4. Bringing the issue of security into the
big data discussion often produces two
divergent schools of thought from IT
professionals and engineering.
Big data is high velocity and high
variety information that require new
forms of processing to enable decision
making.
9/27/2015 4
5. These are the four facts that give rise to
challenges but also opportunities:
1} Volume: The amount of data is moving from TB
to ZB(zettabytes) (1 ZB is 100 Crore TB) and
beyond.
2} Velocity: The speed of data (in and out), from
static onetime datasets to ongoing streaming data.
3} Variety: The range of data types and sources
structured , semi structured or raw.
4} Value: The importance of the data in context
9/27/2015 5
7. Typically, this begins with
securing of collection of
data followed by securing
access to the data.
Performance is a key
consideration when
securing the collected
data and the networks.
In a big data
environment, policy
creation and enforcement
are more critical than
usual because of the
larger volumes of data and
the number of people who
will require access to it.
9/27/2015 7
8. Data Loss Prevention technologies should
be employed to ensure that information is
not being leaked to unauthorized parties.
Internal detection and data integrity
systems must be used to detect advanced
targeted attacks that have bypassed
traditional protection mechanisms, for
example, anomaly detection in the
collection and aggregation layers.
9/27/2015 8
9. Big data involves information residing over a
wide area from multiple sources,
organizations also need to have the ability to
protect data wherever it exists.
9/27/2015 9
11. While big data presents challenges, it also
offers opportunities. With the right tools,
vast amounts of information could be
analyzed, and this allows an organization to
understand normal activities.
This effort is aided by competent IT staff
and efficient deployment of the appropriate
security tools.
These tools include dedicated logging,
analysis and reporting appliances that can
securely aggregate log data from security.
9/27/2015 11
12. 9/27/2015 12
As portable storage and bandwidth continue to
grow, the mobility of these larger data sets will also
increase, resulting in breaches and disclosure of
sensitive datasets.
13. “Securing big data in the enterprise
requires smart policies
enforcement, thorough analytics
and high performance tools”
-Rajesh Maurya
Country Manager
India & SAARC, Fortinet.
9/27/2015 13