SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.



Similar documents
Security Analytics for Smart Grid

BIG DATA. Shaun McLagan General Manager, RSA Australia and New Zealand CHANGING THE REALM OF POSSIBILITY IN SECURITY

Intelligence-Driven Security

The session is about to commence. Please switch your phone to silent!

Increase Revenue THE JOURNEY TO BIG DATA. Gary Evans. CTO EMC Ireland. Twitter.com/Gary3vans. Copyright 2013 EMC Corporation. All rights reserved.

Advanced Threats: The New World Order

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

CLOUD BIG DATA. Pat Gelsinger President & COO Information Infrastructure Products EMC Corporation TRANSFORMS IT TRANSFORMS BUSINESS

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

The Future of the Advanced SOC

CIAB FINANCE & DISRUPTION

The Next Generation Security Operations Center

Rashmi Knowles Chief Security Architect EMEA

Getting Ahead of Advanced Threats

Security Trends. The Case for Intelligence-Driven Security. Copyright 2013 EMC Corporation. All rights reserved.

After the Attack. The Transformation of EMC Security Operations

Introduction to the Mathematics of Big Data. Philippe B. Laval

Cloud & Big Data Transforming Businesses

Joining Forces: Bringing Big Data to your Security Team

Information Security, PII and Big Data

Big Data Analytics. David Dietrich, EMC Education Services. April 4, 2013

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Data Analytics for a Secure Smart Grid

Beyond Watson: The Business Implications of Big Data

The Future of Data Management

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Data Centric Computing Revisited

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

AMPLIFYING SECURITY INTELLIGENCE

HP Vertica at MIT Sloan Sports Analytics Conference March 1, 2013 Will Cairns, Senior Data Scientist, HP Vertica

Copyright 2012 EMC Corporation. All rights reserved.

Ahead of the threat with Security Intelligence

Fulfilling your data obsession

Mike Maxey. Senior Director Product Marketing Greenplum A Division of EMC. Copyright 2011 EMC Corporation. All rights reserved.

The Big Data Paradigm Shift. Insight Through Automation

Unlocking the Intelligence in. Big Data. Ron Kasabian General Manager Big Data Solutions Intel Corporation

Welcome to Services Discovery Channel. Host: Jean Wong, Head of Service Marketing, Asia Pacific, Japan and Greater China

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Big Data Analytics- Innovations at the Edge

data driven government

Big Data Arrêtons d en parler, passons à l action!

CyberArk Privileged Threat Analytics. Solution Brief

Attack Intelligence: Why It Matters

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

RSA Security Analytics the complete approach to security monitoring or how to approach advanced threats

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

The SIEM Evaluator s Guide

Doing Multidisciplinary Research in Data Science

Symantec Managed Security Services The Power To Protect

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Detect & Investigate Threats. OVERVIEW

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

SECURITY ANALYTICS & INTELLIGENCE FOR CRITICAL INFRASTRUCTURE

RESEARCH REPORT. The State of Streaming Big Data Analytics: 2014 Survey Results

Big Data and the Data Lake. February 2015

THE EMERGING GI ENVIRONMENT

Using Network Forensics to Visualize Advanced Persistent Threats

Continuous Network Monitoring

IBM Security Intelligence Strategy

Combating a new generation of cybercriminal with in-depth security monitoring

A New Era Of Analytic

Strengthening Intelligence and Investigations with Incident Management Software

How To Use Big Data Effectively

Now, Next and the Future: IT, Big Data and other Implications for RIM. Presented by Michael S. Smith /

Are You Ready for Big Data?

Enabling Manufacturing Transformation in a Connected World. John Shewchuk Technical Fellow DX

Developing Secure Software in the Age of Advanced Persistent Threats

Security and Privacy

Discover & Investigate Advanced Threats. OVERVIEW

Education in Transition. Learning in the 21 st Century. Paige Johnson Education Strategist Intel

Industry Impact of Big Data in the Cloud: An IBM Perspective

How Big Is Big Data Adoption? Survey Results. Survey Results Big Data Company Strategy... 6

EMC ACADEMIC ALLIANCE

VIEWPOINT. High Performance Analytics. Industry Context and Trends

Big Data Use Cases Update

WHAT IS BIG DATA? David Bechtold

CIS 4930/6930 Spring 2014 Introduction to Data Science Data Intensive Computing. University of Florida, CISE Department Prof.

End to End Solution to Accelerate Data Warehouse Optimization. Franco Flore Alliance Sales Director - APJ

What s New in Security Analytics Be the Hunter.. Not the Hunted

QRadar SIEM and FireEye MPS Integration

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

Cyber Situational Awareness for Enterprise Security

THE EVOLUTION OF SIEM

CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Security strategies to stay off the Børsen front page

BUY BIG DATA IN RETAIL

Advanced Persistent Threats

TRITON APX. Websense TRITON APX

The Future of Data Management with Hadoop and the Enterprise Data Hub

Next presentation starting soon Business Analytics using Big Data to gain competitive advantage

Data Science Transforming Security Operations

PDF PREVIEW EMERGING TECHNOLOGIES. Applying Technologies for Social Media Data Analysis

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Transcription:

SECURITY MEETS BIG DATA Achieve Effectiveness And Efficiency 1

IN 2010 THE DIGITAL UNIVERSE WAS 1.2 ZETTABYTES 1,000,000,000,000,000,000,000 Zetta Exa Peta Tera Giga Mega Kilo Byte Source: 2010 IDC Digital Universe Study 2

IN 2000 THE WORLD GENERATED TWO EXABYTES OF NEW INFORMATION Sources: How Much Information? Peter Lyman and Hal Varian, UC Berkeley,. 2011 IDC Digital Universe Study. 3

