security

AML: Past, Present and Future – Part III

This is the third installment in a 3 part series. The first installment provides a short background on anti-money laundering. The second installment examines common AML problems faced by financial institutions today. In this installment, we introduce an approach that…
Read more

Cross-Functional Trade Surveillance

The Keystone to a Holistic Trade Surveillance Strategy Criminals don’t refer to a playbook of best practices to execute a crime. They are creative in their thinking and collaborative in their efforts (including with parties who may not know they…
Read more

Cloudera CDH 5.13 Delivers Enhanced Unified Platform and Security Capabilities

Your enterprise big data and machine learning initiatives can be delayed, fail, or risk security breach unless you choose the most mature, most tightly integrated platform. The good news is that enterprise big data and machine learning initiatives will benefit…
Read more

The Democratization of Data Through Schema on Read

The easy interchange of data is crucial for national defense and security, and for protecting infrastructure and lives, both civilian and warfighters. On a regular basis, branches of the military must exchange information among components, Federal agencies, coalition partners, foreign…
Read more

What’s New in HDP 2.6 for Enterprise Data Governance and Security? Part 1

Hortonworks continues to advance the Hortonworks Data Platform (HDP) as an integrated portfolio of enterprise security and governance products for big data. By building security and data governance into the platform we ensure that these capabilities are administered consistently across all the…
Read more