Resources


Deploy Data-Centric Security to Protect Data across SQL, Hadoop and Big Data – On–Premises and in the Cloud

 

BlueTalon White Paper

Download



Data-centric Security in 2017: Laying the Foundation

 

Webinar

View Now




BlueTalon Data-Centric Security Platform – Technical Overview

 

BlueTalon Technical Paper

Download

Data-Centric Security and User Access Controls for Hadoop on Microsoft Azure

 

BlueTalon – Microsoft Partner Data Sheet

Download

The BlueTalon Policy Engine supports consistent and precise user access control to hybrid environments.

 

BlueTalon Product Overview

Download

BlueTalon brings enterprise-grade security to the Hadoop ecosystem

 

BlueTalon White Paper

Download

Technical Resources

Technical Blog

Control Access to Data on Azure HDInsight with BlueTalon

 

Azure HDInsight (HDI) makes it easy to quickly and cost-effectively process vast amounts of data in the cloud. Often, the data used in these analyses, such as customer information, transaction history, and other proprietary data, are sensitive from a business perspective and may even be subject to regulatory compliance. BlueTalon keeps enterprises in control of their data by allowing them to give users access to the data they need, not a byte more.

 

In this blog, we share how organizations can enable more business users to benefit from data in HDInsight by mitigating risks associated with putting sensitive data in the cloud through precise authorization and dynamic masking provided by BlueTalon.

Read More

Technical Blog

Using BlueTalon with Amazon EMR

 

BlueTalon is a leading provider of data-centric security solutions for Hadoop, SQL and Big Data environments on-premises and in the cloud. BlueTalon keeps enterprises in control of their data by allowing them to give users access to the data they need, not a byte more. BlueTalon solution works across AWS data services like EMR, Redshift and RDS.

 

In this blog post, we show how organizations can use BlueTalon to mitigate the risks associated with their use of sensitive data while taking full advantage of EMR.

Read More