Tag: security

Fraud & Security Intelligence
Stavros Stavrinoudakis 0
Visual Investigation: the emerging role for Audit, Compliance, Safety & Security, Health and Financial Crime Departments

From national security agencies, law enforcement organizations looking to terrorism and criminal activities, internal security, audit and compliance departments, to hospitals and public health organizations guarding against disease outbreaks, there are many common needs and constant challenges, e.g.: Detect an event of interest in the early stages. Investigate suspicious events

Lavanya Mandavilli 0
Passcode security for SAS Mobile BI

Mobile devices travel with humans pretty much anywhere that humans want to go. Unlike desktop computers that stay fixed and grounded within brick and mortar walls, mobile devices are used in all sorts of locales – offices, homes, cars, planes, swimming pools, soccer fields, movie theaters – the list goes

Advanced Analytics
Phil Weiss 0
5 Challenges of cloud analytics

The need for fast and easy access to high-powered analytics has never been greater than it is today. Fortunately, cloud processing still holds the promise of making analytics more transparent and ubiquitous than ever before. Yet, a significant number of challenges still exist that prevent more widespread adoption of cloud

SAS Administrators
John Hall 0
SAS Backup and Recovery Tool

In researching material for an upcoming project, I investigated the SAS Deployment Backup and Recovery Tool available in SAS 9.4. Here are some of my findings on identifying what directories are included in a Backup and Recovery session and how to add custom directories to a backup configuration. The SAS

SAS Administrators
Stuart Rogers 0
SAS and Hadoop—living in the same house

So, with the simple introduction in Understanding Hadoop security, configuring Kerberos with Hadoop alone looks relatively straightforward. Your Hadoop environment sits in isolation within a separate, independent Kerberos realm with its own Kerberos Key Distribution Center. End users can happily type commands as they log into a machine hosting the

1 2