MapR Technologies, Inc., the Hadoop technology leader, today announced at Strata Conference + Hadoop World 2013 comprehensive, native security authentication and authorization with the MapR Distribution for Apache™ Hadoop®. Now businesses are able to easily meet stringent security requirements and regulations with security functionality that comes included with the MapR Distribution for Hadoop. MapR combines Apache Hadoop with architectural innovations and will be showcasing its platform at Strata Conference + Hadoop World, New York, in Booth #102.

MapR’s security innovations enable businesses to secure all of the Hadoop ecosystem components through a simple, fast and self-contained security model that provides protection against security threats including user impersonation, rogue daemons and malicious remote procedure calls. With MapR’s strong, wire-level authentication all access control on tables, columns, jobs, queues and volumes is protected. MapR’s native authentication also protects ecosystem projects such as Apache Hive and Drill. Organizations have the flexibility to choose between an existing Kerberos authentication scheme and a native Hadoop authentication scheme.

“Hadoop is an enterprise solution, making security a critical component,” said Ben Woo, principal analyst, Neuralytix.  “Very few Hadoop clusters today meet enterprise-grade security requirements.  With MapR’s innovations businesses can meet stringent security requirements and regulations easily with security functionality that come out-of-the-box with the MapR Distribution for Hadoop.”

“Bringing innovative, groundbreaking technology to market complements our strategic focus on delivering outstanding analytics and operations, while enhancing our position as the Hadoop choice for production success,” said John Schroeder, CEO and cofounder, MapR Technologies. “With this release our customers have comprehensive access control with unmatched flexibility and ease of use.”

Highlights of Native Authentication
All operations on the MapR Distribution of Hadoop are secured natively. For example, file reads and writes, HBase operations and MapReduce job submissions are secured natively. Intra-cluster node-node interactions including remote procedure calls are also secured natively.

Hadoop initiates and maintains secure communication across the cluster without requiring third-party infrastructure. Users are authenticated through a simple and secure username/password mechanism that integrates into standard enterprise directory services including LDAP, Active Directory and NIS. All cluster nodes authenticate and interact with each other through secure keys.