Five Tips for Mitigating the Fallout from a Big Data Breach

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7
Previous Next

Click through for five steps organizations should take to mitigate the consequences of a Big Data breach, as identified by Mike Heumann, senior director of marketing, Endace division of Emulex.

Big Data is pervasive in the enterprise today, and it is only going to get bigger. For example, IT departments are adopting longer retention times for saved data (six months or longer) which, in turn, requires expansion of their existing networked data storage. And with mandated retention policies like Sarbanes-Oxley to account for, end users are also required to capture every data packet that is transacted and retrieve historical data for analysis without any potential data packet loss.

Organizations need to prepare themselves by expanding their network bandwidth to make their data center ‘Big Data’ ready. They also need to take steps to secure their networks. As the volume of networked data grows, data leaks, security breaches, and packet loss are inevitable. Mike Heumann, senior director of marketing, Endace division of Emulex, offers five tips to mitigate the fallout when it happens.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

AppRiverScamPreventionTips0x Five Tips to Avoid Falling Victim to Online Scammers

While vendors are busy planning ways to push sales even higher in 2014, you can be certain that just as many cyber criminals are plotting to profit from this year's "season of goodwill." ...  More >>

HAXLR8RStartups0x Robotics Take Center Stage: Ten New Hardware Startups

Recently, HAXLR8R held its Demo Day in San Francisco, where it revealed its fifth class of new hardware startups, which span the markets from wearables to security to biology. ...  More >>

Security49-190x128 Using Tokenization for Superior Data Security

With the launch of ApplePay for secure online and mobile payments, tokenization has become a hot topic in data security. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date