CIOApplications
static-image
  • Home
  • Applications
      • Auction Software
      • Audit Management
      • Bioinformatics
      • Business Continuity
      • Business Intelligence
      • Chatbot
      • Club Management
      • Collaboration
      • CPQ
      • Custom Software Development
      • CRM
      • Data Platform
      • Digital Experience
      • e-Discovery
      • E-Signature
      • Employee Engagement
      • EAM
      • Enterprise Communications
      • Enterprise Mobility
      • Enterprise Reporting Software
      • Enterprise Search
      • Forestry
      • GIS
      • GRC
      • Human Resource
      • Indoor Positioning
      • Innovation Management
      • InsurTech
      • Intellectual Property
      • IT Infrastructure
      • IT Operations Management
      • IT Service Management
      • License Management
      • Low Code Platform
      • Maintenance Management
      • Managed IT Services
      • MarTech
      • Master Data Management
      • Order Management
      • Parking Management
      • Personalization
      • Portal Software
      • Procurement Tech
      • Publishing Software
      • Quality Management System
      • Remote Monitoring
      • Remote Support
      • RFID
      • Sales Tech
      • Software Asset Management
      • Software Testing
      • Task Management
      • Unified Communications
      • Visitor Management
      • Voice Recognition
      • Web Design and Development
      • Workflow
      • Workplace Management
  • Verticals
      • Automotive
      • Banking
      • BioTechnology
      • Casino
      • Construction
      • CPG
      • Contact Center
      • Education
      • Energy
      • Field Service
      • Fintech
      • Food and Beverages
      • Government
      • Healthcare
      • Legal
      • Life Sciences
      • Logistics
      • Manufacturing
      • Media and Entertainment
      • Retail
      • Travel and Hospitality
      • Utilities
  • Technologies
      • 3D Scanning
      • Agile
      • API
      • Artificial Intelligence
      • Augmented Reality
      • Blockchain
      • CAD/CAM
      • Cloud
      • Container Management
      • Cyber Security
      • Data Analytics
      • Data Center
      • DevOps
      • Drone
      • Graphics
      • Hyper Converged Infrastructure
      • Image Recognition
      • IoT
      • Lidar
      • Machine Learning
      • Machine Vision and Imaging
      • Nano Tech
      • Networking
      • Predictive Analytics
      • PropTech
      • RF and Microwave
      • Robotic Process Automation
      • Robotics
      • Security
      • Simulation
      • Smart Labelling
      • Space Tech
      • Telematics
      • Virtual Assistant
  • Company Eco System
      • Adobe
      • Amazon
      • Avaya
      • ESRI
      • Google
      • IBM
      • Infor
      • Microsoft
      • Mitel Partners
      • National Instruments
      • NetSuite
      • Oracle
      • Progress
      • Qlik Partner
      • Riverbed
      • Salesforce
      • SAP
      • ServiceNow
      • SiteCore
      • Splunk Partner
      • VMware
  • News
  • conferences
  • Newsletter
  • Whitepaper
  • About us
  • Specials

  • Menu
      • Amazon
      • Artificial Intelligence
      • Auction Software
      • Blockchain
      • CAD/CAM
      • Club Management
      • CPQ
      • Digital Experience
      • E-Signature
      • Education
      • Energy
      • Enterprise Mobility
      • Food and Beverages
      • GRC
      • Healthcare
      • Image Recognition
      • Indoor Positioning
      • Infor
      • Intellectual Property
      • IoT
      • Legal
      • Lidar
      • Logistics
      • NetSuite
      • Personalization
      • Predictive Analytics
      • Quality Management System
      • Remote Monitoring
      • Retail
      • RF and Microwave
      • Riverbed
      • Simulation
      • Task Management
      • Utilities
      • VMware
      • Workflow
  • VMware
  • Amazon
  • Artificial Intelligence
  • Auction Software
  • Blockchain
  • CAD/CAM
  • Club Management
  • CPQ
Specials
  • Specials

  • Amazon
  • Artificial Intelligence
  • Auction Software
  • Blockchain
  • CAD/CAM
  • Club Management
  • CPQ
  • Digital Experience
  • E-Signature
  • Education
  • Energy
  • Enterprise Mobility
  • Food and Beverages
  • GRC
  • Healthcare
  • Image Recognition
  • Indoor Positioning
  • Infor
  • Intellectual Property
  • IoT
  • Legal
  • Lidar
  • Logistics
  • NetSuite
  • Personalization
  • Predictive Analytics
  • Quality Management System
  • Remote Monitoring
  • Retail
  • RF and Microwave
  • Riverbed
  • Simulation
  • Task Management
  • Utilities
  • VMware
  • Workflow
×
#

CIO Applications Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Applications

Subscribe

loading
  • Home
  • Cyber Security
Editor's Pick (1 - 4 of 8)
left
Augmenting Cybersecurity in Healthcare Industry

Augmenting Cybersecurity in Healthcare Industry
Robert Napoli, CIO, Planned Parenthood of the Great Northwest and the Hawaiian Islands

Security Solutions for Cyber Risk Mitigation

Security Solutions for Cyber Risk Mitigation
Colin Black, CIO, Crowd Strike

The Tao of Cyber Security in today's reality

The Tao of Cyber Security in today's reality
Marc DeNarie, CIO, NaturEner USA & Canada

Preventing Cyber-Attacks in Universities with Operational Collaboration

Preventing Cyber-Attacks in Universities with Operational...
Michael Corn, Deputy CIO & CISO, Brandeis University

Addressing Cyber Security Strategically

Addressing Cyber Security Strategically
David L Stevens, CIO, Maricopa County

Ever-Changing Cyber Security of Business Community

Ever-Changing Cyber Security of Business Community
Jim Sills, CIO/Cabinet Secretary, State of Delaware

