We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,258 News Articles

RSA's Big Data security guidelines

EMC Corporation's security division, RSA, has released a Security Brief which asserts that Big Data will be a driver for major change across the security industry and will fuel intelligence-driven security models.

While Big Data's short-term changes are already underway, in the longer term it will change the nature of conventional security controls such as anti-malware, data loss prevention, and firewalls.

As such, the brief presents six guidelines to assist organisations in planning for the Big Data-driven transformation of their security operations:

1. Organisations should set a holistic cyber-security strategic which aligns all capabilities in a program that is customised for the their specific risks, threats, and requirements.

2. Big Data analytics requires information to be collected from various sources in multiple formats. As such, a single, shared data architecture for security information is necessary as it allows information to be captured, indexed, normalized, analysed, and shared.

3. A forward looking approach should be taken to investing in a specific product as each will introduce its own data structure that must be integrated into a unified analytics framework.

4. Ongoing investments in security products should favour technologies using agile analytics-based approaches, not static tools based on threat signature or network boundaries. A look at open and scalable tools is required.

5. Emerging products will be Big Data-ready, but security teams may not be. Organisations must strengthen SOC's data science skills.

6. Organisations need to augment internal security analytics programs with external threat intelligence services, and evaluate threat data from trustworthy and relevant sources.

According to the Security Brief's authors, integrating Big Data into security practices will lead to enhanced visibility into IT environments, the ability to distinguish suspicious activities, and assure trust in IT systems.

Follow Nermin Bajric on Twitter: @nermin_au


IDG UK Sites

The best iPhone 6 alternatives: Price and specs compared with the best smartphones

IDG UK Sites

The top 10 Apple products ranked by pixel density: Which Apple devices have the sharpest screens?

IDG UK Sites

SBTRKT's Look Away webcam-based interactive music video won't keep your gaze

IDG UK Sites

Retina MacBook Air release date rumours and specs: Gold 12in Retina MacBook Air almost 1cm thinner...