This Blog has Moved!

This blog is moving to


Thank you for visiting! Content will remain here for archival purposes.

How Identity Management Solves Five Hadoop Security Risks

The following is external content provided as a free resource for blog readers.





This white paper explores how configuring Hadoop environments in secure mode before they enter production, strictly controlling user access to and administrative privileges within the Hadoop cluster, and auditing user and administrative activity helps companies to avoid key Hadoop security risks including:

  • The formation of new application identity silos

  • Runaway administrator privileges

  • Decreased mitigation capabilities

  • Diminished regulatory compliance






Request Free!

No comments:

Post a Comment