Uncovering the Truth about Six Big Data Security Analytics Myths

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Next

Real-Time Detection

Myth #2: Real-time detection of advanced attacks is possible.

Faster processors and huge investments in perimeter defense mean that all threats, even advanced ones like multi-stage attacks, can be detected and prevented in real time.

Why it's a myth: It's easy when threats are known – rules can be written. But it's infinitely more difficult in the realm of the unknown, which is the case with advanced threats. The markers associated with advanced threats like multi-stage attacks are weak, often barely rising above the noise. If you are alerted on all weak signals, your security team will be overwhelmed. However, BDSA supported with machine learning automatically surfaces these advanced attacks without rules having to be written, and even as the attacks evolve. So while real-time detection isn't possible, BDSA helps to quickly mitigate the impact of advanced attacks that get past perimeter defenses.

Cyber threats are becoming extremely sophisticated, as evidenced by the many high-profile breaches over the last few years. Organizations are confronting a new reality where they must accept that they are likely to be impacted, despite their best attempts to keep these threats out altogether. They need quicker and better ways to discover, investigate and remediate these threats. Marrying Big Data with machine learning can help address this challenge by providing security professionals with the Big Data security analytics (BDSA) they need to thwart the bad guys.

Without a doubt, when BDSA is used correctly, it is extremely beneficial to an organization. However, there are many false claims around the capabilities of BDSA. When considering BDSA solutions, analysts need to carefully evaluate these capabilities and determine whether their organizations' needs for detection of attacks on the inside and incident response are being met. In this slideshow, John Dasher, vice president of marketing at Niara, a cybersecurity company focused on Big Data analytics, has identified six common myths to consider when deploying BDSA solutions.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.