Not a Gartner Client?
Want more research like this?
Learn the benefits of becoming a Gartner client.
Three distinct, competing stacks of security software are emerging from Apache Hadoop distributors in co-opetition with existing data security solutions, complicating choices for data and analytics leaders just as security emerges as a key concern.
Table of Contents
Impacts and Recommendations
Existing data security approaches assume DBMS-based policy enforcement for authenticated, authorized users; however, Hadoop's file system-based stack lacks these capabilities
Hadoop security stacks emerging from three independent distributors remain immature and are not comprehensive; they are therefore likely to create incompatible, inflexible deployments and promote vendor lock-in
Implementing a secure Hadoop deployment will require a new, closely managed custom-made stack to be built in partnership with organizational stakeholders including data stewards, data scientists and business users
- Existing data security approaches assume DBMS-based policy enforcement for authenticated, authorized users; however, Hadoop's file system-based stack lacks these capabilities
Gartner Recommended Reading