Rights Reserved 7
ADVANCES IN IDENTITY AND
AUTHORIZATION MANAGEMENT
Federated Identity
"  Use common services for
authentication
"  Leverage technology like
OpenID, PKI, Single Sign-
On, Kerberos
"  Reduces administrative
burden for user management
Federated Authorization
"  Delegate authorization to
common services
"  Leverage technology like
OAuth, SAML, LDAP, AD
"  Ties into Data-Centric
Security concept
© 2014 Sqrrl | All Rights Reserved 8
DATA-CENTRIC SECURITY
•  Move policy enforcement out of the app and into
the database
•  Separate development of analysis from security
•  Layer with traditional security elements
•  Access control, auditing, encryption, ...
Data carries with it information needed to make
access control decisions.
© 2014 Sqrrl | All Rights Reserved 9
•  Sorted Key/Value Store
•  Fine-grained access control
(cell-level security)
•  Modeled after Google’s Bigtable
•  Distributed, Shared-Nothing
Architecture
•  Scales to 10s of Petabytes
•  Originally Developed in the US
Intelligence Community
•  Now Open-Source, Apache
Software Foundation:
accumulo.apache.org
© 2014 Sqrrl | All Rights Reserved
In#
Memory*
Map*
Write*Ahead*
Log*
(For*Recovery)*
Sorted,*
Indexe
d*File*
Sorted,*
Indexe
d*File*
Sorted,*
Indexe
d*File*
Tablet'Data'Flow'
Reads&
Iterator*
Tree*
Minor&
Compac
0on&
Merging&/&Major&
Compac0on&
Iterator*
Tree*
Writes& Iterator*
Tree*
Scan&
Tablet*Server*
Tablet*
Tablet*Server*
Tablet*
Tablet*Server*
Tablet*
ApplicaAon*
Zookeeper*
Zookeeper*
Zookeeper*
Master*
HDFS*
Read/Write&
Store/Replicate&
Assign/Balance&
Delegate&Authority&
Delegate&Authority&
ApplicaAon*
ApplicaAon*
Row Col. Fam. Col. Qual. Visibility Timestamp Value
John Doe Notes 2012-09-12 PCP_JD 20120912
Patient suffers
from an acute …
John Doe Test Results Cholesterol JD|PCP_JD 20120912 183
John Doe Test Results Mental Health JD|PSYCH_JD 20120801 Pass
John Doe Test Results X-Ray JD|PCP_JD 20120513 1010110110100…
ACCUMULO DATA FORMAT
11© 2014 Sqrrl | All Rights Reserved
Key Value
Cell-Level Tagging
DATA-CENTRIC ECOSYSTEM
12© 2014 Sqrrl | All Rights Reserved
DATA-CENTRIC SECURITY
ENABLES...
Secure Indexes
"  Challenge: Indexes reveal
information about the data
they represent
"  Solution: Preserve the
security model in an inverted
index with data-centric
security
Secure Knowledge-Bases
"  Challenge: Data
transformation obscures data
source and schema
"  Solution: Preserve the
security model in linked
documents with data-centric
security and fine-grained
access control
