SECURITY MEETS BIG DATA Achieve Effectiveness And Efficiency 1
IN 2010 THE DIGITAL UNIVERSE WAS 1.2 ZETTABYTES 1,000,000,000,000,000,000,000 Zetta Exa Peta Tera Giga Mega Kilo Byte Source: 2010 IDC Digital Universe Study 2
IN 2000 THE WORLD GENERATED TWO EXABYTES OF NEW INFORMATION Sources: How Much Information? Peter Lyman and Hal Varian, UC Berkeley,. 2011 IDC Digital Universe Study. 3
IN 2000 THE WORLD GENERATED TWO EXABYTES OF NEW INFORMATION EVERY DAY Sources: How Much Information? Peter Lyman and Hal Varian, UC Berkeley,. 2011 IDC Digital Universe Study. 4
The Data Deluge This Decade 2029 2009 0.8 ZB 2020 44 TIMES LARGER 35.2 ZB 28 TIMES LARGER 1 Yottabyte Source: IDC Digital Universe Study, sponsored by EMC, 2011 5
What s Driving The Data Deluge? Video Rendering Mobile Sensors Social Media FACEBOOK GROWS BY 250 MILLION PHOTOS / DAY Video Surveillance READING METERS EVERY 15 MINS. IS 3,000X MORE DATA INTENSIVE Smart Grids Geophysical Exploration Medical Imaging Gene Sequencing COST TO SEQUENCE ONE GENOME HAS FALLEN FROM $100M IN 2001 TO $10K IN 2011 6
What Is Big Data? 7
big data \ datasets so large they break traditional IT infrastructures. 8
Where Is Big Data? 9
Big Data Is Everywhere Source: 2011 IDC Digital Universe Study 10
Big Data Is In Every Industry Transforming Business With Big Data Analytics Financial Telecom Retail Energy Insurance Government Healthcare Cyber Security Advertising Gaming 11
1,000,000,000 Queries A Day 250,000,000 New Photos / Day 290,000,000 Updates / Day 2,800,000,000 Trades / Day 4,000,000 Claims / Day 31,000,000,000 Interactions / Day 12
How Big Is Big Data? 13
Big Data Is A Relative Concept What is Big Today May Not Be So Big Tomorrow. 14
How Different Is Big Data Analytics? 15
Predictive. Embedded. 16
Big Data Requires Data Science High BUSINESS VALUE Low Business Intelligence Data Science Data Science Predictive analysis What if..? Business Intelligence Standard reporting What happened? Past TIME Future 17
Enterprise Information Structured Information In Relational Databases 5X LARGER GROWING 3X FASTER Unstructured Information 18
How Companies Are Using Big Data Functional Areas Where Companies Are Using Big Data Customer Intimacy Budgeting & Planning Operations & Supply Chain Customer Service Performance Management New Product Strategy Pricing 49% 39% 37% 33% 30% 28% 21% 0 10 20 30 40 50 McKinsey Global Survey of 1,469 C-level executive respondents at a range of industries and company sizes, Minding Your Digital Business, 2012. 19
The New Data Scientist? BI focuses on managing and reporting on existing data to monitor and manage concerns within the enterprise Data Science applies advanced analytical tools and algorithms to generate predictive insights and new product innovations that are a direct result of the data Source: EMC Study, Data Science Revealed: A Data-Driven Glimpse into the Burgeoning New Field, December 5, 2011 20
How Can Big Data Analytics Help You? Understand Customer Behavior Manage Risk More Efficiently & Effectively Improve Fraud Detection 21
Greenplum Unified Analytics Platform 22
China CITIC Bank Reduces Risk and Drives Credit Card Revenue 23
Reduce Risk and Increase Revenues Greenplum and Alpine Data Labs Enables Predictive Analytics Reduce analytics process from months to days Reduce risk with real-time customer data enabling quick adjustments to credit limits Improved marketing campaign configuration times by 86% The credit card center has already gained up to 40 times the project investment, which is a significant achievement. 24
How Can Big Data Analytics Help You Even More? Detecting Advanced Threats Detecting Online Fraud Identity Risk Analysis 25
Security Challenges Are Bigger Than Ever Mobile Cloud Big Data Social/ Collaboration Extended Supply Chain APTs Sophisticated Fraud Infrastructure Transformation Less control over access device and back-end infrastructure Business Transformation More hyper-extended, more digital Threat Landscape Transformation Fundamentally different tactics, more formidable than ever 26
New World Advanced Threats 85% of breaches weeks or more to discover Breach response under 2 hours 60% reduced risk Source: Verizon 2012 Data Breach Investigations Report 27
Evolution to Advanced Security Hi Advanced Security Predictive analysis Activity. What if? VALUE Data Science Traditional Security Low Monitor and Manage Past TIME Future Reports and Response What happened? 28
Traditional: Collect and report on existing data to monitor and manage risk Advanced: Advanced analytics and algorithms generate predictive insights and active controls as direct result of data Security Analysis Source: EMC Study, Data Science Revealed: A Data-Driven Glimpse into the Burgeoning New Field, December 5, 2011 29
Security Operations Addressing Advanced Persistent Threats 1 TARGETED SPECIFIC OBJECTIVE System Attack Intrusion Begins Cover-Up Discovery Leap Frog Attacks 2 INTERACTIVE HUMAN INVOLVEMENT Cover-Up Complete 3 STEALTHY LOW AND SLOW TIME Dwell Time Response Time 1 Decrease Dwell Time Attack Identified 2 Speed Response Time Response 30
The RSA Security Analytics Platform RSA Security Analytics Platform RSA Archer GRC Suite Big Data Analytics Governance Network Packets Alerting & Reporting Compliance & Business Context Log Files IT Assets Big Data Store Investigations Malware Analytics Visualization Incident Management & Workflow Information Assets Data Leakage Active Defense & Remediation RSA Live 31
Our Commitment To Data Science Empowering Data Science Teams To Drive Success Data Science Training & Certification Collaboration with EMC Academic Alliance Data Science Analytics Lab In-house PhDs with analytics expertise Data Science Community Invest in the growth of Data Science 32
33