Security Analytics in Big Data Alexandre F Moraes, CISSP
|
|
|
- Spencer Roberts
- 10 years ago
- Views:
Transcription
1 Security Analytics in Big Data Alexandre F Moraes, CISSP Solutions Architect Manager Latin America HP Enterprise Security [email protected] 1 Copyright Copyright Hewlett-Packard Development Company, Company, L.P. L.P. The information The information contained contained herein herein is subject is subject to change to change without without notice. notice.
2 HP Enterprise Collect Consolidate Correlate Security SaaS Hybrid Cloud Finance PaaS APP IaaS Public Cloud Division A Division A Private Cloud Division B - Vulnerability Awareness - Vulnerability Scanning - Source Code Analysis - Software Security Assurance - Proactive Defense - Flexible Security-Zone Segmentation - Well-Known- and Zero-Day-Exploit Protection - Adaptive Network Defense - Visibility - Security-Information and Event Management System - Event Correlation - Context-Visibility 2
3 New! NGFW CONSOLE N, 8, 1 10#0F STATUS CFast Card HA 8 MGMT RESET ALERT POWER 12 80##F CONSOLE N, 8, 1 STATUS CFast Card HA 1 HA 2 MGMT ALERT 3 S1050F 500Mbps / 250Mbps (FW+AppID / FW+IPS) S3010F 1Gbps / 500Mbps (FW+AppID / FW+IPS) S8005F 5Gbps / 2.5Gbps (FW+AppID / FW+IPS) S8010F 10Gbps / 5Gbps (FW+AppID / FW+IPS) S3020F 2Gbps / 1Gbps (FW+AppID / FW+IPS) S8020F 20Gbps / 10 Gbps (FW+AppID / FW+IPS)
4 Accelerating innovation & time to value Burroughs IBM NEC Unisys Hitachi Product Configurator Mainframe Kilobytes Fijitsu Bull Claim Processing Payroll Sales tracking & Marketing Commissions Bills of Material SCM Costing ERP Database Manufacturing Projects CRM Quality Control HCM SAP Engineering HP MRM Inventory EMC Cost Management Cash Management Time and Expense Accounts Receivable Billing Activity Management Training Time & Attendance Data Warehousing Service Order Entry Joyent Client/Server Megabytes Rostering HCM Fixed Assets PLM Intacct DCC Saba CCC IntraLinks Adobe Microsoft Cornerstone ondemand Softscape Plex Systems ebay Quickbooks NetSuite OpSource Hosting.com Tata Communications Datapipe PPM NetDocuments Microsoft Corel Saba Softscape Volusion Google Ariba Alterian ADP VirtualEdge Kenexa OpenText Workscape Yahoo Quadrem Xerox SugarCRM FinancialForce.com Avid NetReach Zoho Serif Yahoo! CyberShift Sage Sonar6 Hyland Music Qvidian kaggle SuperCam SLI Systems Elemica SCM Kinaxis Xactly CyberShift SmugMug ihandy The Internet Gigabytes NetSuite Exact Online PaperHost Sonar6 Facebook Fring Rackspace SolidFire Snapfish GoGrid Atlassian Paint.NET Amazon DocuSign Dragon Diction buzzd Cookie Doodle Ah! Fasion Girl Hootsuite Renren Education Flickr UPS Mobile salesforce.com Bromium Scanner Pro Foursquare nebula Zynga ischedule Pandora Khan Academy BrainPOP MobileFrame.com myhomework Toggl Xing MailChimp Amazon Web Services LimeLight News LinkedIn Workday Navigation SuccessFactors Associatedcontent MobilieIron Twitter AppFog PingMe cloudability CloudSigma HP eprint RightScale Fed Ex Mobile SmugMug YouTube Business Amazon Utilities Scribd. Zillabyte Reference Games Productivity TripIt Twitter Atlassian Baidu Atlassian Tumblr. New Relic Urban Parse Yandex Finance Workbrain Yandex Mozy Zynga Entertainment Jive Software Qzone Travel box.net Mixi Heroku CYworld BeyondCore Taleo Lifestyle Splunk ScaleXtreme Pinterest Sport Mobile, Social, Big Data & The Cloud Zettabytes Photo & Video Yammer Answers.com Viber Social Networking dotcloud PingMe Every 60 seconds 98,000+ tweets 695,000 status updates 11million instant messages 698,445 Google searches 168 million+ s sent 1,820TB of data created 217 new mobile web users Yottabytes 4
5 Big Data Walmart : 1 Million of Transactions per Hour: 2.56 Terabytes / day Facebook: 50 Billions of pictures in the database 50 % of the data is non structured: video, images, audio... 5
6 Big Data landscape Annual Growth ~100% Machine Data 90% of Information Human Information ~10% Business Data 10% of Information
