Premium Content

Access "Securing NoSQL applications: Best practises for big data security"

Published: 13 Oct 2012
Innovations with BI

This article is part of the July 2012 issue of Innovations with BI

NoSQL database systems are designed to provide real-time performance while managing large volumes of data.  This performance, coupled with the no-cost philosophy behind many NoSQL products, has led many companies to take a look at NoSQL. It is quite likely that new attack vectors will emerge that will target NoSQL data stores in new ways. However, companies should not rush to implement NoSQL without first evaluating the security implications of switching from a relational database management system (RDBMS) model to a NoSQL model. This tip will consider the security implications for any company thinking of deploying a NoSQL database. Who uses NoSQL? NoSQL can be an important tool for any company, large or small, that has big data. Big data is simply any data set that has grown too big to be efficiently worked on in real-time with traditional database tools. NoSQL is a broad class of database management systems that are not traditional relational database management systems. They do not use SQL as the primary query language, nor do they typically require fixed... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Computer Weekly networking case studies
    CW-EuroUserAwards2014 networking-1.jpg
    E-Handbook

    Jennifer Scott and Steve Evans discover what made the winning entries stand out from the crowd in the 2014 Computer Weekly European Awards for ...

  • Special Report on VDI
    VDI.png
    E-Handbook

    The articles contained here were written by Brian Madden, the fiercely independent thought leader in the world of virtualisation and mobility ...

  • Spies in the VPN
    CWE_150414_ezine_252.png
    E-Zine

    In this week’s Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out ...