Big Data and Security with Leandro Bennaton (session in Spanish).
May 5, 2016. The title of this chapter is not a coincidence. Big Data is not a single technology; instead it is a combination of old and new technologies that help companies make decisions by making business models more dynamic. Don't miss this webcast where Leandro Bennaton, CSA of ElevenPaths in Brazil, talks about terms we have all heard about: Big Data, Security, IoT…and our specialized technologies Tacyt and Sinfonier. Ready? Watch it now!
By definition, Big Data is any type of data source with at least three shared data characteristics: large volumes, high speed and great variety. This large volume of data is driven by the users of the Internet of Things, IoT, which gains real meaning when this volume of stored data is now analyzed. The key will always be how the data is used.
For example, Facebook collects 250 terabytes of data per day. This makes it possible to perform an analysis of behaviors and, in the long term, of historical trends. Applied to security, Big Data could help identify when an attack was launched and the steps taken by the attacker. Tacyt, our cyber-intelligence tool for mobile threats, monitors and analyzes mobile threats from millions of applications. The challenge is to process this large volume of data so as to be able to run complex searches and retrieve results almost immediately.
We know that many companies are equipped with traditional security products such as SIEM to handle these large amounts of data. But is it possible to improve information security with Big Data? In 2014, Gartner forecast that by 2016 one in every four large companies would adopt major Big Data analysis solutions in SI and anti-fraud sectors.
Big Data processing is possible through Sinfonier, our Big Data tool for use by developers and researchers in Security and applied to Cyber-security. It analyzes information through the internet in real time with the aim of improving the efficiency of the data analysis process and identifying the weaknesses of control use. In this way, it is possible to prevent incidents and, as a result, reduce the risk against cyber-security and increase the flexibility of incident response.
This is how organizations must prepare to respond to current and future threats. It is an indispensable condition of a more secure online environment!
We recommend the following articles about this topic: