RSA's Big Data security guidelines

Must be integrated for successful approach to effects of big data

EMC Corporation’s security division, RSA, has released a Security Brief which asserts that Big Data will be a driver for major change across the security industry and will fuel intelligence-driven security models.

While Big Data’s short-term changes are already underway, in the longer term it will change the nature of contenvtional security controls such as anti-malware, data loss prevention, and firewalls.

As such, the brief presents six guidelines to assist organisations in planning for the Big Data-driven transformation of their security operations:

  1. Organisations should set a holistic cyber-security strategic which aligns all capabilities in a program that is customised for the their specific risks, threats, and requirements.
  2. Big Data analytics requires information to be collected from various sources in multiple formats. As such, a single, shared data architecture for security information is necessary as it allows information to be captured, indexed, normalized, analysed, and shared.
  3. A forward looking approach should be taken to investing in a specific product as each will introduce its own data structure that must be integrated into a unified analytics framework.
  4. Ongoing investments in security products should favour technologies using agile analytics-based approaches, not static tools based on threat signature or network boundaries. A look at open and scalable tools is required.
  5. Emerging products will be Big Data-ready, but security teams may not be. Organisations must strengthen SOC’s data science skills.
  6. Organisations need to augment internal security analytics programs with external threat intelligence services, and evaluate threat data from trustworthy and relevant sources.

According to the Security Brief’s authors, integrating Big Data into security practices will lead to enhanced visibility into IT environments, the ability to distinguish suspicious activities, and assure trust in IT systems.

Follow Nermin Bajric on Twitter: @nermin_au

2014 ARN Women in ICT Awards - Nominate Now!: Nominations have opened for WIICTA 2014 and will stay open until October 22. But don't be late, be among the first in and NOMINATE NOW!!!

Tags EMC CorporationsecurityArchitecturebig datarsa

Comments

Comments are now closed

 

Latest News

01:38PM
Google Nexus 9 pre-sales start at $479
12:56PM
Xero: Larking about, Kiwi style...
11:39AM
World's most powerful life sciences supercomputing facility to stay in Victoria
11:18AM
Nextgen Networks appoints former AAPT exec as new MD
More News
21 Oct
NewLease & Red Hat Breakfast Briefing (Melbourne)
21 Oct
DCIM Solutions Architect
22 Oct
NewLease & Microsoft Technical Sessions
23 Oct
NewLease & Red Hat Breakfast Briefing (Sydney)
View all events