Menu
RSA's Big Data security guidelines

RSA's Big Data security guidelines

Must be integrated for successful approach to effects of big data

EMC Corporation’s security division, RSA, has released a Security Brief which asserts that Big Data will be a driver for major change across the security industry and will fuel intelligence-driven security models.

While Big Data’s short-term changes are already underway, in the longer term it will change the nature of contenvtional security controls such as anti-malware, data loss prevention, and firewalls.

As such, the brief presents six guidelines to assist organisations in planning for the Big Data-driven transformation of their security operations:

  1. Organisations should set a holistic cyber-security strategic which aligns all capabilities in a program that is customised for the their specific risks, threats, and requirements.
  2. Big Data analytics requires information to be collected from various sources in multiple formats. As such, a single, shared data architecture for security information is necessary as it allows information to be captured, indexed, normalized, analysed, and shared.
  3. A forward looking approach should be taken to investing in a specific product as each will introduce its own data structure that must be integrated into a unified analytics framework.
  4. Ongoing investments in security products should favour technologies using agile analytics-based approaches, not static tools based on threat signature or network boundaries. A look at open and scalable tools is required.
  5. Emerging products will be Big Data-ready, but security teams may not be. Organisations must strengthen SOC’s data science skills.
  6. Organisations need to augment internal security analytics programs with external threat intelligence services, and evaluate threat data from trustworthy and relevant sources.

According to the Security Brief’s authors, integrating Big Data into security practices will lead to enhanced visibility into IT environments, the ability to distinguish suspicious activities, and assure trust in IT systems.

Follow Nermin Bajric on Twitter: @nermin_au

Follow Us

Join the ARN newsletter!

Error: Please check your email address.

Tags EMC CorporationArchitecturesecuritybig datarsa

Upcoming

Slideshows

In Pictures: Houston, we have a bug - 9 famous software glitches in space

In Pictures: Houston, we have a bug - 9 famous software glitches in space

There’s never a good time to run into software bugs, but some times are worse than others - like during a mission to space. Spacecraft of all shapes and sizes rely heavily on software to complete their objectives. But those missions can be quickly ended by the simplest of human errors when writing code. The omission of an overbar here or overflow error checking code there can mean the difference between success or failure, not to mention the loss of hundreds of millions of dollars, years of work and, on manned missions, human life. Use the arrows above to read about 9 examples that show that, despite the care with which these systems are built, bugs have occurred in spacecraft software since we started to fling rockets into space - and will, no doubt, continue to crop up.

In Pictures: Houston, we have a bug - 9 famous software glitches in space
IN PICTURES: Windows 10 Sydney launch

IN PICTURES: Windows 10 Sydney launch

Tech lovers and party-goers alike headed down to Mrs Macquarie's Chair to be part of the world-first Windows 10 Launch Party. The night featured a presentation by Microsoft Australia managing director, Pip Marlow, DJs, live demonstrations and digital artistry by Lister.

IN PICTURES: Windows 10 Sydney launch

iasset.com is a channel management ecosystem that automates all major aspects of the entire sales, marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

Show Comments