Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

Apache Sentry

3.9
(4)

Apache Sentry is a system for enforcing fine grained role based authorization to data and metadata stored on a Hadoop cluster.

Work for Apache Sentry?

Learning about Apache Sentry?

We can help you find the solution that fits you best.

Apache Sentry Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • Industry
Ratings
Company Size
User Role
Industry
Showing 4 Apache Sentry reviews
LinkedIn Connections
Apache Sentry review by Industry Analyst / Tech Writer
Industry Analyst / Tech Writer
Validated Reviewer
Review Source
content

"Apache Dentry"

What do you like best?

Secure, fine-grained, role-based authorization

Multi-tenant administration

Role-based authorization

What do you dislike?

In some cases, the authorization is not as fine-grained as I could wish. Some examples:

If you give somebody a right to create a table in Hive database, then this user can also drop any table in this database. It would useful to user can only drop tables that she is the owner of, similarly to what “sticky-bit” provides for HDFS.

If you give somebody writes permissions to the Solr policy file to define privileges for some Solr collection, this user can actually change privileges for any collection.

What business problems are you solving with the product? What benefits have you realized?

Data security, delegate authorization and stuff

Sign in to G2 to see what your connections have to say about Apache Sentry
Apache Sentry review by Consultant in Primary/Secondary Education
Consultant in Primary/Secondary Education
Validated Reviewer
Review Source
content

"Apache Sentry Strong performance"

What do you like best?

I like that it supports impala, because that makes it more universal. Runs well and is highly organized.

What do you dislike?

I dislike that it is so close to Apache Ranger, and feel that these two programs should be synthesized to create a more effective hybrid.

What business problems are you solving with the product? What benefits have you realized?

I have been using Sentry to manage permissions and authorizations. Having the system makes things run much for smoothly.

What Risk-based Authentication solution do you use?

Thanks for letting us know!
Apache Sentry review by User in Computer Software
User in Computer Software
Validated Reviewer
Review Source
content

"Great for Hadoop authentication"

What do you like best?

Provides an integrated platform that works well with other Apache suite products to provide user authentication mechanisms.

What do you dislike?

Can sometimes take a long time to process requests.

Recommendations to others considering the product

Faster response time. Less delays in processing high volume queries.

What business problems are you solving with the product? What benefits have you realized?

User profile management, data security and authorization.

Apache Sentry review by User in Financial Services
User in Financial Services
Validated Reviewer
Review Source
content

"Easy authentication service"

What do you like best?

It's very simple to set up controls around providing different levels of access to employees. Definitely needed at a place where security and confidentiality are highly prioritized.

What do you dislike?

So far, I have no qualms about this product.

What business problems are you solving with the product? What benefits have you realized?

Confidentiality and authentication.

There are not enough reviews of Apache Sentry for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Okta Adaptive Multi-Factor Authentication Logo
Okta Adaptive Multi-Factor Authentication
4.4
(14)
Okta's Adaptive Multi-Factor Authentication is designed to be a security solution for all applications.
2
SecureAuth Logo
SecureAuth
4.4
(13)
2 Factor and SSO solution
3
RSA SecurID Risk-Based Authentication Logo
RSA SecurID Risk-Based Authentication
4.3
(6)
RSA SecurID Risk-Based Authentication is designed to enhance the traditional username and password log-in experience with a risk scoring engine that validates the legitimacy of user access requests.
4
RSA Adaptive Authentication Logo
RSA Adaptive Authentication
4.8
(4)
RSA Adaptive Authentication is a complete fraud detection platform that leverages risk-based, multifactor authentication to protect users accessing websites, online portals, mobile browsers and mobile apps.
5
ThreatMetrix Logo
ThreatMetrix
4.3
(2)
ThreatMetrix is a digital identity company that provides cloud solutions for authenticating digital personas and transactions on the internet.
6
IBM Security Risk Based Authentication Logo
IBM Security Risk Based Authentication
4.0
(1)
IBM Security Risk Based Authentication Solution provides transparent evidence-based fraud protection coupled with user access management.
7
BioCatch Logo
BioCatch
(0)
BioCatch offers behavioral authentication and malware detection for web and mobile applications.
8
Acceptto Cognitive Authentication Logo
Acceptto Cognitive Authentication
(0)
Acceptto is a cybersecurity company providing identity protection and Cognitive Continuous Authentication, threat modeling and analytics in a SaaS-based operating model.
9
TypindDNA Logo
TypindDNA
(0)
Typing biometrics is a keystroke dynamics verification technology suitable for SaaS, web apps, eLearning(LMS), ePayments and devices.
10
Preempt Platform Logo
Preempt Platform
(0)
At the heart of the Platform are a set of core capabilities including multi-dimensional data analysis, behavioral analytics, continuous risk assessment, adaptive response enforcement and a robust and flexible policy engine. These capabilities help to power the Platform for delivering a scalable set of applications that help customers prevent threats and support broad set of use cases. The applications include:
Show more
Kate from G2

Learning about Apache Sentry?

I can help.
* We monitor all Apache Sentry reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.