7 Business challenge Opportunities lost Competitive advantage in the digital universe in 2012 Massive amounts of useful data are getting lost % of data that would be potentially useful IF tagged and analyzed 23% 3% % actually being tagged for Big Data Value (will grow to 33% by 2020) ¹Source: IDC The Digital Universe in 2020, December % % of the Digital Universe that actually is being tagged and analyzed
8 Technology challenge Legacy techniques have fallen short. Stale technologies Talent shortage 86% of corporations cannot deliver the right information, at the right time to support enterprise outcomes all of the time³ ³Source: Coleman Parkes Survey Nov 2012 IT frustration Lack of insight
9 HAVEn the #1 Big Data platform HAVEn Hadoop / HDFS Scale Autonom y IDOL Source Vertic a Speed Enterpris e Security Secure n Apps Powering HP Software + your apps Transactional Social media Video Audio Texts Mobile data Documents IT/OT Search engine Images hp.com/haven
10 Proactive Protection - Security Analytics Turning events & logs into actionable intelligence Powered by HP HAVEn Harness the power of ArcSight SIEM and Vertica Analytics Reduce false positives Minimize impact of security breach Transform security from defense to proactive protection Hadoop Autonomy Vertica Enterprise Security n-apps 10
11 Business Weather Org structure TX data Threat feeds Security Log s App2 App 3 App1 Vertica ArcSight ESM 11 Intelligence Events + context + analytics
12 ArcSight Security Alert Spikes in logins: Johnp 12
13 13
14 Invoke Vertica with event context Right click Integration command 14
15 Login by Site Login by Role
16 Proactive Protection - Security Analytics Detecting Information Leakage Powered by HP HAVEn Harness the power of ArcSight SIEM and Autonomy IDOL Distill meaning and make decisions based on it, not just match keywords or tags judge events based on their context Hadoop Autonomy Vertica Enterprise Security n-apps 16
17 Sample Usecase: Detecting Information Leakage 1 3 IDOL ESM Data access (file, ) 2. Event sent to ESM 3. Query sent to IDOL 4. Context sent to ESM 5. Rules fired 4 17
18 Sample Usecase: Information at Risk 1 3 IDOL ESM Attack target 2. Events sent to ESM 3. Query sent to IDOL 4. Context sent to ESM 5. See next slide 4 18
19 Sample Usecase: Data under Attack (cont ) Information Store Information Store Risk Patents 19
20 Sample Usecase: Threat Monitoring through Sentiment Analysis Intelligence has a long history of providing pivotal information to decisionmakers Monitoring the spiraling amount of user generated content on the internet (social media) and analyze it for sentiment 20
21 Sample Usecase: Threat Monitoring through Sentiment Analysis 21
22 hp.com/haven Develop Operate Monetize HAVEn Secure Govern 22
HP Converged Cloud Speaker s name / Month day, 2012
HP Converged Cloud Speaker s name / Month day, 2012 Customer challenges SPEED INNOVATION ENHANCE AGILITY IMPROVE FINANCIAL MANAGEMENT 2 Accelerating innovation & change kaggle Pandora Music SolidFire Scribd.
HP Software - Big Data Challenges February 2015
HP Software - Big Data Challenges February 2015 The world has changed Burroughs IBM NEC Unisys Hitachi Product Configurator Mainframe Kilobytes Fijitsu Bull Sales tracking & Marketing Commissions Claim
The changing world HP Today of Technology
The changing world HP Today Speaker s of Technology name/month day, 2013 1 David Chalmers VP, Chief Technologist HP Enterprise Group, EMEA Copyright 2013 Hewlett-Packard Development Company, L.P. The information
Mice, Elephants, Turtles Dimes & Dollars HPC & Big Data Marc Hamilton Hyperscale Business Unit HP Enterprise Group March, 2013
Mice, Elephants, Turtles Dimes & Dollars HPC & Big Data Marc Hamilton Hyperscale Business Unit HP Enterprise Group March, 2013 Big Data is Accelerating Innovation & Change kaggle Pandora Music SolidFire
Big Data is the future of ITSM tools
Big Data is the future of ITSM tools October 2014 Who Am I? > 10+ years of experience in Service Management > Background from the work place > ITIL v3 Expert > Solution Architect for ITSM (Tools & Process)
Cloud computing (and Wireless Communication) Flattening the World of ICT for All!