IN 2000 THE WORLD GENERATED TWO EXABYTES OF NEW INFORMATION EVERY DAY Sources: How Much Information? Peter Lyman and Hal Varian, UC Berkeley,. 2011 IDC Digital Universe Study. 4

The Data Deluge This Decade 2029 2009 0.8 ZB 2020 44 TIMES LARGER 35.2 ZB 28 TIMES LARGER 1 Yottabyte Source: IDC Digital Universe Study, sponsored by EMC, 2011 5

What s Driving The Data Deluge? Video Rendering Mobile Sensors Social Media FACEBOOK GROWS BY 250 MILLION PHOTOS / DAY Video Surveillance READING METERS EVERY 15 MINS. IS 3,000X MORE DATA INTENSIVE Smart Grids Geophysical Exploration Medical Imaging Gene Sequencing COST TO SEQUENCE ONE GENOME HAS FALLEN FROM $100M IN 2001 TO $10K IN 2011 6

What Is Big Data? 7

big data \ datasets so large they break traditional IT infrastructures. 8

Where Is Big Data? 9

Big Data Is Everywhere Source: 2011 IDC Digital Universe Study 10

Big Data Is In Every Industry Transforming Business With Big Data Analytics Financial Telecom Retail Energy Insurance Government Healthcare Cyber Security Advertising Gaming 11

1,000,000,000 Queries A Day 250,000,000 New Photos / Day 290,000,000 Updates / Day 2,800,000,000 Trades / Day 4,000,000 Claims / Day 31,000,000,000 Interactions / Day 12

How Big Is Big Data? 13

Big Data Is A Relative Concept What is Big Today May Not Be So Big Tomorrow. 14

How Different Is Big Data Analytics? 15

Predictive. Embedded. 16

Big Data Requires Data Science High BUSINESS VALUE Low Business Intelligence Data Science Data Science Predictive analysis What if..? Business Intelligence Standard reporting What happened? Past TIME Future 17

Enterprise Information Structured Information In Relational Databases 5X LARGER GROWING 3X FASTER Unstructured Information 18

How Companies Are Using Big Data Functional Areas Where Companies Are Using Big Data Customer Intimacy Budgeting & Planning Operations & Supply Chain Customer Service Performance Management New Product Strategy Pricing 49% 39% 37% 33% 30% 28% 21% 0 10 20 30 40 50 McKinsey Global Survey of 1,469 C-level executive respondents at a range of industries and company sizes, Minding Your Digital Business, 2012. 19

The New Data Scientist? BI focuses on managing and reporting on existing data to monitor and manage concerns within the enterprise Data Science applies advanced analytical tools and algorithms to generate predictive insights and new product innovations that are a direct result of the data Source: EMC Study, Data Science Revealed: A Data-Driven Glimpse into the Burgeoning New Field, December 5, 2011 20

How Can Big Data Analytics Help You? Understand Customer Behavior Manage Risk More Efficiently & Effectively Improve Fraud Detection 21

Greenplum Unified Analytics Platform 22

China CITIC Bank Reduces Risk and Drives Credit Card Revenue 23

Reduce Risk and Increase Revenues Greenplum and Alpine Data Labs Enables Predictive Analytics Reduce analytics process from months to days Reduce risk with real-time customer data enabling quick adjustments to credit limits Improved marketing campaign configuration times by 86% The credit card center has already gained up to 40 times the project investment, which is a significant achievement. 24

How Can Big Data Analytics Help You Even More? Detecting Advanced Threats Detecting Online Fraud Identity Risk Analysis 25

Security Challenges Are Bigger Than Ever Mobile Cloud Big Data Social/ Collaboration Extended Supply Chain APTs Sophisticated Fraud Infrastructure Transformation Less control over access device and back-end infrastructure Business Transformation More hyper-extended, more digital Threat Landscape Transformation Fundamentally different tactics, more formidable than ever 26

New World Advanced Threats 85% of breaches weeks or more to discover Breach response under 2 hours 60% reduced risk Source: Verizon 2012 Data Breach Investigations Report 27

Evolution to Advanced Security Hi Advanced Security Predictive analysis Activity. What if? VALUE Data Science Traditional Security Low Monitor and Manage Past TIME Future Reports and Response What happened? 28

Traditional: Collect and report on existing data to monitor and manage risk Advanced: Advanced analytics and algorithms generate predictive insights and active controls as direct result of data Security Analysis Source: EMC Study, Data Science Revealed: A Data-Driven Glimpse into the Burgeoning New Field, December 5, 2011 29

Security Operations Addressing Advanced Persistent Threats 1 TARGETED SPECIFIC OBJECTIVE System Attack Intrusion Begins Cover-Up Discovery Leap Frog Attacks 2 INTERACTIVE HUMAN INVOLVEMENT Cover-Up Complete 3 STEALTHY LOW AND SLOW TIME Dwell Time Response Time 1 Decrease Dwell Time Attack Identified 2 Speed Response Time Response 30

The RSA Security Analytics Platform RSA Security Analytics Platform RSA Archer GRC Suite Big Data Analytics Governance Network Packets Alerting & Reporting Compliance & Business Context Log Files IT Assets Big Data Store Investigations Malware Analytics Visualization Incident Management & Workflow Information Assets Data Leakage Active Defense & Remediation RSA Live 31

Our Commitment To Data Science Empowering Data Science Teams To Drive Success Data Science Training & Certification Collaboration with EMC Academic Alliance Data Science Analytics Lab In-house PhDs with analytics expertise Data Science Community Invest in the growth of Data Science 32

33