Five Tips for Mitigating the Fallout from a Big Data Breach

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Previous Next

Click through for five steps organizations should take to mitigate the consequences of a Big Data breach, as identified by Mike Heumann, senior director of marketing, Endace division of Emulex.

Big Data is pervasive in the enterprise today, and it is only going to get bigger. For example, IT departments are adopting longer retention times for saved data (six months or longer) which, in turn, requires expansion of their existing networked data storage. And with mandated retention policies like Sarbanes-Oxley to account for, end users are also required to capture every data packet that is transacted and retrieve historical data for analysis without any potential data packet loss.

Organizations need to prepare themselves by expanding their network bandwidth to make their data center ‘Big Data’ ready. They also need to take steps to secure their networks. As the volume of networked data grows, data leaks, security breaches, and packet loss are inevitable. Mike Heumann, senior director of marketing, Endace division of Emulex, offers five tips to mitigate the fallout when it happens.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

cloud5-190x128.jpg How to Keep Your Cloud Technologies Secure

Just because a loss event hasn't happened yet doesn't mean you have immunity; no organization does. See how you can keep cloud technologies secure. ...  More >>

Security75-190x128 A New Security Approach to Combat Today's Threats

By focusing security resources on detection and containment, with a strong emphasis on network visibility, enterprises can turn the tables on cyber criminals. ...  More >>

Global20-290x195 5 Recommendations to Secure the Internet of Things

Five recommendations to mitigate IoT risk and maintain a strong security posture in this ever-growing connected world. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date