Cloud computing (and Wireless Communication) Flattening the World of ICT for All! SUDHIR DIXIT Director Hewlett-Packard Laboratories India Bangalore, India October 23, 2012 WWRF 29, Berlin Copyright 2012
Master your cloud from planning to delivery: HP Converged Cloud Services
Master your cloud from planning to delivery: HP Converged Cloud Services Marko Tamminen / 25.9.2012 ATEA Estonia Autumn Forum, Tallinn Customer challenges Speed innovation Enhance agility Challenges Improve
(S4.2) Software Defined Networking (SDN) in action and why SDN becomes the key to managing networks by 2020. Johannesburg
(S4.2) Software Defined Networking (SDN) in action and why SDN becomes the key to managing networks by 2020 Johannesburg Dobias van Ingen EMEA HPN Win Team lead &EMA HPN Strategist Copyright 2014 Hewlett-Packard
Solving Big Data Issues with Big Data Based Solutions
Copyright 2013 Vivit Worldwide Solving Big Data Issues with Big Data Based Solutions Wednesday, November 20, 2013 1:30 PM - 2:30 PM EST Hosted by Mark Ford Vivit Leader Carolinas Chapter Copyright 2013
Copyright 2012 Vivit Worldwide. Embracing Cloud with HPSW: HP Cloud Service Automation
Embracing Cloud with HPSW: HP Cloud Service Automation Brought to you by Vivit New Delhi Chapter Champion: Naveen Chhabra & Vivit Cloud Builders Special Interest Group (SIG) Leader: Jim Murphy Today s
HP Software Big Data overview
HP Software Big Data overview 23 rd April 2015 David Kemp, Big Data Consultant Big Data from the Internet of Things We have gone beyond the decimal system Today, data scientists use Yottabytes to describe
Business white paper. Big security for big data
Business white paper Big security for big data Table of contents 3 Big security for big data 3 Data explosion 3 Data collection 5 Data integration 5 Data analytics 5 In real time versus the past 6 Born
Ausblicke 2014. The New Style of IT. Ausblicke in die Zukunft. IT-Services Menükarte für Ruf Kunden. Verwaltungsprozesse mit IT unterstützen.
Ausblicke 2014 Ausblicke in die Zukunft The New Style of IT Roland Michel CEO Ruf Informatik Marcel Borgo Managing Director HP Schweiz IT-Services Menükarte für Ruf Kunden Josef Tatzreiter Leiter Services
HP Converged Storage. Storage for the next era of IT. Marian Galik HP Storage Pre-Sales Consultant
HP Converged Storage Storage for the next era of IT Marian Galik HP Storage Pre-Sales Consultant Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to
Cloud Workshop. Seminario Universita Tor Vergata. Rome Jan 30, 2015
Cloud Workshop Seminario Universita Tor Vergata Rome Jan 30, 2015 Who we are Fausto Pasqualetti Enterprise Architect Fausto Pasqualetti is an Architect and Senior Consultant with a worldwide experience
The Ultimate HP Storage Overview for Insight
The Ultimate HP Storage Overview for Insight Chet Jacobs Chief Storage Evangelist December 2012 1 A New Style of IT Emerging kaggle SolidFire Pandora Scribd. Amazon Music ihandy DocuSign SmugMug salesforce.com
Big Data Analytics: Today's Gold Rush November 20, 2013
Copyright 2013 Vivit Worldwide Big Data Analytics: Today's Gold Rush November 20, 2013 Brought to you by Copyright 2013 Vivit Worldwide Hosted by Bernard Szymczak Vivit Leader Ohio Chapter TQA SIG Copyright
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Vertica at MIT Sloan Sports Analytics Conference March 1, 2013 Will Cairns, Senior Data Scientist, HP Vertica
HP Vertica at MIT Sloan Sports Analytics Conference March 1, 2013 Will Cairns, Senior Data Scientist, HP Vertica So What s the market s definition of Big Data? Datasets whose volume, velocity, variety
Digitization of Enterprise - New Style of IT
Digitization of Enterprise - New Style of IT Neeraj Tolmare Oct 2014 What happens in an Internet Minute? 20 identity thefts 20 million photo views 1.3 million video views 6 million Facebook views 100,000
Doing Multidisciplinary Research in Data Science
Doing Multidisciplinary Research in Data Science Assoc.Prof. Abzetdin ADAMOV CeDAWI - Center for Data Analytics and Web Insights Qafqaz University [email protected] http://ce.qu.edu.az/~aadamov 16 May
What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy
What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy Much higher Volumes. Processed with more Velocity. With much more Variety. Is Big Data so big? Big Data Smart Data Project HAVEn: Adaptive Intelligence
Architecting for Big Data Analytics and Beyond: A New Framework for Business Intelligence and Data Warehousing
Architecting for Big Data Analytics and Beyond: A New Framework for Business Intelligence and Data Warehousing Wayne W. Eckerson Director of Research, TechTarget Founder, BI Leadership Forum Business Analytics
How To Make Sense Of Data With Altilia
HOW TO MAKE SENSE OF BIG DATA TO BETTER DRIVE BUSINESS PROCESSES, IMPROVE DECISION-MAKING, AND SUCCESSFULLY COMPETE IN TODAY S MARKETS. ALTILIA turns Big Data into Smart Data and enables businesses to
CAP4773/CIS6930 Projects in Data Science, Fall 2014 [Review] Overview of Data Science
CAP4773/CIS6930 Projects in Data Science, Fall 2014 [Review] Overview of Data Science Dr. Daisy Zhe Wang CISE Department University of Florida August 25th 2014 20 Review Overview of Data Science Why Data
HP HAVEn: See the big picture in Big Data
HP HAVEn: See the big picture in Big Data Table of contents The HAVEn vision All Big Data matters Profit from 100 percent of your data with HP HAVEn The HP HAVEn engines The Haven ecosystem Big Data usage
HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise
HP ENTERPRISE SECURITY Protecting the Instant-On Enterprise HP SECURITY INTELLIGENCE AND RISK MANAGEMENT PLATFORM Advanced Protection Against Advanced Threats 360 Security Monitoring to Detect Incidents
Now, Next and the Future: IT, Big Data and other Implications for RIM. Presented by Michael S. Smith / http://about.me/mikessmith
Now, Next and the Future: IT, Big Data and other Implications for RIM Agenda for This Afternoon Now: What trends are creating implications within the profession? Next: Why is IT now concerned about RIM?
CLOUD ADOPTION & RISK IN GOVERMENT REPORT
CLOUD ADOPTION & RISK IN GOVERMENT REPORT Q1 2015 Published Q2 2015 1 TABLE OF CONTENTS 01 02 04 06 08 09 10 11 INTRODUCTION OVERVIEW OF CLOUD ADOPTION AND RISK CALCULATED RISK COMPROMISED IDENTITIES PERCEPTION
CLOUD ADOPTION & RISK IN EUROPE REPORT. Q2 2015 Published Q3 2015
CLOUD ADOPTION & RISK IN EUROPE REPORT Q2 2015 Published Q3 2015 TABLE OF CONTENTS 01 03 05 06 07 08 09 11 12 13 INTRODUCTION OVERVIEW OF CLOUD ADOPTION INSIDER THREATS IN THE CLOUD COMPROMISED CREDENTIALS
AGENDA. What is BIG DATA? What is Hadoop? Why Microsoft? The Microsoft BIG DATA story. Our BIG DATA Roadmap. Hadoop PDW
AGENDA What is BIG DATA? What is Hadoop? Why Microsoft? The Microsoft BIG DATA story Hadoop PDW Our BIG DATA Roadmap BIG DATA? Volume 59% growth in annual WW information 1.2M Zetabytes (10 21 bytes) this
BI in the Cloud Sky is the limit
BI in the Cloud Sky is the limit Vishal Agrawal Product Technical Architect Infosys Tech Ltd Anand Govindarajan Principal Technology Architect Infosys Tech Ltd Current state of BI systems Key characteristics
Changing the Enterprise Security Landscape
Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein
Quick guide: Using the Cloud to support your business
Quick guide: Using the Cloud to support your business This Quick Guide is one of a series of information products targeted at small to medium sized enterprises (SMEs). It is designed to help businesses
Find the intruders using correlation and context Ofer Shezaf
Find the intruders using correlation and context Ofer Shezaf Agenda The changing threat landscape What can you do to find intruders? Best practices for timely detection and mitigation HP ArcSight 2 Find
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM
Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM TODAY S AGENDA Describe the need for SIEM Explore different options available for SIEM Demonstrate a few Use Cases Cover some caveats
International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072
Fear of Cloud Vinnakota Saran Chaitanya 1, G. Harshavardhan Reddy 2 1 UG Final year student, Department of Computer Science and Engineering, G. Pulla Reddy Engineering College, Andhra Pradesh, India 2
HP Big Data & Analytics for CSPs and Customers. Fouad Bendris / Big Data Lead Enterprise Group PreSales & Strategic Pursuits - EMEA
