Book Image

Learn Azure Synapse Data Explorer

By : Pericles (Peri) Rocha
Book Image

Learn Azure Synapse Data Explorer

By: Pericles (Peri) Rocha

Overview of this book

Large volumes of data are generated daily from applications, websites, IoT devices, and other free-text, semi-structured data sources. Azure Synapse Data Explorer helps you collect, store, and analyze such data, and work with other analytical engines, such as Apache Spark, to develop advanced data science projects and maximize the value you extract from data. This book offers a comprehensive view of Azure Synapse Data Explorer, exploring not only the core scenarios of Data Explorer but also how it integrates within Azure Synapse. From data ingestion to data visualization and advanced analytics, you’ll learn to take an end-to-end approach to maximize the value of unstructured data and drive powerful insights using data science capabilities. With real-world usage scenarios, you’ll discover how to identify key projects where Azure Synapse Data Explorer can help you achieve your business goals. Throughout the chapters, you'll also find out how to manage big data as part of a software as a service (SaaS) platform, as well as tune, secure, and serve data to end users. By the end of this book, you’ll have mastered the big data life cycle and you'll be able to implement advanced analytical scenarios from raw telemetry and log data.
Table of Contents (19 chapters)
1
Part 1 Introduction to Azure Synapse Data Explorer
6
Part 2 Working with Data
12
Part 3 Managing Azure Synapse Data Explorer

Security overview

Security is a broad subject that covers several aspects of application, identity, and data protection. When thinking about security for cloud data environments, in general, there are five main pillars to consider:

  • Data encryption at rest and at transit: Protecting your data as it is stored on disk and while it is transferred over the network
  • How users authenticate: Providing an identity solution to authenticate users
  • How user access is determined: Controlling who gets access to what data, and their access level
  • How to protect access to public endpoints: Isolating your environment from other applications and protecting it from unwanted access over the internet
  • How to prevent online threats: Monitoring and responding to security threats

We will cover each of those pillars in detail but in the context of Azure Synapse workspaces and Data Explorer pools. Remember that Azure Synapse is a unified analytics platform that brings together several...