This video is still being processed. Please check back later and refresh the page.

Uh oh! Something went wrong, please try again.

Securing the HPE Ezmeral Data Fabric

Covers the basics of securing the Ezmeral Data Fabric cluster, with details on auditing, encryption, and built-in security options.

rate limit

Code not recognized.

About this course

After a brief review of the data security landscape and key terminology, this course goes over how the functions of authentication, authorization, auditing, and encryption specifically relate to securing the Data Fabric. Next, the course discusses ways to secure data on the Data Fabric cluster and covers the advantages of running a Data Fabric cluster in secure mode. Finally, the latest security features are reviewed.

What's covered

Data security landscape and terms
  • Data security landscape review
  • Key functions: secrets, authentication, authorization, attestation, auditing, encryption
Secure the Data Fabric cluster
  • Secure vs. unsecure modes
  • Authentication: security tickets and keys
  • Authorization: users and groups, access controls and ACEs
  • Auditing: options, operations, and logs
  • Encryption: at rest and wire encryption methods, Dynamic Data Masking (DDM)
Ezmeral Data Fabric built-in security features
  • Volume permissions
  • Impersonation
  • Policy-based security
  • Keystore integrations

Curriculum37 min

  • Preview
    Course topics 1 min
  • Data security landscape and terms 5 min
  • Secure the Data Fabric cluster 15 min
  • Ezmeral Data Fabric built-in security features 16 min
  • Quiz
  • Course materials
  • Security glossary

About this course

After a brief review of the data security landscape and key terminology, this course goes over how the functions of authentication, authorization, auditing, and encryption specifically relate to securing the Data Fabric. Next, the course discusses ways to secure data on the Data Fabric cluster and covers the advantages of running a Data Fabric cluster in secure mode. Finally, the latest security features are reviewed.

What's covered

Data security landscape and terms
  • Data security landscape review
  • Key functions: secrets, authentication, authorization, attestation, auditing, encryption
Secure the Data Fabric cluster
  • Secure vs. unsecure modes
  • Authentication: security tickets and keys
  • Authorization: users and groups, access controls and ACEs
  • Auditing: options, operations, and logs
  • Encryption: at rest and wire encryption methods, Dynamic Data Masking (DDM)
Ezmeral Data Fabric built-in security features
  • Volume permissions
  • Impersonation
  • Policy-based security
  • Keystore integrations

Curriculum37 min

  • Preview
    Course topics 1 min
  • Data security landscape and terms 5 min
  • Secure the Data Fabric cluster 15 min
  • Ezmeral Data Fabric built-in security features 16 min
  • Quiz
  • Course materials
  • Security glossary

For more information on how HPE manages, uses and protects your information please refer to HPE Privacy Statement. You can always withdraw or modify your consent to receive marketing communication from HPE. This can be done by using the opt-out and preference mechanism at the bottom of our email marketing communication or by following this link.

×