Skip to Content
Data Lake for Enterprises
book

Data Lake for Enterprises

by Vivek Mishra, Tomcy John, Pankaj Misra
May 2017
Beginner to intermediate
596 pages
15h 2m
English
Packt Publishing
Content preview from Data Lake for Enterprises

Analyzing security threats

Logs can be captured from various hardware and software components including business applications and analyzed for security threats by comparing with past datasets. According to various analyses conducted, different mechanisms of authentication (for example) can be done. Say, for example, we can step up authentication (two-factor); The request is coming from Nigeria repeatedly within a span of few minutes to be stepped up or altogether blocked for being reviewed by a human and then for authorizing the transaction.

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The Enterprise Big Data Lake

The Enterprise Big Data Lake

Alex Gorelik
Operationalizing the Data Lake

Operationalizing the Data Lake

Holden Ackerman, Jon King
Data Lakes

Data Lakes

Anne Laurent, Dominique Laurent, Cédrine Madera

Publisher Resources

ISBN: 9781787281349Supplemental Content