Uncovering the Truth about Six Big Data Security Analytics Myths

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Uncovering the Truth about Six Big Data Security Analytics Myths-4 Next

Single-Source Threat Visibility

Myth #3: A single data source enables comprehensive threat visibility.

Risk profiles provide a holistic view of the threat landscape. Many solutions claim to enable this holistic view by applying analytics against a single data source – e.g., log data.

Why it's a myth: Analytics on a single source (e.g., logs) provides some insight, but more variety (i.e., the addition of packets) enables better visibility. For example, with logs you can see what URLs a browser accessed, but with packets you can also examine the content being exchanged, which can determine whether something is (or is not) a threat. Of course, at the end of the day, it depends on your organization's needs and which data sources are most easily available. What's important to keep in mind is that your BDSA solution should be flexible enough to provide accurate, rich analytics, whether using a single data source or multiple.

Cyber threats are becoming extremely sophisticated, as evidenced by the many high-profile breaches over the last few years. Organizations are confronting a new reality where they must accept that they are likely to be impacted, despite their best attempts to keep these threats out altogether. They need quicker and better ways to discover, investigate and remediate these threats. Marrying Big Data with machine learning can help address this challenge by providing security professionals with the Big Data security analytics (BDSA) they need to thwart the bad guys.

Without a doubt, when BDSA is used correctly, it is extremely beneficial to an organization. However, there are many false claims around the capabilities of BDSA. When considering BDSA solutions, analysts need to carefully evaluate these capabilities and determine whether their organizations' needs for detection of attacks on the inside and incident response are being met. In this slideshow, John Dasher, vice president of marketing at Niara, a cybersecurity company focused on Big Data analytics, has identified six common myths to consider when deploying BDSA solutions.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.