Discover Performance

HP Software's community for IT leaders // April 2013
Subscribe

Boost your security with big data

Somewhere in all your data is your next security coup—or failure. Find out how to mine big data for high-def security.
 
Enterprises are creating data at a tremendous rate, and mining it for intelligence. At leading organizations, it’s not just marketing and sales—security is getting into the act. Massive, real-time data analytics capabilities open up new vistas for understanding the corporate threat profile in near-real time. This opportunity is driven by three fundamental promises of today’s big data analytics solutions:
 
Greater data velocity: In the past, the time it took to return a complex data query was hours, or even days—far too long to make the data actionable against a current threat. The window to address a critical security issue can be mere minutes, if not seconds. Fortunately, today’s near-real-time event processing means potential threats can be found and addressed with that same speed.
 
Increased data volume: Unstructured data, such as tweets and Facebook posts, is a new source of security intelligence. For banks and other organizations with highly sensitive information, the ability to perform sentiment analysis, as one example, on this type of Internet data is an invaluable advancement. To defend against a real-time threat actor, the capability must exist to understand that actor’s tactics and operation in real time, based on any and all available structured and unstructured data.
 
Variety of data: Thanks to big data, security experts can make a better assessment of the potential security threat by using a variety of data from a variety of data sources. Is a network IP address generating strange traffic? Use real-time, contextual information in your big-data analytics platform to discover a wider and more accurate picture of what may actually be happening, before committing resources.
 
Together, these three promises of big data analytics are making it easier to find and resolve threats of many disparate types. But they’re also making it possible, for the first time, to create a defensive strategy against insider attacks not based on hearsay or outdated patterns.



Getting on the big data ball

CISOs need a game plan to utilize big data intelligence to harden the enterprise attack surface from end to end. Here are four steps that can help you create an action plan:

  1. Assess the existing data your organization is generating, or has the capacity to generate. Organizations often have a significant amount of data via logging or other methods that they are not capitalizing on.
  2. Define the capabilities your organization requires from your big data implementation, with an understanding of the limitations of technology and your own organization’s operational capabilities to conduct actions based on available intelligence.
  3. Execute a pilot-based implementation and vet out actual operational capabilities, data storage requirements, and technology needs.
  4. Measure and improve the implementation, ensuring that measurements relevant to the initial requirements are taken.

With this information in hand, you can evaluate market solutions and identify the ones that provide adequate support for your requirements. You’ll need a solution that can do all of the following, and return results quickly under load:

  • Collect all the different types of data that you need access to and re-collect it as needed
  • Consolidate all that data in a single place, so that you aren’t spending to store it multiple times
  • Correlate all the data in a logical fashion to give the security team a prioritized list of issues
  • Collaborate well with all the solutions already deployed in your organization

Bigger, faster, more secure

The business media has largely portrayed big data as a worry. But for the enterprise security team, big data offers a lot of upside. With greater volume of data, faster analytics, and more contextual information, security teams can begin to uncover more threats in real or near-real time, giving them the ability to react to, contain, and disrupt active attacks.
 
To learn more about how big data can lead to better threat detection, read the white paper "Big Security for Big Data," and find out how to strengthen your security intelligence with HP ArcSight.


x

IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.



Let's get started
x

Please select an answer.
x

Analysis:

Your answer:
Your score:
Average score:
Revenue leaders' score:


x

Please select an answer.


x

Results

Your score:
Average score:
Revenue leaders' score:


Get detailed results:

Subscribe

Popular tags

Events

Ponemon’s 2014 Cost of Cyber Crime study

Security analyst Larry Ponemon discusses his 2014 findings in a series of region-specific webinars covering Europe, the Americas and Asia.


HP Discover 2014

Join thousands of IT execs, engineers, and solution experts to explore IT trends, strategies, and best practices. (Barcelona,
Dec. 2–4)


Discover Performance Weekly

HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episodes.


Enterprise 20/20

Security 20/20

Preparing today for tomorrow’s threats.

Introduction to Enterprise 20/20

What will a successful enterprise look like in the future?

CIO 20/20

Challenges and opportunities for the CIO of the future.

Dev Center 20/20

How will we organize development centers for the apps that will power our enterprises?

Marketing 20/20

Welcome to a new reality of split-second decisions and marketing by the numbers.

IT Operations 20/20

How can you achieve the data center of the future?

Employee 20/20

What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.

Mobility 20/20

Looking toward the era when everyone — and everything — is connected.

Data Center 20/20

The innovation and revenue engine of the enterprise.

Read more

HP Software related

Most read articles

Discover Performance

Archive

Tweets @ HPSecurity