© 2014 Sqrrl | All Rights Reserved 13
Proxy Logs
BUILDING A SECURE KNOWLEDGE-BASE
14
Source Protocol Destination Port Bytes In Bytes Out
10.1.2.3 http google.com 80 73,824 15,632
10.1.2.4 https facebook.com 443 10,328 13,284,129
10.1.2.4 http google.com 80 623,249 93,125
10.1.2.3 unknown abcd1234.ru 31337 158 523,698,104
10.1.2.3 https netflix.com 443 434,855,357 1,392,994
10.1.2.4 https newcompany.com 443 23,084 583,331
10.1.2.3 ssh 10.1.2.5 22 204 158
© 2014 Sqrrl | All Rights Reserved
Proxy Logs
BUILDING A SECURE KNOWLEDGE-BASE
15
Source Protocol Destination Port Bytes In Bytes Out
10.1.2.3 http google.com 80 73,824 15,632
10.1.2.4 https facebook.com 443 10,328 13,284,129
10.1.2.4 http google.com 80 623,249 93,125
10.1.2.3 unknown abcd1234.ru 31337 158 523,698,104
10.1.2.3 https netflix.com 443 434,855,357 1,392,994
10.1.2.4 https newcompany.com 443 23,084 583,331
10.1.2.3 ssh 10.1.2.5 22 204 158
© 2014 Sqrrl | All Rights Reserved
Customer Access Logs
Time IP Address Username Location
12:38:01 10.1.2.4 johndoe Seattle
12:38:07 10.1.2.3 janedoe Boston
google.com
10.1.2.3
facebook.com
abcd1234.ru
netflix.com
10.1.2.4
10.1.2.5
johndoe
janedoe
Source Protocol Destination Port Bytes In Bytes Out
10.1.2.3 http google.com 80 73,824 15,632
10.1.2.4 https facebook.com 443 10,328 13,284,129
10.1.2.4 http google.com 80 623,249 93,125
10.1.2.3 unknown abcd1234.ru 31337 158 523,698,104
10.1.2.3 https netflix.com 443 434,855,357 1,392,994
10.1.2.4 https newcompany.com 443 23,084 583,331
10.1.2.3 ssh 10.1.2.5 22 204 158
BUILDING A SECURE KNOWLEDGE-BASE
© 2014 Sqrrl | All Rights Reserved 16
Data-centric security
makes this possible.
•  Multi-Structured Data
•  Multi-Layered Graph
•  Multi-Level Security
•  Multi-Tenancy
•  Universal Search and
Discovery
•  Simplified Infrastructure
•  Rapid Application
Innovation
HOW TO LEARN MORE
Sqrrl Data, Inc.
"  Big Data Platform with Data-Centric Security
" sqrrl.com
Download our White Paper
" www.sqrrl.com/whitepaper
Request a demo or one-on-one workshop
"  www.sqrrl.com/contact
17© 2014 Sqrrl | All Rights Reserved
18
Coming Up
"  Big Data Techcon
March 31-April 2, Cambridge MA
"  Accumulo Summit
June 12, Greenbelt MD
Accumulosummit.com
"  “Data Driven Applications with Sqrrl Enterprise”
Webinar: March 12, 2pm EST
Keep up with us on social media:
www.twitter.com/SqrrlData
www.facebook.com/SqrrlData
www.linkedin.com/company/sqrrl
© 2014 Sqrrl | All Rights Reserved
Securely explore your data
THANK YOU
Adam Fuchs
CTO: Sqrrl Data, Inc.
February 26, 2014

