Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
A chain is as strong, as it’s weakest link !!
© 2011-2013 Cloudspread. All rights reserved. The Cloudsprea
logo and Clouds...
Cloud Security - Challenges
Cloud Security ensures encryption and key management software that helps
organizations lock do...
Cloud Security: Measures
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered...
Cloud Security: Big Data Analytics and Automation
• Integrated security intelligence solutions harness security-relevant
i...
Cloud Security: What is ‘Big Data’? Why do we need to know?
• It is structured or unstructured exponential growth and avai...
Big Data = Transactions + Interactions + Observations
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo a...
Cloud Security: Big Data Drivers
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are re...
Cloud Security: How does Hadoop help?
• Organizations are discovering that important predictions can be made
by sorting th...
Cloud Security: Hadoop Batch and Stream Processing
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and ...
Cloud Security: Big Data Analytics - Data Privacy and Governance
Technological
Advances
Storage
AnalysisProcessing
© 2011-...
Cloud Security: What ‘Big Data Analysis’ can do?
• Network Security- to mine meaningful security information from sources ...
Contact:
• A certified IT and Business Consultant, Vikas Sharma.
• Twitter – Digitalwalk
• Linkedin – http://www.linkedin....
Upcoming SlideShare
Loading in …5
×

Cloud security big data analytic

507 views

Published on

Threats, Breaches, and Compliance in Cloud Security. A chain is as strong, as it's weakest link. Let's find out the weakest link in a Cloud Security.

Published in: Technology
  • Be the first to comment

Cloud security big data analytic

  1. 1. A chain is as strong, as it’s weakest link !! © 2011-2013 Cloudspread. All rights reserved. The Cloudsprea logo and Cloudspread are registered trademarks
  2. 2. Cloud Security - Challenges Cloud Security ensures encryption and key management software that helps organizations lock down virtual machines and their data so they remain secure throughout their lifecycle in the private, public or hybrid cloud. Three major challenges: © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks Cloud Security Threats Breaches Compliance
  3. 3. Cloud Security: Measures © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks Threats Scan and Protect the Network from Threats Establish Intelligence across the Cloud Breaches Manage Identities and User Access in a Borderless Network Architecture Gaps and Vulnerabilities in Virtualization Compliances Monitor and Audit – Applications and Data Security - SOX, IT Audit, Conformity and Integrity Check - ISO, HIPPA, PCI, SAS 70 Integrity Check - Whitelisting or Blacklisting
  4. 4. Cloud Security: Big Data Analytics and Automation • Integrated security intelligence solutions harness security-relevant information from across the organization. • Analytics and automation provides context to detect threats faster, identify vulnerabilities, prioritize risks and automate compliance activities. • A security intelligence platform that applies real-time correlation and anomaly detection across a distributed and scalable repository of security information. • With the help of ‘Big Data’ analytics that enables more accurate security monitoring and better visibility to travel our way into a secured cloud environment. © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
  5. 5. Cloud Security: What is ‘Big Data’? Why do we need to know? • It is structured or unstructured exponential growth and availability of data that can not be handled through the normal relational database tools available or already in use across the organization. • Big data is going to change the way you do things in the future, how you gain insight, and make decisions. • Accumulation of ‘Big Data’ is not that big problem. The real question lies with the fact - what we do with this ‘Big Data’? How do we analyze it and make an effective use of it? © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
  6. 6. Big Data = Transactions + Interactions + Observations © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
  7. 7. Cloud Security: Big Data Drivers © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
  8. 8. Cloud Security: How does Hadoop help? • Organizations are discovering that important predictions can be made by sorting through and analyzing Big Data. • However, since 80% of this data is "unstructured", it must be formatted (or structured) in a way that makes it suitable for data mining and subsequent analysis. • Hadoop is the core platform for structuring Big Data, and solves the problem of making it useful for analytics purposes leading to extract intelligent security information. © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
  9. 9. Cloud Security: Hadoop Batch and Stream Processing © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
  10. 10. Cloud Security: Big Data Analytics - Data Privacy and Governance Technological Advances Storage AnalysisProcessing © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks Business Knowledge Operational Knowledge Process of Analyzing and Mining Big Data Rapid decreasing cost of storage and CPU power Flexibility and cost effectiveness of Data Center and Cloud Computing Development of new framework ‘Hadoop’
  11. 11. Cloud Security: What ‘Big Data Analysis’ can do? • Network Security- to mine meaningful security information from sources such as firewalls and security devices, but also from website traffic, and business processes and other day-to-day transactions. What, traditional SEIM (Security Information Management) tools take more than 20 -60 minutes. Hadoop system running queries does it in less than a minute. • Enterprise Events Analytics – enterprise routinely collect terabytes of security relevant data. • Net-flow Monitoring to identify Botnets – data to identify infected host participating in a botnet. • Advanced Persistent Threat Detection – targeted attack against high value assets. • Beehive: Behavior Profiling for Advanced Persistent Threat (APT) Detection – large scale distributed computing helps to detect APT threats • Experimental research on Big Data analytics to detect and explore security bottleneck patterns – cyber security is rarely reproducible as data sets are not widely available to research community. © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
  12. 12. Contact: • A certified IT and Business Consultant, Vikas Sharma. • Twitter – Digitalwalk • Linkedin – http://www.linkedin.com/in/vikas1sharma • Email: vikas@cloudspread.in; sharma1vikas@gmail.com © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks

×