HP Big Data & Analytics for CSPs and Customers Fouad Bendris / Big Data Lead Enterprise Group PreSales & Strategic Pursuits - EMEA Agenda Big Data Trends - Challenges & Opportunities Haven Platform : The
Securing the Cloud infrastructure with IBM Dynamic Cloud Security
Securing the Cloud infrastructure with IBM Dynamic Cloud Security Ngo Duy Hiep Security Brand Manager Cell phone: +84 912216753 Email: [email protected] 12015 IBM Corporation Cloud is rapidly transforming
Big Data: What You Should Know. Mark Child Research Manager - Software IDC CEMA
Big Data: What You Should Know Mark Child Research Manager - Software IDC CEMA Agenda Market Dynamics Defining Big Data Technology Trends Information and Intelligence Market Realities Future Applications
Building HTML5 and hybrid mobile apps using cloud services. Andrei Glazunov
Building HTML5 and hybrid mobile apps using cloud services Andrei Glazunov About Exadel Exadel is a global software engineering company. Founded in 1998, headquarters in San Francisco Bay Area 7 development
Cloud Adoption & Risk Report Q3 2013
Cloud Adoption & Risk Report Q 201 Based on data from,000,000+ users Representing the following industries: Financial Services Healthcare High Tech Media Manufacturing Services Table of Contents The Cloud
CIS 4930/6930 Spring 2014 Introduction to Data Science Data Intensive Computing. University of Florida, CISE Department Prof.
CIS 4930/6930 Spring 2014 Introduction to Data Science Data Intensive Computing University of Florida, CISE Department Prof. Daisy Zhe Wang Data Science Overview Why, What, How, Who Outline Why Data Science?
From the Bottom to the Top: The Evolution of Application Monitoring
From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:
U.S. IT Buyer Survey Shows Outsourcers Bring Strength to Cloud
Customer Needs and Strategies U.S. IT Buyer Survey Shows Outsourcers Bring Strength to Cloud David Tapper This is an IDC Excerpt developed for IBM IN THIS EXCERPT The content for this excerpt was taken
Решения HP по информационной безопасности
Решения HP по информационной безопасности Евгений Нечитайло [email protected] Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY How runtime application security monitoring helps enterprises make smarter decisions on remediation 2 ABSTRACT Enterprises today
Il mondo dei DB Cambia : Tecnologie e opportunita`
Il mondo dei DB Cambia : Tecnologie e opportunita` Giorgio Raico Pre-Sales Consultant Hewlett-Packard Italiana 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject
Building Out Your Cloud-Ready Solutions. Clark D. Richey, Jr., Principal Technologist, DoD
Building Out Your Cloud-Ready Solutions Clark D. Richey, Jr., Principal Technologist, DoD Slide 1 Agenda Define the problem Explore important aspects of Cloud deployments Wrap up and questions Slide 2
Connected Intelligence and the 21 st Century Digital Enterprise
Connected Intelligence and the 21 st Century Digital Enterprise Lewis Carr Senior Director, HP Software May 25 th, 2015 By 2025 we will become a deeply connected, digital world Digital everything everywhere,
WHAT IS BIG DATA? David Bechtold
WHAT IS BIG DATA? David Bechtold Agenda 1. Introduction 2. What is Big Data? 3. Big Data a perspective 4. Characteristic of Big Data Three Vs 5. A Fourth V..? 6. Examples 7. How did we get here?... A historical
USE OF CLOUD COMPUTING BY SMALL AND MEDIUM ENTERPRISES
1 USE OF CLOUD COMPUTING BY SMALL AND MEDIUM ENTERPRISES Introduction Small and Medium Enterprises (SMEs) are the drivers of a nation s economy SMEs are leading the way for entering new global markets
CLOUD COMPUTING OVERVIEW
2110414 - Large Scale Computing Systems 1 CLOUD COMPUTING OVERVIEW 2110414 Large Scale Computing Systems Natawut Nupairoj, Ph.D. Outline 2 Overview Cloud Approaches Real-World Case Study 2110414 - Large
Big Data Buzzwords From A to Z. By Rick Whiting, CRN 4:00 PM ET Wed. Nov. 28, 2012
Big Data Buzzwords From A to Z By Rick Whiting, CRN 4:00 PM ET Wed. Nov. 28, 2012 Big Data Buzzwords Big data is one of the, well, biggest trends in IT today, and it has spawned a whole new generation
HP Helion Cloud. 鄭 凱 元, Jim Cheng 惠 普 科 技, 雲 端 事 業 處
HP Helion Cloud 鄭 凱 元, Jim Cheng 惠 普 科 技, 雲 端 事 業 處 Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Agenda 2 Copyright 2013
What happens when Big Data and Master Data come together?
