PRO+ Premium Content/Information Security magazine
Access your Pro+ Content below.
Big data security analytics: Harnessing new tools for better security

This article is part of the Information Security magazine issue of July/August 2012
Among all the things that would benefit security and improve defenses, insight must rank among the first. We need it to identify when, where and how attacks occur -- and succeed. With insight, we could see how access privileges are being misused or abused, or when what looks like legitimate access is actually fraud. We could also understand how and where investments can be better applied to strengthen security and mitigate risks. However, this kind of insight is highly elusive. The reality is most organizations struggle with making use of the security information they already gather. In a recent Enterprise Management Associates (EMA) study of 200 organizations of 1,000 personnel or more worldwide, 58 percent of those knowledgeable about security log and event management say they collect more than 50 gigabytes of this data each day. Fifteen percent say they collect a terabyte or more. If each event is averaged at 300 bytes apiece, that’s more than three billion log events daily. The sheer volume of security data is not the only ...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Features in this issue
-
How to pen test: Why you need an internal security pen testing program
Learn pen testing best practices and how to build an internal pen testing team.
-
Big data security analytics: Harnessing new tools for better security
New techniques are emerging to help organizations analyze security data and improve security defenses.
-
Three steps for securing SharePoint
Restricting user permissions, server hardening and dedicated service accounts are critical.
-
Talk of cyberwarfare threats heats up with Flame malware
Experts say malware toolkit isn’t unique, but warn of cyberweapons falling into the wrong hands.
Columns in this issue
-
Gary McGraw on mobile security: It’s all about mobile software security
Mobile systems have a lot of moving parts, but securing them is as simple as practicing software security.
-
Cyberspace protection requires government collaboration with industry
Government and private sector collaboration is critical to surviving in cybespace.