IT- A Game-changer in Cybersecurity

IT- A Game-changer in Cybersecurity
Tammy Moskites, CIO and CISO, Venafi

The Realities of Cybersecurity

The Realities of Cybersecurity
Doug Mullarkey, CIO, First Choice Loan Services Inc.

right

Thank you for Subscribing to CIO Applications Weekly Brief

Solving For Data Security And Privacy In IOT

By Carole Murphy, Product Marketing Manager, HPE Security – Data Security, Hewlett Packard Enterprise

Tweet
content-image

Carole Murphy, Product Marketing Manager, HPE Security – Data Security, Hewlett Packard Enterprise

The Internet of Things (IoT) promises new value and revenues to the enterprise – and new challenges. The scale of data has become massive, and most of that information lands in Hadoop or a “data lake” where the need for rapid insights has never been greater. However, cyber threats are also targeting this data looking to steal the most valuable assets of the enterprise, sensitive high-value data. At the same time, increasingly stringent data privacy regulations such as the European General Data Protection Regulation (GDPR) are requiring the protection and privacy of personal data, with grave consequences for non-compliance.

The data generated from IoT is a valued commodity for adversaries, as they can piece together sensitive information to build a user profile that contains Personally Identifiable Information (PII), Payment Card Information (PCI) or Protected Health Information (PHI). For example, a breach of a connected blood pressure monitor’s readings alone may have no value to an attacker, but when paired with a patient’s name, it could become identity theft and a violation of (HIPAA) regulations. A “data-centric” approach to security is essential in protecting this sensitive information in the instance of a breach.

However, implementing a data-centric security approach can be a daunting process, especially in the rapidly evolving Hadoop space. It is essential for long-term success and future-proofing investments, to apply technology via a framework that can adapt to the rapid changes in Hadoop “data lake” and IoT environments.

The integration of high-strength format-preserving encryption with NiFi processor technology extends data centric protection for IoT data


Unfortunately, implementations based on agents frequently face issues when new releases or technologies are introduced into the stack, and require updating in Hadoop multiple times.

What’s needed is a framework that enables rapid integration into the newest technologies, to allow broad access to data for secure analytics. The obvious answer for true Hadoop security is to augment infrastructure controls that protect the data itself. This data-centric security approach calls for de-identifying the data as close to its source as possible. By combining two technologies—format-preserving encryption, and Apache NiFi technology—organizations can get a framework that extends data-centric protection from simply Big Data to the IoT edge.

With format-preserving encryption, protection is applied at the data field and sub-field levels, preserving characteristics of the original data–such as numbers, symbols, or letters in a birth date or salary range–and maintaining the referential integrity across distributed data sets. This protected form of the data can then be used in applications, analytic engines, data transfers, and data stores, while being readily and securely re-identified for those specific applications and users that require it. As with other data sources, sensitive streaming information from IoT connected devices and sensors can be protected with format-preserving encryption to secure sensitive data from both insider risk and external attacks, while the values in the data maintain usability for analysis.

Apache NiFi, a recent technology innovation, is enabling IoT to deliver on its potential for a more connected world. Apache NiFi began as a Federal government project, then became a start-up, and subsequently developed into an open source platform that enables security and risk architects, as well as business users, to graphically design and easily manage data flows in their IoT or back-end environments.

The integration of high-strength format-preserving encryption with NiFi processor technology extends data-centric protection for IoT data throughout its lifecycle by enabling organizations to encrypt streaming data at scale, before it moves into the back-end Hadoop data lake for secure analytics. With these solutions, organizations can incorporate data security into their IoT strategies by allowing them to more easily manage sensitive data flows and insert encryption closer to the intelligent edge.

Headquartered in California, USA, Hewlett Packard Enterprise (NYSE: HPE) specializes in IT services and has catered to numerous businesses in their transition from traditional technology platforms to the IT systems of the future.

Check out: Top Managed Security Companies

tag

IoT

Hadoop

Big Data

Read Also

Addressing Cyber Security Strategically

Addressing Cyber Security Strategically

David L Stevens, CIO, Maricopa County
Ever-Changing Cyber Security of Business Community

Ever-Changing Cyber Security of Business Community

Jim Sills, CIO/Cabinet Secretary, State of Delaware
IT- A Game-changer in Cybersecurity

IT- A Game-changer in Cybersecurity

Tammy Moskites, CIO and CISO, Venafi
The Realities of Cybersecurity

The Realities of Cybersecurity

Doug Mullarkey, CIO, First Choice Loan Services Inc.

Weekly Brief

loading
ON THE DECK

Cyber Security 2019

Top Vendors

Cyber Security 2018

Top Vendors

Cyber Security 2017

Top Vendors

Previous Next

Featured Vendors

  • INTEGRITY Security Services: Embedded Iot Security and Management
    INTEGRITY Security Services: Embedded Iot Security and Management
  • 3i International: Ingenious Cyber Security Solutions
    3i International: Ingenious Cyber Security Solutions
  • Absolute: Self-healing Endpoint Security
    Absolute: Self-healing Endpoint Security
  • Axiad IDS: Preventing Cybersecurity Threats with Axiad ID Cloud
    Axiad IDS: Preventing Cybersecurity Threats with Axiad ID Cloud

Copyright © 2019 CIOApplications. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap  |  Subscribe

follow on linkedin follow on twitter follow on rss
This content is copyright protected close

However, if you would like to share the information in this article, you may use the link below:

https://cyber-security.cioapplications.com/cxoinsights/solving-for-data-security-and-privacy-in-iot-nid-479.html