What happens when Big Data and Master Data come together? Jeremy Pritchard Master Data Management fgdd 1 What is Master Data? Master data is data that is shared by multiple computer systems. The Information
Bezpečnosť dát v HP Cloude
Bezpečnosť dát v HP Cloude Ochrana dát a súkromia v cloudových službách Február 2013 Agenda TRENDY RIEŠENIA HP PRÍKLADY 2 Security awareness at board level Security leadership is under immense pressure
Leveraging the Cloud for Your Business
Leveraging the Cloud for Your Business by CornerStone Telephone Company 2 Third Street Troy, NY 12180 As consumers, we enjoy the benefits of cloud services from companies like Amazon, Google, Apple and
Outlook for Cloud technology in Big Data and Mobility
2014 Outlook for Cloud technology in Big Data and Mobility Wayne Collette, CFA, Senior Portfolio Manager Cloud technology is a significant and ongoing trend affecting the technology industry. A new breed
Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR
Achieving Actionable Situational Awareness... McAfee ESM Ad Quist, Sales Engineer NEEUR The Old SECURITY Model Is BROKEN 2 Advanced Targeted Attacks The Reality ADVANCED TARGETED ATTACKS COMPROMISE TO
Enterprise Resource Planning (ERP) 2014 Trends
2014 National BDPA Technology Conference Enterprise Resource Planning (ERP) 2014 Trends Derris Boomer August 4-9, 2014 Indianapolis, IN Presentation Objectives Define ERP History of ERP Current ERP Market
Security Operation Centre 5th generation
Security Operation Centre 5th generation transition Cezary Prokopowicz Regional Manager SEE HP Enterprise Security Products 2 3 4 5 Challenges you are facing 1 Nature and motivation of attacks (Fame to
ITP 140 Mobile Technologies. Mobile Topics
ITP 140 Mobile Technologies Mobile Topics Topics Analytics APIs RESTful Facebook Twitter Google Cloud Web Hosting 2 Reach We need users! The number of users who try our apps Retention The number of users
Driving Better Marketing Results with Big Data and Analytics David Corrigan, IBM, Director of Product Marketing
Driving Better Marketing Results with Big Data and Analytics David Corrigan, IBM, Director of Product Marketing Optimizing Marketing with Big Data and Analytics Leverage Social Media Datacentric Marketing
THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE
THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE How application threat intelligence can make existing enterprise security infrastructures smarter THE BLIND SPOT IN THREAT INTELLIGENCE
However, there has still been one serious limitation until now.
INTRODUCTION Social Media is now the dominant communication platform for just about everyone especially home buyers. The traffic they create is in the billions of hits per day and any agent/broker who
CLOUD ADOPTION & RISK REPORT
CLOUD ADOPTION & RISK REPORT Q4 2014 Published Q1 2015 1 TABLE OF CONTENTS 01 02 04 05 06 08 10 11 12 15 INTRODUCTION OVERVIEW OF CLOUD ADOPTION AND RISK CALCULATED RISK THE OVER SHARING EFFECT SENSITIVE
Cloud Computing Now and the Future Development of the IaaS
2010 Cloud Computing Now and the Future Development of the IaaS Quanta Computer Division: CCASD Title: Project Manager Name: Chad Lin Agenda: What is Cloud Computing? Public, Private and Hybrid Cloud.
Mind Commerce. http://www.marketresearch.com/mind Commerce Publishing v3122/ Publisher Sample
Mind Commerce http://www.marketresearch.com/mind Commerce Publishing v3122/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
