Securing Your Data at Cloud Scale

Next: A Risk Management Approach to Information Security
Previous: Introducing Matchlight Data Intelligence
The technologies that power Matchlight didn't exist two years ago.
Writer Danny R.
May 30, 2015

Danny is one of the founders of Terbium and is known around the office for his extended soliloquies and pontifications about the security industry. He blogs about global trends and the importance of knowing where one's data is on the dark web.

Matchlight is powered by the latest in large-scale computational technologies.

Matchlight bridges the gap between big data and information security. Built on technologies including the MapR Distribution of Apache Hadoop, Apache Spark, and Python, Matchlight constantly scours the web for matches against the fingerprints of your most sensitive data.

When you submit an asset to Matchlight, you compute a fingerprint of your data. That fingerprint is a one-way cryptographic representation of your data. No other party, not even Terbium Labs, can reverse the fingerprint into the original document. Our patented fingerprinting technology is based on standard cryptographic primitives, and is fully auditable by our customers.

Your document’s fingerprint is loaded into our massive compute cluster, which immediately and automatically begins scouring the web and the dark web for matches. When we find a hit, we calculate a Matchlight Score and notify you immediately.

A system like Matchlight must be designed from the start for scale. And not just future scale — we already hold immense number of fingerprints and grow by billions every day. Apache Hadoop, and especially the MapR distribution of Apache Hadoop with MapR-DB, is built for this scale. Apache Spark is a game-changer for batch and streaming processing across massive data stores, enabling us to match find hits on your most sensitive assets immediately upon seeing them in the wild.

Just a few years ago, monitoring assets at this scale with this level of privacy would have been impossible. With today’s cutting edge technology, coupled with Terbium’s expertise, we can provide this service and enable a customer to know within minutes when their most sensitive assets appear in a place they should not be.

RELATED ARTICLES
technical April 16, 2018
Privacy, Regulation, and Data Fingerprinting

We at Terbium are big fans of GDPR. Not only have we argued that regulation has a strong role to play in ensuring individual privacy and security, but we’ve built our product, Matchlight, entirely...

technical July 14, 2017
NessAWS: Our Journey Towards Continuous Monitoring

Introducing our free, open-source tool for facilitating continuous monitoring in the cloud.