Fiction #4: Leveraging Big Data in a security context is as simple as using it for any generalized purpose.
Successfully leveraging Big Data first must address the point in Fiction #3, that analytics is ready made for security. Second, establishing a security context is the next problem. Security context can be established connecting the relationships (after map reducing the data itself) between data sets to reveal valuable insights in the patterns that were previously not correlated or compared. Mining for trends requires that data be managed coherently at first. Similarly, mining for relationships requires that trends be understood. Only after you have the data map reduced, and the trends in it understood, can you then mine for relationships among the trends of the map-reduced data farms. Only after all of these prerequisites are achievable, can you establish the big security context of Big Data.
Think of security context as the metadata fabric of relationships, which is a lot more powerful and useful for visualizing risks, threats and predictive analytics.
As with cloud computing, Big Data is a hot topic around the business right now. Expectations for what it can achieve often reach into the stratosphere. At the same time, the overwhelming amount of data involved is daunting and can seem like an insurmountable obstacle. So what is Big Data, where does it come from, and what can you actually do with it? ThreatTrack Security has identified eight facts and eight fictions regarding Big Data.
Watson continuously learns from previous interactions, gaining in value and knowledge over time. Learn how companies are harnessing that AI power to create and improve products and services. ... More >>
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ... More >>