Mais conteúdo relacionado

Mais procurados

Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...Saul Tannenbaum
 
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera CaresGrace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera CaresCloudera, Inc.
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. Dscoopnewsgroup
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the UnionCloudera, Inc.
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionSplunk
 
Machine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting StartedMachine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting StartedSqrrl
 
Data Tools and the Data Scientist Shortage
Data Tools and the Data Scientist ShortageData Tools and the Data Scientist Shortage
Data Tools and the Data Scientist ShortageWes McKinney
 
Fighting cybersecurity threats with Apache Spot
Fighting cybersecurity threats with Apache SpotFighting cybersecurity threats with Apache Spot
Fighting cybersecurity threats with Apache Spotmarkgrover
 
SplunkLive! Customer Presentation - Penn State Hershey Medical Center
SplunkLive! Customer Presentation - Penn State Hershey Medical CenterSplunkLive! Customer Presentation - Penn State Hershey Medical Center
SplunkLive! Customer Presentation - Penn State Hershey Medical CenterSplunk
 
Getting Started with Splunk Enterprises
Getting Started with Splunk EnterprisesGetting Started with Splunk Enterprises
Getting Started with Splunk EnterprisesSplunk
 
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...Cloudera, Inc.
 
WWW19: SGX-PySpark: Secure Distributed Data Analytics
WWW19: SGX-PySpark: Secure Distributed Data AnalyticsWWW19: SGX-PySpark: Secure Distributed Data Analytics
WWW19: SGX-PySpark: Secure Distributed Data AnalyticsLEGATO project
 
Get full visibility and find hidden security issues
Get full visibility and find hidden security issuesGet full visibility and find hidden security issues
Get full visibility and find hidden security issuesElasticsearch
 
Hadoop Hadoop & Spark meetup - Altiscale
Hadoop Hadoop & Spark meetup - AltiscaleHadoop Hadoop & Spark meetup - Altiscale
Hadoop Hadoop & Spark meetup - AltiscaleMark Kerzner
 

Mais procurados (15)

Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
Meet sqrrl: The Cambridge company commercializing the NSA's surveillance enab...
 
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera CaresGrace Hopper Open Source Day Findings | Thorn & Cloudera Cares
Grace Hopper Open Source Day Findings | Thorn & Cloudera Cares
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
Machine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting StartedMachine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting Started
 
Data Tools and the Data Scientist Shortage
Data Tools and the Data Scientist ShortageData Tools and the Data Scientist Shortage
Data Tools and the Data Scientist Shortage
 
Fighting cybersecurity threats with Apache Spot
Fighting cybersecurity threats with Apache SpotFighting cybersecurity threats with Apache Spot
Fighting cybersecurity threats with Apache Spot
 
SplunkLive! Customer Presentation - Penn State Hershey Medical Center
SplunkLive! Customer Presentation - Penn State Hershey Medical CenterSplunkLive! Customer Presentation - Penn State Hershey Medical Center
SplunkLive! Customer Presentation - Penn State Hershey Medical Center
 
Getting Started with Splunk Enterprises
Getting Started with Splunk EnterprisesGetting Started with Splunk Enterprises
Getting Started with Splunk Enterprises
 
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
Cloudera Fast Forward Labs: The Vision and the Challenge of Applied Machine L...
 
WWW19: SGX-PySpark: Secure Distributed Data Analytics
WWW19: SGX-PySpark: Secure Distributed Data AnalyticsWWW19: SGX-PySpark: Secure Distributed Data Analytics
WWW19: SGX-PySpark: Secure Distributed Data Analytics
 
Get full visibility and find hidden security issues
Get full visibility and find hidden security issuesGet full visibility and find hidden security issues
Get full visibility and find hidden security issues
 
Apache Spot
Apache SpotApache Spot
Apache Spot
 
Hadoop Hadoop & Spark meetup - Altiscale
Hadoop Hadoop & Spark meetup - AltiscaleHadoop Hadoop & Spark meetup - Altiscale
Hadoop Hadoop & Spark meetup - Altiscale
 

Semelhante a Sqrrl February Webinar: Breaking Down Data Silos

What's Next for Google's BigTable
What's Next for Google's BigTableWhat's Next for Google's BigTable
What's Next for Google's BigTableSqrrl
 
Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Niel Dunnage
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoopNiel Dunnage
 
Blockchain and Apache NiFi
Blockchain and Apache NiFiBlockchain and Apache NiFi
Blockchain and Apache NiFiTimothy Spann
 
Taming Big Data with Big SQL 3.0
Taming Big Data with Big SQL 3.0Taming Big Data with Big SQL 3.0
Taming Big Data with Big SQL 3.0Nicolas Morales
 
Internet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry DisruptionInternet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry Disruptionimec
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseSplunk
 
Will SDN kill Ethernet Fabrics?
Will SDN kill Ethernet Fabrics?Will SDN kill Ethernet Fabrics?
Will SDN kill Ethernet Fabrics?Brocade
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityPaul Morse
 
Getting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionGetting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionSplunk
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Cisco DevNet
 
stackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutionsstackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutionsGaurav "GP" Pal
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything Cisco Canada
 
An Introduction to Hadoop and Cloudera: Nashville Cloudera User Group, 10/23/14
An Introduction to Hadoop and Cloudera: Nashville Cloudera User Group, 10/23/14An Introduction to Hadoop and Cloudera: Nashville Cloudera User Group, 10/23/14
An Introduction to Hadoop and Cloudera: Nashville Cloudera User Group, 10/23/14iwrigley
 
Snowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at ScaleSnowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at ScaleAdam Doyle
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromPROIDEA
 
Fast data for fitness 10 nov 2020
Fast data for fitness 10 nov 2020Fast data for fitness 10 nov 2020
Fast data for fitness 10 nov 2020Timothy Spann
 

Semelhante a Sqrrl February Webinar: Breaking Down Data Silos (20)

What's Next for Google's BigTable
What's Next for Google's BigTableWhat's Next for Google's BigTable
What's Next for Google's BigTable
 
Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoop
 
Blockchain and Apache NiFi
Blockchain and Apache NiFiBlockchain and Apache NiFi
Blockchain and Apache NiFi
 
Taming Big Data with Big SQL 3.0
Taming Big Data with Big SQL 3.0Taming Big Data with Big SQL 3.0
Taming Big Data with Big SQL 3.0
 
Internet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry DisruptionInternet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry Disruption
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Will SDN kill Ethernet Fabrics?
Will SDN kill Ethernet Fabrics?Will SDN kill Ethernet Fabrics?
Will SDN kill Ethernet Fabrics?
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
 
Getting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionGetting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout Session
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation
 
stackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutionsstackArmor - FedRAMP and 800-171 compliant cloud solutions
stackArmor - FedRAMP and 800-171 compliant cloud solutions
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
 
An Introduction to Hadoop and Cloudera: Nashville Cloudera User Group, 10/23/14
An Introduction to Hadoop and Cloudera: Nashville Cloudera User Group, 10/23/14An Introduction to Hadoop and Cloudera: Nashville Cloudera User Group, 10/23/14
An Introduction to Hadoop and Cloudera: Nashville Cloudera User Group, 10/23/14
 
Shanghai Breakout: Access Management with Aruba ClearPass
Shanghai Breakout: Access Management with Aruba ClearPassShanghai Breakout: Access Management with Aruba ClearPass
Shanghai Breakout: Access Management with Aruba ClearPass
 
Snowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at ScaleSnowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at Scale
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
Fast data for fitness 10 nov 2020
Fast data for fitness 10 nov 2020Fast data for fitness 10 nov 2020
Fast data for fitness 10 nov 2020
 

Mais de Sqrrl

Transitioning Government Technology
Transitioning Government TechnologyTransitioning Government Technology
Transitioning Government TechnologySqrrl
 
Leveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your HuntsLeveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your HuntsSqrrl
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkSqrrl
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphUser and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphSqrrl
 
Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Sqrrl
 
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingSqrrl
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Sqrrl
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivitySqrrl
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert TriageSqrrl
 
The Linked Data Advantage
The Linked Data AdvantageThe Linked Data Advantage
The Linked Data AdvantageSqrrl
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl
 
Benchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value StoreBenchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value StoreSqrrl
 
Scalable Graph Clustering with Pregel
Scalable Graph Clustering with PregelScalable Graph Clustering with Pregel
Scalable Graph Clustering with PregelSqrrl
 
April 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlApril 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlSqrrl
 
Sqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl
 
Performance Models for Apache Accumulo
Performance Models for Apache AccumuloPerformance Models for Apache Accumulo
Performance Models for Apache AccumuloSqrrl
 
Sqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl
 
Sqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl November Webinar: Encryption and Security in AccumuloSqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl November Webinar: Encryption and Security in AccumuloSqrrl
 

Mais de Sqrrl (20)

Transitioning Government Technology
Transitioning Government TechnologyTransitioning Government Technology
Transitioning Government Technology
 
Leveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your HuntsLeveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your Hunts
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior GraphUser and Entity Behavior Analytics using the Sqrrl Behavior Graph
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
 
Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)
 
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar Users
 
Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker Activity
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert Triage
 
The Linked Data Advantage
The Linked Data AdvantageThe Linked Data Advantage
The Linked Data Advantage
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber Hunting
 
Benchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value StoreBenchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value Store
 
Scalable Graph Clustering with Pregel
Scalable Graph Clustering with PregelScalable Graph Clustering with Pregel
Scalable Graph Clustering with Pregel
 
April 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlApril 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with Sqrrl
 
Sqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch Webinar
 
Performance Models for Apache Accumulo
Performance Models for Apache AccumuloPerformance Models for Apache Accumulo
Performance Models for Apache Accumulo
 
Sqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric SecuritySqrrl May Webinar: Data-Centric Security
Sqrrl May Webinar: Data-Centric Security
 
Sqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl November Webinar: Encryption and Security in AccumuloSqrrl November Webinar: Encryption and Security in Accumulo
Sqrrl November Webinar: Encryption and Security in Accumulo
 

Último

➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...amitlee9823
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Researchmichael115558
 
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men 🔝Sambalpur🔝 Esc...
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men  🔝Sambalpur🔝   Esc...➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men  🔝Sambalpur🔝   Esc...
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men 🔝Sambalpur🔝 Esc...amitlee9823
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNKTimothy Spann
 
➥🔝 7737669865 🔝▻ Ongole Call-girls in Women Seeking Men 🔝Ongole🔝 Escorts S...
➥🔝 7737669865 🔝▻ Ongole Call-girls in Women Seeking Men  🔝Ongole🔝   Escorts S...➥🔝 7737669865 🔝▻ Ongole Call-girls in Women Seeking Men  🔝Ongole🔝   Escorts S...
➥🔝 7737669865 🔝▻ Ongole Call-girls in Women Seeking Men 🔝Ongole🔝 Escorts S...amitlee9823
 
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...gajnagarg
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraGovindSinghDasila
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...amitlee9823
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...amitlee9823
 
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...amitlee9823
 
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night StandCall Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night StandCall Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Just Call Vip call girls Bellary Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls Bellary Escorts ☎️9352988975 Two shot with one girl ...Just Call Vip call girls Bellary Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls Bellary Escorts ☎️9352988975 Two shot with one girl ...gajnagarg
 
Detecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachDetecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachBoston Institute of Analytics
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...amitlee9823
 

Último (20)

CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men 🔝Sambalpur🔝 Esc...
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men  🔝Sambalpur🔝   Esc...➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men  🔝Sambalpur🔝   Esc...
➥🔝 7737669865 🔝▻ Sambalpur Call-girls in Women Seeking Men 🔝Sambalpur🔝 Esc...
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
 
➥🔝 7737669865 🔝▻ Ongole Call-girls in Women Seeking Men 🔝Ongole🔝 Escorts S...
➥🔝 7737669865 🔝▻ Ongole Call-girls in Women Seeking Men  🔝Ongole🔝   Escorts S...➥🔝 7737669865 🔝▻ Ongole Call-girls in Women Seeking Men  🔝Ongole🔝   Escorts S...
➥🔝 7737669865 🔝▻ Ongole Call-girls in Women Seeking Men 🔝Ongole🔝 Escorts S...
 
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls Palakkad Escorts ☎️9352988975 Two shot with one girl...
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - Almora
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
 
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night StandCall Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
 
Anomaly detection and data imputation within time series
Anomaly detection and data imputation within time seriesAnomaly detection and data imputation within time series
Anomaly detection and data imputation within time series
 
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night StandCall Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Shivaji Nagar ☎ 7737669865 🥵 Book Your One night Stand
 
Just Call Vip call girls Bellary Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls Bellary Escorts ☎️9352988975 Two shot with one girl ...Just Call Vip call girls Bellary Escorts ☎️9352988975 Two shot with one girl ...
Just Call Vip call girls Bellary Escorts ☎️9352988975 Two shot with one girl ...
 
Detecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachDetecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning Approach
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
 

Sqrrl February Webinar: Breaking Down Data Silos

  • 1. Securely explore your data BREAKING DOWN DATA SILOS WITH SQRRL ENTERPRISE Adam Fuchs CTO: Sqrrl Data, Inc. February 26, 2014
  • 2. DATABASES ARE GREAT! •  Decouple data providers and consumers •  Enable independent development Database Data Provider Data Consumer ... but how can we handle complex security policies? © 2014 Sqrrl | All Rights Reserved 2
  • 3. COMPLEX SECURITY POLICIES Healthcare Example PII Sensitive Diagnoses Doctor’s Notes 3© 2014 Sqrrl | All Rights Reserved
  • 4. TRADITIONAL SECURITY Build security policy logic into the application Database Data Provider Security Policy Data Consumer Security © 2014 Sqrrl | All Rights Reserved 4 Application Implements Security Through: •  Database Views •  Query Rewriting
  • 5. MORE COMPLEX SECURITY... 5 Claims Data EMRs Public Records Genomic Data Healthcare Fraud / Automated Diagnosis App © 2014 Sqrrl | All Rights Reserved
  • 6. COMBINATORIAL COMPLEXITY Database Data Provider Security Policy Data Consumer Security Data Consumer Security Data Consumer Security Data Provider Security Policy Data Provider Security Policy © 2014 Sqrrl | All Rights Reserved 6
  • 7. COMBINATORIAL COMPLEXITY Database Data Provider Security Policy Data Consumer Security Data Consumer Security Data Consumer Security Data Provider Security Policy Data Provider Security Policy •  Security complexity grows with sources •  Leads to apps specializing on security •  Apps should be focused on analytics •  App maintenance, policy changes complicate the story •  Cannot scale without data-centric security © 2014 Sqrrl | All Rights Reserved 7
  • 8. ADVANCES IN IDENTITY AND AUTHORIZATION MANAGEMENT Federated Identity "  Use common services for authentication "  Leverage technology like OpenID, PKI, Single Sign- On, Kerberos "  Reduces administrative burden for user management Federated Authorization "  Delegate authorization to common services "  Leverage technology like OAuth, SAML, LDAP, AD "  Ties into Data-Centric Security concept © 2014 Sqrrl | All Rights Reserved 8
  • 9. DATA-CENTRIC SECURITY •  Move policy enforcement out of the app and into the database •  Separate development of analysis from security •  Layer with traditional security elements •  Access control, auditing, encryption, ... Data carries with it information needed to make access control decisions. © 2014 Sqrrl | All Rights Reserved 9
  • 10. •  Sorted Key/Value Store •  Fine-grained access control (cell-level security) •  Modeled after Google’s Bigtable •  Distributed, Shared-Nothing Architecture •  Scales to 10s of Petabytes •  Originally Developed in the US Intelligence Community •  Now Open-Source, Apache Software Foundation: accumulo.apache.org © 2014 Sqrrl | All Rights Reserved In# Memory* Map* Write*Ahead* Log* (For*Recovery)* Sorted,* Indexe d*File* Sorted,* Indexe d*File* Sorted,* Indexe d*File* Tablet'Data'Flow' Reads& Iterator* Tree* Minor& Compac 0on& Merging&/&Major& Compac0on& Iterator* Tree* Writes& Iterator* Tree* Scan& Tablet*Server* Tablet* Tablet*Server* Tablet* Tablet*Server* Tablet* ApplicaAon* Zookeeper* Zookeeper* Zookeeper* Master* HDFS* Read/Write& Store/Replicate& Assign/Balance& Delegate&Authority& Delegate&Authority& ApplicaAon* ApplicaAon*
