3 Things to Learn About:
-Ponemon Institute's 2016 big data cybersecurity analytics research report
-Quantifiable returns organizations are seeing with big data cybersecurity analytics
-Trends in the industry that are affecting cybersecurity strategies
State of the Union: The address not only reports on the condition of the nation but also allows the President to outline his legislative agenda (for which he needs the cooperation of Congress) and national priorities.
The ever increasing complexity of attacks and the ever evolving nature of our data and systems forces a new approach to security. There is an undisputable need for more data and the equivalent analytic flexibility to process that data.
The community will continue to grow and we will continue to contribute and adopt projects that help meet the needs of your organization today and tomorrow.
About Choice Hotels:
Choice Hotels International, Inc. is an American hospitality holding corporation based in Rockville, Maryland, in the United States. The company owns the hotel and motel brands Comfort Inn, Comfort Suites, Quality Inn, Sleep Inn, Clarion, Cambria Hotel & Suites, Mainstay Suites, Suburban Extended Stay, Econo Lodge, Rodeway Inn, and Ascend Hotel Collection. The company manages 6,379 properties worldwide. There are 505,278 rooms, with approximately $45.80 in revenue per room, totaling $758 million in revenue as of April, 2016.
Challenge:
Choice generated about 3500 security audited events per second (3% known hostile) in 2015.
Model that out it turns into 302,400,000 events per day// 9,072,000 potential hostile events
System didn’t respond fast enough to changing user behaviors causing potential customers to be treated like attackers
Solution:
Migrated homegrown system over to Cloudera
Benefit:
Total latency from event to security action can be lowered from two days to a few seconds.
You can get a richer view of the threat landscape, so you understand the threats. That means you can do a better job catching the bad guys, and reduce the likelihood that you’ll hit a false positive and turn away a genuine sale.
You can make your security decisions faster. Reacting to to threats fast gives you two big advantages; you don’t have to delay your legitimate customers for as long, and you’re going to close down the window that the criminals have time to operate in.
Total latency from event to security action can be lowered from two days to a few seconds.