Big Data: Eight Facts and Eight Fictions

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18
Next Big Data: Eight Facts and Eight Fictions-13 Next

Fiction #4: Leveraging Big Data in a security context is as simple as using it for any generalized purpose.

Successfully leveraging Big Data first must address the point in Fiction #3, that analytics is ready made for security. Second, establishing a security context is the next problem. Security context can be established connecting the relationships (after map reducing the data itself) between data sets to reveal valuable insights in the patterns that were previously not correlated or compared. Mining for trends requires that data be managed coherently at first. Similarly, mining for relationships requires that trends be understood. Only after you have the data map reduced, and the trends in it understood, can you then mine for relationships among the trends of the map-reduced data farms. Only after all of these prerequisites are achievable, can you establish the big security context of Big Data.

Think of security context as the metadata fabric of relationships, which is a lot more powerful and useful for visualizing risks, threats and predictive analytics. 

As with cloud computing, Big Data is a hot topic around the business right now. Expectations for what it can achieve often reach into the stratosphere. At the same time, the overwhelming amount of data involved is daunting and can seem like an insurmountable obstacle. So what is Big Data, where does it come from, and what can you actually do with it? ThreatTrack Security has identified eight facts and eight fictions regarding Big Data.


Related Topics : Vulnerabilities and Patches, Resellers, Broadcom, Broadband Services, Supercomputing

More Slideshows

Classroom tech Ten New Technologies Transforming the Classroom

Here are 10 ways that college professors are taking advantage of the technology students currently use and adding new technologies to enhance the teaching and learning experiences. ...  More >>

IBM Watson How and Why Companies Are Incorporating the Power of IBM Watson

Watson continuously learns from previous interactions, gaining in value and knowledge over time. Learn how companies are harnessing that AI power to create and improve products and services. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.