Big Data-ready, Secure & Sovereign Cloud



Similar documents
1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Integrating a Big Data Platform into Government:

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

Cloud Courses Description

Managing the Challenges of Cloud Management November 7, 2013

Delivering secure, real-time business insights for the Industrial world

Towards a Thriving Data Economy: Open Data, Big Data, and Data Ecosystems

locuz.com Big Data Services

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

Analytics in the Cloud. Peter Sirota, GM Elastic MapReduce

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON

Cloud Computing Standards: Overview and ITU-T positioning

PaaS Cloud Migration Migration Process, Architecture Problems and Solutions. Claus Pahl and Huanhuan Xiong

RAVEN, Network Security and Health for the Enterprise

Cloud Courses Description

Scaling Big Data Mining Infrastructure: The Smart Protection Network Experience

Cloud Computing Standards: Overview and first achievements in ITU-T SG13.

Scale Cloud Across the Enterprise

This Symposium brought to you by

How To Use Big Data For Telco (For A Telco)

Cyber Security VTT and the Finnish Approach

The Cyber Threat Profiler

Transform service delivery with HP Cloud Management

BIG DATA-AS-A-SERVICE

Ayla Networks, Inc. SOC 3 SysTrust 2015

Enterprise Security Solutions

Create and Drive Big Data Success Don t Get Left Behind

Become a hunter: fi nding the true value of SIEM.

Lecture 32 Big Data. 1. Big Data problem 2. Why the excitement about big data 3. What is MapReduce 4. What is Hadoop 5. Get started with Hadoop

BAE SYSTEMS CYBERREVEAL G-CLOUD SERVICE DEFINITION

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

Elevate your analytics with SAS in the cloud

Concept and Project Objectives

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

A Roadmap for Future Architectures and Services for Manufacturing. Carsten Rückriegel Road4FAME-EU-Consultation Meeting Brussels, May, 22 nd 2015

Comprehensive Analytics on the Hortonworks Data Platform

Big Data Mining Services and Knowledge Discovery Applications on Clouds

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

BIG DATA Alignment of Supply & Demand Nuria de Lama Representative of Atos Research &

How To Make Data Streaming A Real Time Intelligence

Trust and Dependability in Cloud Computing

Fujitsu Global Cloud Strategy

2015 IBM Continuous Engineering Open Labs Target to better LEARNING

Cisco Cloud Enablement Services for Adopting Clouds

COMP9321 Web Application Engineering

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Search and Data Mining: Techniques. Introduction Anna Yarygina Boris Novikov

IBM Security IBM Corporation IBM Corporation

Client Overview. Engagement Situation. Key Requirements

Automated Data Ingestion. Bernhard Disselhoff Enterprise Sales Engineer

Continuous???? Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

and Deployment Roadmap for Satellite Ground Systems

Learn How to Leverage System z in Your Cloud

Distributed Computing and Big Data: Hadoop and MapReduce

Big Data and Complex Networks Analytics. Timos Sellis, CSIT Kathy Horadam, MGS

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

Oracle Big Data Handbook

Evolution Of Cyber Threats & Defense Approaches

Exploiting the power of Big Data

UNIFY YOUR (BIG) DATA

Booz Allen Cloud Solutions. Our Capability-Based Approach

Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views

Intrusion Detection via Machine Learning for SCADA System Protection

Big Data Analytics Nokia

Daniel J. Adabi. Workshop presentation by Lukas Probst

The 4 Pillars of Technosoft s Big Data Practice

CONNECTING DATA WITH BUSINESS

KICK-START CLOUD VENTURES

Big Data and Analytics: Challenges and Opportunities

Copyright 2014, Oracle and/or its affiliates. All rights reserved.

