Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    image fx (67)
    Improving LinkedIn Ad Strategies with Data Analytics
    9 Min Read
    big data and remote work
    Data Helps Speech-Language Pathologists Deliver Better Results
    6 Min Read
    data driven insights
    How Data-Driven Insights Are Addressing Gaps in Patient Communication and Equity
    8 Min Read
    pexels pavel danilyuk 8112119
    Data Analytics Is Revolutionizing Medical Credentialing
    8 Min Read
    data and seo
    Maximize SEO Success with Powerful Data Analytics Insights
    8 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: The Big Data Security Transformation
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Data Management > Best Practices > The Big Data Security Transformation
AnalyticsBest PracticesBig DataData ManagementData MiningData VisualizationExclusivePredictive AnalyticsPrivacyRisk ManagementSecurityWorkforce Data

The Big Data Security Transformation

marcusweems
marcusweems
6 Min Read
big data security
SHARE

For those of us in the security profession it an extremely exciting but also daunting time.  The number and aggressiveness of threats are increasing while, at the same time, governmental bodies are requiring more and more for compliance. This growing challenge is being accompanied by the “Big Data” movement.

Contents
Threat IntelligenceAnalytics & VisualizationScaling InfrastructureBig Data Drives Efficient Security

For those of us in the security profession it an extremely exciting but also daunting time.  The number and aggressiveness of threats are increasing while, at the same time, governmental bodies are requiring more and more for compliance. This growing challenge is being accompanied by the “Big Data” movement.

big data securityBig Data is truly innovating the security profession like never before. In security terms, Big Data doesn’t simply mean lots of data; it demands significant intelligence to analytics to spot threats early on with infrastructure to collect and process data at scale. Today’s security systems still have long ways to go before being fully integrated in true big data sense. Security professionals need to be able to get increasing value from the data they already collect and analyze on top of the data they still are not getting.

Data from both IT and business is at the point where old school ad hoc processing simply will not work anymore, but much of the security industry is still doing things this way and it’s giving cyber attackers the upper hand. For example, according to the Verizon Breach Investigation Report, 91% of breaches led to compromise within days or less, but 79% of these took weeks or more to discover! Obviously this is a huge issue and shows that our defenses are falling behind attackers. The reasons for this are numerous, but I see three keys as to why:

More Read

Six Steps to ‘Bite-Sized’ SOA Governance
Know Your Numbers: The Dollar-Driven Guide to Holiday Emails
Another Wisdom of Crowds Prediction Win at eMetrics / Predictive Analytics World
From Police to Partner: The Changing Role of IT
The Advent And Scope Of AI Marketing In 2020 And Beyond
  1. Attackers are getting more organized and better funded – attacks are dynamic but defenses are still very much static in nature.
  2. IT has becoming more and more complex – organizations are now more open and agile resulting in new opportunities for communication, collaboration but also increases vulnerabilities.
  3. Compliance has grown much more far reaching and business are having a harder time keeping up with keeping controls in place to ensure proper management of them.

Implementation of Big Data in security is no longer a want, it’s become a necessity. Implementation of the big data methodology into security has three foundational elements: Threat Intelligence, Analytics & Visualization and Scaled Out Infrastructure.

Threat Intelligence

Threat Intelligence encompasses two major views to complete a holistic knowledge of what is occurring at all times. This means that not only do organizations need to fully understand their organization internally, but they must also have plentiful information on the currently external threat environment. Only then can security teams have a full view to correlate risks and events with clarity. Big data allows organizations to not only gain internal insight but also the major external data points for this correlation, a state that far too many security teams still lack.

Analytics & Visualization

The setup of analytics and visualization tools need to support the variety of security analysts and their specialties. For example, managers will most likely only need high-level visualizations and trending, while network forensics need to fully reconstruct all log and network information about specific sessions to determine exactly what happened.

Scaling Infrastructure

Internal infrastructures need to be able scale with agility to responding the ever changing IT environment, supporting new applications and methods of delivery like virtualization cloud computing and outsourcing. The security management infrastructure needs to have access to collect and manage data from all these at an enterprise scale.

Big Data Drives Efficient Security

One of the largest areas lacking in today’s security environment is efficiency but big data can provide dramatic advances in this in a number of ways:

  1. Eliminate manual tasks – Systems need to reduce the amount of manual repetitive tasks in investigations, like toggling between consoles. While it’s not possible to do this overnight, steady movement away from manual tasks is a key.
  2. Use context to highlight largest issues – Understanding the underlying business context is a key to prioritization of issues. A map between applications and the business process they support is highly important and Big Data provides this.
  3. Present only the most relevant info – Big Data enables the elimination of noise to allow a focus on high impact issues along with supporting data to highlight what the likely problems are.
  4. Include human comprehension – This also enables the reduction in analysis of the wrong items. Providing a built-in ability to identify issues using a level of human like intelligence allows security analysts to analyze only the most crucial issues.
  5. Predict future threats – Not only does the system need to defend against modern security risks but also include a predictive model that takes external threat data and internal situational awareness which moves a security group from passive to active.

(image: big data security / shutterstock)

TAGGED:cybersecurity
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

image fx (2)
Monitoring Data Without Turning into Big Brother
Big Data Exclusive
image fx (71)
The Power of AI for Personalization in Email
Artificial Intelligence Exclusive Marketing
image fx (67)
Improving LinkedIn Ad Strategies with Data Analytics
Analytics Big Data Exclusive Software
big data and remote work
Data Helps Speech-Language Pathologists Deliver Better Results
Analytics Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

bitcoin hackers and its safety
BlockchainExclusive

Useful Tips To Protect Your Bitcoin From Hackers

4 Min Read
GDPR and security
Best PracticesBig DataData ManagementExclusiveInternet of ThingsPolicy and GovernancePrivacySecurity

GDPR Fines, Ransomware, and Cybersecurity: What You Need To Know

9 Min Read
cloud computing threats
Cloud ComputingExclusiveITSecurity

The Most Pressing Threats To Cloud Computing And How To Thwart Them

6 Min Read
managed cloud hosting
Cloud ComputingExclusiveITSecurity

Delivering Security And Operational Efficiency In Multi-Cloud Environments

7 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive
AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?