Uncovering the Truth about Six Big Data Security Analytics Myths

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Uncovering the Truth about Six Big Data Security Analytics Myths-4 Next

Single-Source Threat Visibility

Myth #3: A single data source enables comprehensive threat visibility.

Risk profiles provide a holistic view of the threat landscape. Many solutions claim to enable this holistic view by applying analytics against a single data source – e.g., log data.

Why it's a myth: Analytics on a single source (e.g., logs) provides some insight, but more variety (i.e., the addition of packets) enables better visibility. For example, with logs you can see what URLs a browser accessed, but with packets you can also examine the content being exchanged, which can determine whether something is (or is not) a threat. Of course, at the end of the day, it depends on your organization's needs and which data sources are most easily available. What's important to keep in mind is that your BDSA solution should be flexible enough to provide accurate, rich analytics, whether using a single data source or multiple.

Cyber threats are becoming extremely sophisticated, as evidenced by the many high-profile breaches over the last few years. Organizations are confronting a new reality where they must accept that they are likely to be impacted, despite their best attempts to keep these threats out altogether. They need quicker and better ways to discover, investigate and remediate these threats. Marrying Big Data with machine learning can help address this challenge by providing security professionals with the Big Data security analytics (BDSA) they need to thwart the bad guys.

Without a doubt, when BDSA is used correctly, it is extremely beneficial to an organization. However, there are many false claims around the capabilities of BDSA. When considering BDSA solutions, analysts need to carefully evaluate these capabilities and determine whether their organizations' needs for detection of attacks on the inside and incident response are being met. In this slideshow, John Dasher, vice president of marketing at Niara, a cybersecurity company focused on Big Data analytics, has identified six common myths to consider when deploying BDSA solutions.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.