Premium Content

Access "Beyond the Page: Using big data for defense"

Published: 01 Aug 2014

In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of leaks and loss and greater exposure to threats.  What technologies should be in place to enforce data security controls on-premises and in the cloud? How can organizations have visibility into third-party providers that access or store their data?  Find out how some enterprises are trying to protect their big-data ecosystems with encryption, security data analysis, visualization and other strategies.    Beyond the Page is a multimedia supplement to Information Security magazine. This concise packet of material -- feature article, webcast and practical technical tip from our experts and contributors -- provides security pros and decision makers the in-depth information they need for implementation, management or troubleshooting.   Feature: The NoSQL challenge: What's in store for big data and security Big data offers horizontal scalability, but how do you get your database security to scale along with it? Webcast: ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside


More Premium Content Accessible For Free

  • Application security policy after Heartbleed

    Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...

  • Devising a security strategy for the modern network

    The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...

  • A comprehensive guide to securing the Internet of Things

    As the number of Internet-connected devices grows, the potential security challenges of the so-called "Internet of Things," or IoT, can no longer be ...