DCL Connecting talent
  • Virgin
  • SingTel
  • Tata
  • Nebulas
  • CNS
  • Secure Data
  • Telstra Global
  • Telecity
  • KCOM
Comments Off on Leveraging Big Data with Information Security

Leveraging Big Data with Information Security

Posted by Admin | October 25, 2016 | IT Security

Bhupender Singh discusses how Big Data is adding a new paradigm to cyber-security

Exabytes of data are created every day. Businesses are sitting on large quantities of information generated through multiple channels, such as social media platforms and mobile payment apps. Furthermore, cloud computing makes information available outside a business’s internal network, creating another avenue for security breaches. In response, some companies are quickly adopting innovative technologies such as cloud-enabled cyber-security to reduce risks and reinforce their security.


In addition, companies are recognising the importance of Big Data analytics and its capabilities to deliver security. For example, a Big Data-centric network can enable organisations to utilise real-time information to help predict cyber-security incidents. It gives companies the constant oversight needed to spot anomalies, whilst better understanding activity on their network. These insights enable businesses to quickly respond to problems.

PwC’s Global State of Information Security Survey 2016 found that more companies this year have embraced Big Data analytics, and that 59 percent of respondents were leveraging Big Data to combat and monitor threats. Big Data analytics will surely be at the forefront of cyber-security for the years to come.

With data no longer stored in one place, more companies are moving to cloud computing to better monitor their information. In PwC’s study, 69 percent of survey respondents said they use cloud-based cyber-security services to safeguard sensitive data. Investing in advanced technologies to upgrade old systems has helped companies to adopt the latest state-of-the-art cyber-security tools. Others are even coupling the technology with Big Data analytics to create another layer of defence.

The steps a company takes when monitoring data can include putting data prevention software in place to avoid leakages, plus a vetting system and specialised training for staff to ensure that there are no internal breaches. Some companies operate with specialised teams from security operation centres across the globe. These teams would usually monitor critical infrastructures and take immediate action if any problem is identified.

Yet despite these advantages, some companies are still failing to make use of the opportunities offered by Big Data. A key factor can be a company’s lack of capacity to operate critical business processes, whilst having to invest, vet and train up departments for information security. Other factors include a lack of awareness of security threats.

For these reasons, there is a real desire from companies to work with IT solutions partners, in order to adopt the latest technology and modernise their information security frameworks. In such relationships it is important that a partner is able to build confidence, which is why most IT solutions specialists have a zero tolerance policy on data leakages. They have to ensure that all levels of their staff are fully trained and monitored to enforce this.  For example, a team might have controls in place to monitor data during every stage at which it is transmitted and processed, flagging up any breach or leak.

Most IT partners strive to have a multi-layer system to improve monitoring. This might involve putting different controls at various executive levels to make sure that certain data processes are only available to those working on it. Internal and client audits further reinforce best security practices, data protection and privacy. This clarifies just how multi-layered information security strategies must be to make sure a company’s data is safe.

Those that embrace a more collaborative approach to information security will experience a partnership where the burden of intelligence on threats and response techniques is shared with external partners. For example, companies are able to focus on improving other infrastructures, when they know there is a dedicated in-house team provided by their IT partners, always on call to flag up security anomalies.

Businesses that invest in the right partnerships will be able to take advantage of Big Data analytics and cloud computing security, ensuring a robust cyber-defence system. Ultimately this would ensure that a company always has a competitive edge in a world that is constantly streaming data and heavily influenced by changing technology trends.

Source: scmagazineuk

173 total views, 1 today