Executive Update

Data-Centric Security and Protection, Part III: Sensitive Data in Big Data Environments

Posted February 23, 2017 | Technology |
Curt Hall

To gain insight into the various trends and issues impacting enterprise data security and protection practices, and the extent to which organizations employ data-centric security practices and tech­nologies, Cutter Consortium surveyed 50 organizations worldwide. Here in Part III of this Executive Update series, we examine survey findings pertaining to the specific issues and concerns involving the protection of data maintained in big data platforms and applications.

About The Author
Curt Hall
Curt Hall is a Cutter Expert and a member of Arthur D. Little’s AMP open consulting network. He has extensive experience as an IT analyst covering technology and application development trends, markets, software, and services. Mr. Hall's expertise includes artificial intelligence (AI), machine learning (ML), intelligent process automation (IPA), natural language processing (NLP) and conversational computing, blockchain for business, and customer… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.