Uncovering the Truth about Six Big Data Security Analytics Myths

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Next

Analytics Alone

Myth #6: Analytics alone are sufficient.

Given all the information out there, you'd think that analytics alone are all that you need for the discovery of advanced attacks. 

Why it's a myth: Analytics are valuable, but as threats are becoming more and more sophisticated and constantly evolving, security teams need some way to verify that the attacks surfaced by BDSA are in fact real. Forensics – employed at the very low-level raw data layer to events in a timeline history – provide analysts with this needed context, but they shouldn't have to search across multiple data silos to get it. Forensics must be an intrinsic part of BDSA, providing analysts with easy access to the information and evidence they need to verify the veracity of threats.

Cyber threats are becoming extremely sophisticated, as evidenced by the many high-profile breaches over the last few years. Organizations are confronting a new reality where they must accept that they are likely to be impacted, despite their best attempts to keep these threats out altogether. They need quicker and better ways to discover, investigate and remediate these threats. Marrying Big Data with machine learning can help address this challenge by providing security professionals with the Big Data security analytics (BDSA) they need to thwart the bad guys.

Without a doubt, when BDSA is used correctly, it is extremely beneficial to an organization. However, there are many false claims around the capabilities of BDSA. When considering BDSA solutions, analysts need to carefully evaluate these capabilities and determine whether their organizations' needs for detection of attacks on the inside and incident response are being met. In this slideshow, John Dasher, vice president of marketing at Niara, a cybersecurity company focused on Big Data analytics, has identified six common myths to consider when deploying BDSA solutions.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.