Zettaset Offers Big Data Security Options a la Carte

Zettaset, a provider of big data security, is making Zettaset Orchestrator's capabilities available as stand-alone product offerings to help organizations customize the security of their big data environments.

Zettaset Orchestrator is a distribution-agnostic management platform that delivers a comprehensive enterprise-ready big data security suite, and automates Hadoop configuration and management.

To support flexibility, Zettaset is now giving customers the option to leverage the complete platform, Orchestrator, or adopt individual feature applications as needed -- such as enterprise data encryption and multi-service high availability -- to customize and secure their big data environments.  Individual enterprise applications can function independently of the full Orchestrator solution, and can be deployed using the customer's management console of choice. Zettaset's modularized applications are also designed to interoperate with any Apache open-source Hadoop or NoSQL database, giving customers maximum flexibility when determining where, when, and how to deploy.

"Creating an enterprise-class big data security platform is a non-trivial task, and Zettaset has been at the forefront of this development for the past two years with our Orchestrator management and security platform," said Jim Vogt, CEO of Zettaset. "Customers can now also take full advantage of Zettaset's best-in-class capabilities, such as standards-based encryption, as stand-alone applications within their centralized enterprise data management framework."

Zettaset's patent-pending Data-at-rest Encryption is the first high-value application that will be available as a stand-alone product, with general availability planned for August 15, 2014.

Additional Zettaset application modules that will be rolled out in the coming months include a Multi-Service High Availability framework, Zettaset's unique, patented technology which provides automated failover for each and every service running in a Hadoop cluster; High-availability Kerberos authentication with automated fail-over; and Fine-grained role-based access control for multi-tenant environments.

For more information, go to