SecureData Suite for Hadoop

HPE SecureData Suite for Hadoop

Data Centric Protection for Sensitive Data
in Hadoop

HPE SecureData protects sensitive data in the Data Lake – including Hadoop, Teradata, HPE Vertica, and other Big Data platforms. HPE SecureData is a data-centric framework that protects data end-to-end, and:

● Delivers secure analytics
● Protects data streaming from Internet of Things devices
● Enables PCI compliance, scope reduction
● Secures PII/PHI for data privacy

HPE SecureData is a data-centric framework that protects data end-to-end, from the moment of capture, through the business analysis, to the back-end data store. HPE SecureData technologies call for de-identifying the data as close to its source as possible, transforming sensitive data elements with usable, yet de-identified, equivalents that retain their format, behavior and meaning. HPE SecureData secures sensitive data at-rest in-use, and in-motion with
four core technologies.

Learn More


Format Preserving Encryption

HPE Format-Preserving Encryption (HPE FPE) provides high-strength encryption of data without altering the original data format and preserving business value and referential integrity across distributed systems and platforms.


Secure Stateless Tokenization

HPE Secure Stateless Tokenization (HPE SST) is stateless, eliminating the need for a token database. SST uses a pre-generated token mapping table, a proven, independently validated random token.


Stateless Key Management

HPE Stateless Key Management provides keys as needed with no storage or database management issues because database synchronization and frequent backups
are not required.


HPE SecureStorage

HPE SecureStorage provides an extra level of defense for data sets stored in volumes in the event of media removal, theft, and hardware recycling. HPE SecureStorage uses the native Linux dm-crypt along with HPE Stateless Key Management to protect data stored on Linux volumes. Also included is support for Transparent Data Encryption (TDE) in Hadoop, enabling granular access control for data-at-rest.

How it Works


HPE SecureData offers seven specific options for protecting sensitive data used in Hadoop, HPE Haven, Teradata and other Big Data platforms:

  1. Apply data protection at source applications
  2. Apply data protection during import into landing zone (ETL process)
  3. Apply data protection during import processing into Hadoop (e.g., SQL, Sqoop, MapReduce)
  4. Using de-identified data within Hadoop
  5. Using and exporting re-identified data from Hadoop (SQL, Hive, MapReduce)
  6. Exporting data and re-identifying outside Hadoop (ETL process)
  7. Using storage-level encryption within Hadoop

Learn more about HPE SecureData Suite for Hadoop


Technology Partnerships

HPE Security – Data Security has technology partnerships with Cloudera, IBM, Hortonworks, MapR, and Teradata, and the HPE SecureData Suite for Hadoop is certified to run on each of these.

“CISOs should not treat big data security in isolation, but require policies that encompass all data silos to avoid security chaos. New data-centric audit and protection solutions and management approaches
are required.”

Brian Lowans and Earl Perkins


Big Data Needs a Data-Centric Security Focus

March 26, 2014

More Information

HPE SecureData Suite for Hadoop

Read Data Sheet

Protecting Enterprise Data in Hadoop

Read Technical Brief

Secure Analytics in Hadoop – Retail/Pharma Supply Chain

Read Case Study

HPE SecureData for HPE Vertica – Securing Sensitive Data

Read Solution Brief

HPE SecureData for Teradata

Read Solution Brief

Data De-Identification

Read Use Case

 View our resources...

Secure Hadoop with Data-Centric Approach

Keep all sensitive data secure, as it moves into Hadoop, as it is stored, and as it moves
beyond Hadoop

Buy HPE SecureData Suite for Hadoop