  • 11. Row Col. Fam. Col. Qual. Visibility Timestamp Value John Doe Notes 2012-09-12 PCP_JD 20120912 Patient suffers from an acute … John Doe Test Results Cholesterol JD|PCP_JD 20120912 183 John Doe Test Results Mental Health JD|PSYCH_JD 20120801 Pass John Doe Test Results X-Ray JD|PCP_JD 20120513 1010110110100… ACCUMULO DATA FORMAT 11© 2014 Sqrrl | All Rights Reserved Key Value Cell-Level Tagging
  • 12. DATA-CENTRIC ECOSYSTEM 12© 2014 Sqrrl | All Rights Reserved
  • 13. DATA-CENTRIC SECURITY ENABLES... Secure Indexes "  Challenge: Indexes reveal information about the data they represent "  Solution: Preserve the security model in an inverted index with data-centric security Secure Knowledge-Bases "  Challenge: Data transformation obscures data source and schema "  Solution: Preserve the security model in linked documents with data-centric security and fine-grained access control © 2014 Sqrrl | All Rights Reserved 13
  • 14. Proxy Logs BUILDING A SECURE KNOWLEDGE-BASE 14 Source Protocol Destination Port Bytes In Bytes Out 10.1.2.3 http google.com 80 73,824 15,632 10.1.2.4 https facebook.com 443 10,328 13,284,129 10.1.2.4 http google.com 80 623,249 93,125 10.1.2.3 unknown abcd1234.ru 31337 158 523,698,104 10.1.2.3 https netflix.com 443 434,855,357 1,392,994 10.1.2.4 https newcompany.com 443 23,084 583,331 10.1.2.3 ssh 10.1.2.5 22 204 158 © 2014 Sqrrl | All Rights Reserved
  • 15. Proxy Logs BUILDING A SECURE KNOWLEDGE-BASE 15 Source Protocol Destination Port Bytes In Bytes Out 10.1.2.3 http google.com 80 73,824 15,632 10.1.2.4 https facebook.com 443 10,328 13,284,129 10.1.2.4 http google.com 80 623,249 93,125 10.1.2.3 unknown abcd1234.ru 31337 158 523,698,104 10.1.2.3 https netflix.com 443 434,855,357 1,392,994 10.1.2.4 https newcompany.com 443 23,084 583,331 10.1.2.3 ssh 10.1.2.5 22 204 158 © 2014 Sqrrl | All Rights Reserved Customer Access Logs Time IP Address Username Location 12:38:01 10.1.2.4 johndoe Seattle 12:38:07 10.1.2.3 janedoe Boston google.com 10.1.2.3 facebook.com abcd1234.ru netflix.com 10.1.2.4 10.1.2.5 johndoe janedoe Source Protocol Destination Port Bytes In Bytes Out 10.1.2.3 http google.com 80 73,824 15,632 10.1.2.4 https facebook.com 443 10,328 13,284,129 10.1.2.4 http google.com 80 623,249 93,125 10.1.2.3 unknown abcd1234.ru 31337 158 523,698,104 10.1.2.3 https netflix.com 443 434,855,357 1,392,994 10.1.2.4 https newcompany.com 443 23,084 583,331 10.1.2.3 ssh 10.1.2.5 22 204 158
  • 16. BUILDING A SECURE KNOWLEDGE-BASE © 2014 Sqrrl | All Rights Reserved 16 Data-centric security makes this possible. •  Multi-Structured Data •  Multi-Layered Graph •  Multi-Level Security •  Multi-Tenancy •  Universal Search and Discovery •  Simplified Infrastructure •  Rapid Application Innovation
  • 17. HOW TO LEARN MORE Sqrrl Data, Inc. "  Big Data Platform with Data-Centric Security " sqrrl.com Download our White Paper " www.sqrrl.com/whitepaper Request a demo or one-on-one workshop "  www.sqrrl.com/contact 17© 2014 Sqrrl | All Rights Reserved
  • 18. 18 Coming Up "  Big Data Techcon March 31-April 2, Cambridge MA "  Accumulo Summit June 12, Greenbelt MD Accumulosummit.com "  “Data Driven Applications with Sqrrl Enterprise” Webinar: March 12, 2pm EST Keep up with us on social media: www.twitter.com/SqrrlData www.facebook.com/SqrrlData www.linkedin.com/company/sqrrl © 2014 Sqrrl | All Rights Reserved
  • 19. Securely explore your data THANK YOU Adam Fuchs CTO: Sqrrl Data, Inc. February 26, 2014