Page 25 - Telecom Reseller March April 2014
P. 25



Telecom Reseller
25
March/April 2014



separately across a Hadoop cluster and then • Access to the Hadoop cluster itself cloud-based Hadoop services use Secure 
LEWIS
combined again to arrive at the final analyt- • Communications within the cluster Shell as an authentication method for 
ics. Greatly automated, the process incor- • Cluster access to the data sources
access to the Hadoop cluster.
Continued from page 17
porates a high ratio machine-to-machine The authorizations for access among As can be imagined, securing the identi- 
Automated Access
(M2M) interaction across the cluster to these automated connections are largely ties that provide access into and across the 
The first step towards securing Big perform the calculations.
based on Secure Shell keys, because SSH Big Data environment is a critical priority. 
Data lies in understanding how the pro- It is these automated M2M connections is considered secure and has good, built- Since the technology is relatively new and 
cess works. Applying Big Data analytics that present the risk.
in support for these kinds of automated has become popular so quickly, setting up 
requires dividing up large data sets into Within a Hadoop setup there are mul- machine-to-machine (M2M) communi- adequate security of these data assets pres- 
smaller pieces, which are then analyzed
tiple authorization levels, including:
cations. Administrators in many popular
ents a challenge. Some of the issues are 
commonplace:
• WhosetsuptheauthorizationstorunBig
Data analytics?
• How are those authorizations managed?
• Who has access to them?
• What happens to them when the person
who set them up leaves the organization?
• Is the level of access based on “need to
know” security principles?
These issues are widespread across data 
centers as process automation takes off 
and are not unique to Big Data analytics 
operations. In fact, more than 80 percent 
of data center network communications 
are automated M2M transactions, with less 
than 20 percent associated with interactive 
user-to-machine accounts. As a result, there 
has been an explosive growth of machine 
identities, even as the ratio of interactive 
user identities within a typical enterprise 
remains flat.

Big Risk from Unmanaged M2M 
Connections
If left unaddressed, the risks will only 
multiply. The consequences are not theo- 
retical. Recent high-profile data breaches 
have used stolen or lost machine-based HELPING YOU GET THERE. GREATAMERICA.
credentials as attack vectors to steal records 
and cause millions of dollars in damages. 
While organizations have improved their 
identity and access management (IAM) 
processes for end-users, M2M identities 
have been neglected by comparison. As 
a result, mismanaged M2M connections 
across the network can be compromised 
without the organization ever knowing.
Part two of “Encrypting the Wave of 
Big Data” will examine the current pro- 
cess for managing authentication keys that 
control access to M2M identities and offer GreatAmerica is committed to helping you achieve greater 
best practices for organizations looking success by providing financing solutions and complementary 
to combat security gaps in their network 
environments.
business services.


• Innovative commercial equipment financing solutions from the largest 
RUFFIN
private independent small-ticket equipment finance company in the U.S.

Continued from page 27
system is expensive and impactful on com- • Expertise to help you implement, finance, bill, and monitor your 
panies and their customers. Throwing out managed services: voice, print, and IT
any working system should be done only 
after careful consideration and justification.
• Fast and flexible financing from a dedicated team of communications 
On that topic, we are looking at ways to and IT professionals
expand or change the Nortel Notes column 
to incorporate or somehow address ques- 
tions about Cisco telephony systems. Any 
suggestions are welcome, as are questions. 
I cannot guarantee that Cisco PBX ques- 
tions will all be answered here, but please 
send any that you have. I’m just learning, 
but I have some resources available to me 
that may be called on. 
%
As above, please submit comments or questions as direct- www.greatamerica.com | 888.307.2641
ed below or tweet me directly @PhilRuf using hashtag 
#nortelnotes.














   23   24   25   26   27