LEVERAGE SECURITY IN HADOOP WITHOUT SACRIFICING USABILITY

As more data is imported into Hadoop Data Lakes, how can we best secure sensitive data? What security options are available and what kind of best practices should be implemented? Join Vincent Lam of Protegrity and Syed Mahmood of Hortonworks as they jointly discuss securing HDP data lakes to leverage security in Hadoop without sacrificing usability.
Watch Now

Spotlight

The Cloudant Location Tracker is a demo application that records a device's locations with HTML5, and saves it with JavaScript both on the device and to IBM Cloudant.


OTHER ON-DEMAND WEBINARS

How to Gain a Crisis Advantage with Real-Time Information

To reduce the impact of an unfolding crisis, companies need a clear, accurate and early line of sight into emerging risks. Leaders can then act with confidence and seize opportunities to preserve brand reputation while driving operational excellence. To demonstrate how real-time information can help companies gain advanced warn

A Better Alternative: Advanced Analytics and Alternative Data in Consumer Lending

The unsecured personal loan market is hot and growing rapidly. It is also prime testing grounds for the use of alternative sources of data and advanced analytics in marketing and loan decisioning, given the number of traditional and non-traditional lenders competing to meet consumer demand. Join Equifax and Aite Group as we dis

Expand Access to Credit with Alternative Data from Equifax

Equifax analysis indicates that approximately 91.5 million consumers in the US either have no credit file, or have insufficient information in the file to generate a traditional credit score. Your visibility into credit applicants determines whether you will offer more loans or miss profitable opportunities. By giving you incre

Harness Real-time Public Information to Improve Active Shooter Response

Corporate security teams hope never to respond to an active shooter situation. But given today’s realities, companies spend a great deal of time developing guidelines, holding training sessions, and carrying out drills to ensure that their staff will be prepared in case an active shooter event occurs. Protocols in place for many