Chukwa, Hadoop subproject, 37, 131 Cloud enabled big data, 4 Codd s 12 rules, 1 Column-oriented databases, 18, 52 Compression pattern, 83 84

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

A STUDY OF ADOPTING BIG DATA TO CLOUD COMPUTING

Customized Report- Big Data

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

Transcription:

Copernicus Big Data Workshop Big Data-ready, Secure & Sovereign Cloud A Technology Enabler for Copernicus Data Innovation March 14 th, 2014 Brussels F. BOUJEMAA R&D Manager E. MICONNET - Head of Cyber Security Lab faycal.boujemaa@cloudwatt.com emmanuel.miconnet@thalesgroup.com

About Cloudwatt Sovereign Public Cloud Services Provider (w/european scope) Complying with French & European Regulation (data location, privacy, resiliency ) Joint Venture (Orange, Thales & Digital Society Strategic Fund) Making the most of Orange IT & Networking expertise with IT & Thales Mission-Critical Systems expertise

Software / integration Tightly-Coupling Big Data & Secure Open Source-based Cloud Copernicus & other Closed/ Open Data Decide Predict Simulate Agencies, Enterprises Decision Makers, Researchers Scalable IaaS ISVs, Developers Big Data PaaS Dev. / Deployment Tools Closed / Open Data Catalogues Storage HDD/SSD Visualization Layer Network Analytics Layer Scalable as-a-service Compute S e c u r i t y Hadoop cluster Life-cycle Mgt. Savanna Value-added Integrators (VAIs) + Data Scientists Big Data-ready IaaS Partner's Value-added

4 / Why moving towards Big Data & Big Analytics for Security? Large IS generate large volumes of data which are not/poorly exploited The coupling between Big Data / Big Analytics and Cloud Computing allows to develop new products & services, optimizing critical information management processes (anomaly detection, forensics ) 2013 Model based Approach Cybersecurity Big Analytics Approach 2010 2011 Smart Transport Smart City 130 billions of logs / year Sampling is not suited Anomalies may span on large periods 2009 Detection & forensics of efrauds Large graphs (Social Network Analysis) 5 billions of transactions / year (STIF/Ticketing) + Other data Limitations of model-based reasoning Real time, complex requests 2 billions of transactions / year Exhaustiveness, real time, complex requests 500 000 nodes SQL modeling not suited. Performance problems to traverse graphs, partition the data, complex requests Highly heterogeneous data coming from Thales systems (ticketing, maintenance & supervision) and external data: Open data, social data. Exhaustiveness, real time, complex requests

5 / Cybersecurity / Big Analytics Use Case Cyber Intelligence Logs Analytics Logs & Content Analytics IS Dynamic Mapping Detection / Forensics of cyber threats mentioned in the social media Analysis of the behaviours of hacker communities Anticipation, prevention of attacks (and reaction speedup) Detection / Filtering of anomalous behaviours & events while reducing the false alarm rate Forensics on the detected anomalies Correlations between IDS alerts and content data to deepen the analysis of the security events Correlations between anomalies detected in the network flows and the content data Dynamic cartography of the IS to visualize the topology of the monitored system and visually detect anomalies Mapping of the alarms raised by security devices and by log mining tools on the IS topology Architecture & Algorithms Migration towards a graph DB Text clustering Graph clustering Tulip/Thales platform Architecture & Algorithms Hadoop, MapReduce Toolbox Analytics Architecture & Algorithms Hadoop, MapReduce Toolbox Analytics Architecture & Algorithms Tulip/Thales platform Big Data Architecture & Big Analytics algorithms CYBELS Alert notification Decision making / enhanced strategies for critical infrastructure protection and defence

Innovation Platform for Adding-value to Copernicus Data A Marketplace fostering: Service Creation (mono-domain) Service Composition (x-domains) Service Monetization & Revenue Sharing Ecosystem & users Management Enterprises, Agencies Nomadic End-users Home Education Emergency Climate change Cloud Operator Health SmartCities Orchestrate Compose. Oceanography Agriculture Infrastructure (compute / storage / network) Innovation Ecosystem Closed/Open Data Providers Crowd- Sourcing ISVs System Integ. Agencies Academia Research Centers

Summarizing Innovation Ecosystem Value-Added Reseller (VAR) Value-Added Integrator (VAI) Agencies Customers End-Users Innovation Players Innovative Services White Label Marketplace Operator B2B2B (XaaS) Enterprises Business Market Marketplace X/SaaS PaaS White Label Marketplace B2B2C (XaaS) Consumers Mass Market Hadoop-Enhanced IaaS Network Test & Dev. Innovation Players ISO 27001 Certif. Other Copernicus Partner Platforms

This Platform is ours, please tell us more about your needs Thanks for your attention faycal.boujemaa@cloudwatt.com emmanuel.miconnet@thalesgroup.com