Big Data Analytics In Cyber Defense

Big Data Analytics In Cyber Defense image cybersecurity1 300x225Big Data Analytics In Cyber Defense

Photo credit: https://www.flickr.com/photos/umdnews/7562831366/

Have you heard the wake-up calls? They’re getting louder, more frequent and decidedly more difficult to ignore.

As recent high-profile security breaches at The New York Times, Facebook, Apple and even Microsoft showed, no business is immune to cyber attack –and the impacts can be devastating.

Last year, a study determined the organizational cost of a data breach was a cool $5.5 million. Other research from Verizon found that larger organizations are increasingly subject to cybercrimes targeting trade secrets, classified information and other intellectual property. (No one seems quite sure how to assign a dollar value to invaluable assets like these.)

Are you “waking up” to this new reality? Does your company have a comprehensive cybersecurity plan in place?

Unfortunately, most organizations don’t . . . and at Teradata, we’re working to change that.

A few weeks ago, Teradata and the Ponemon Institute released the results of a new study which surveyed more than 700 IT and IT security practitioners across the United States. We asked them about the new data management and analytic technologies available to help organizations become more proactive and intelligent about detecting and stopping cyber threats. Their answers may surprise you.

For example, the data we collected showed that:

  • Cyber-attacks are getting worse, but most companies haven’t implemented solutions to mitigate cyber risks. Only 20 percent of survey respondents said their organizations are more effective at stopping cyber-attacks. These days, the greatest areas of cybersecurity risk are caused by mobility, lack of visibility and multiple global interconnected network systems.
  • There’s a significant disconnect between awareness and action. Fifty-six percent are aware of the technologies that provide big data analytics, and 61 percent say these solutions will solve pressing security issues, but only 35 percent have them. The 61 percent say big data analytics is in their future.
  • Most companies can’t prevent –or even detect –cyber attacks. Less than half of organizations (42 percent) are vigilant in preventing anomalous and potentially malicious traffic from entering networks or detecting (49 percent) such traffic in their networks.
  • Big data solutions are key to an integrated defense. Big data analytics with security technologies ensure a stronger cyber defense. Eighty-two percent would like big data analytics combined with anti-virus/anti-malware; 80 percent say anti-DoS/DDoS would make their organizations more secure.

That last point provides some guidance for companies looking to make headway across this very bumpy terrain. You see, even though an increased reliance on digital networks amplifies the risk of cyber attacks, new digital solutions can mitigate these threats. Exciting new analytics and data-optimizing technologies provide network visibility and proactive intelligence to create a new paradigm for cybersecurity. This formula for success dramatically brings network activity into clear focus to help detect and stop threats.

How can big data analytics be used to mitigate the risk of cyber attack? As outlined in this infographic, new analytics and data-optimizing technologies can:

  • Prioritize threats, vulnerabilities and attacks
  • Control endpoints and mobile connections/devices
  • Prevent insecure devices from accessing secure systems
  • Provide intelligence about the threat landscape
  • Reduce false positives

Remember: Both the greatest opportunities and the greatest challenges in network data involve data integration, data complexity and data growth. By implementing big data security analytics, your organization can cost-effectively improve its cyber-situational awareness and defense, freeing you to direct your focus where it’s most needed: on big data as an agent of value and unlimited business success.

More Business articles from Business 2 Community:

Loading...
See all articles from Business 2 Community

Friend's Activity