SlideShare une entreprise Scribd logo
1  sur  46
David Monahan
Research Director
EMA
Security Analytics and Big Data: What You Need to
Know
Sameer Nori
Senior Product Marketing
Manager
MapR
Nick Amato
Director Technical
Marketing
MapR
© 2015 MapR Technologies 2
Today’s Presenters
David Monahan, Research Director, Risk & Security Management, EMA
David has over 15 years of IT security experience and has organized and managed both physical and
information security programs, including Security and Network Operations (SOCs and NOCs) for
organizations ranging from Fortune 100 companies to local government and small public and private
companies.
Sameer Nori, Senior Product Marketing Manager, MapR Technologies
Sameer has over ten years of experience in the technology industry in marketing, pre-sales, and
consulting, with domain experience in business intelligence, analytics, and big data.
Nick Amato, Director, Technical Marketing, MapR Technologies
Nick works with the MapR ecosystem and technology partners to identify new opportunities where the
MapR platform can bring value to customers. His areas of focus include third-party integrations with BI
tools, benchmarking, architecture, and enabling scalable data platforms.
© 2015 MapR Technologies 3
Logistics for Today’s Webinar
A PDF of the PowerPoint
presentation will be available
An archived version of the event
recording will be available at
www.enterprisemanagement.com
• Log questions in the Q&A panel located on
the lower right corner of your screen
• Questions will be addressed during the
Q&A session of the event
Questions
Event recording
Event presentation
David Monahan
Research Director, Security and Risk Management
Enterprise Management Associates
http://www.enterprisemanagement.com
@SecurityMonahan
The Convergence of
Security Analytics and Big Data
April 27, 2015
© 2015 MapR Technologies 5
Threats Come From Everywhere
• Hacking: The mentality has changed
• Data breaches affect every industry
• Organizations are being attacked from all sides
– External threats
– Insider threats
• All information is up for grabs
© 2015 MapR Technologies 6
Identifying Threats is Harder Than Ever
EMA research identified several troubling statistics about
identifying and responding to threats:
of organizations were between “Highly Doubtful”
and only “Somewhat Confident” that they could
detect an important security issue before it had a
significant impact.
of organizations believe they
are consistently successful in
in correlating security data to
business impact.
of organizations said they
were unable to stop exploits
because of outdated or
insufficient threat intelligence.
69% 22%
60%
41%
28%
33%
29%
TOO DIFFICULT SEPARATING LEGITIMATE
FROM MALICIOUS ACTIVITY
TOO DIFFICULT PRIORITIZING
REMEDIATION ACTIVITIES
INABILITY TO REPORT MEANINGFUL
INFORMATION TO STAKEHOLDERS
INSUFFICIENT TOOLING TO
SUPPORT SECURITY DUTIES
Top frustrations with IT Security Practices:
© 2015 MapR Technologies 7
The Problem Requires Better Data and Better Tools
• Data volumes are too high
– EMA research identified that 45% of organizations are collecting
more than 40GB/day of logs
– Nearly 16% are collecting over 500GB/day of logs
• Data correlation and normalization is not sufficient
– Organizations are fielding 100:1 high priority and greater alerts per
person in security
• Operations, Analysts, and Responders need better context
and Higher Fidelity (Ponemon Study)
– Actionable Intelligence within 60 seconds reduced breach resolution
costs by an average of 40%
© 2015 MapR Technologies 8
The Problem Requires Better Data and Better Tools (cont’d)
• Persistent threats and their complexity is expanding rapidly
– Criminal organizations are creating new and better attacks
• [Gameover] Zeus (Botnet and data theft)
• Crypto-Locker/Wall, CTB-Locker (data theft)
• Dexter, POSLogr, BlackPOS (Point of Sale Terminal malware)
– The Nations states show criminals virtually anything is possible
• StuxNet malware (Supervisory Control and Data Acquisition (SCADA)
malware)
• Direct Memory Access Video RAM malware
• TAO- Micro processor embedded malware (network sniffing, key logging,
data collection, remote access, etc.)
• “nls_933w.dll”- Hard drive Firmware embedded malware (anything)
© 2015 MapR Technologies 9
The Problem Requires Better Data and Better Tools (cont’d)
• EMA Research has identified key issues with current tools
Most Significant Frustrations with IT Security Technologies
38%
36%
35%
LACK OF INTEGRATION/INTEROPERABILITY
TOOLS UNABLE TO RECOGNIZE EMERGING THREATS/ATTACKS
VENDORS ARE SLOW TO RESPOND TO EMERGING THREATS OR ATTACKS
© 2015 MapR Technologies 10
SIEM Limitations
SIEM technology provides real-time analysis of security alerts generated by network hardware
and applications.
This is limited “analysis” based primarily upon
correlation and normalization of alerts.
SIEM only understands deltas for those things inside of
its defined rules or policies
SIEM understands network information and log entries
to correlate events at a network level and identify
system/application alerts.
SIEM does not understand human, system, and
application specific activity and patterns (behaviors) to
determine how some activities raise the threat level.
Post notification SIEM often requires manual investigation*.
* EMA research found 55% of organizations said they still conduct
manual incident investigations
© 2015 MapR Technologies 11
SIEM Limitations(cont’d)
What features is your organization not getting from SIEM tools that it is
looking for in Security Analytics technology/products?
65%
53%
51%
ADVANCED AUTOMATED RESPONSE CAPABILITIES
INCREASED ABILITY TO EASILY AGGREGATE AND CROSS
ANALYZE DATA FROM NON-SECURITY SOURCES (IE
NETFLOW, WEB ACCESS LOGS)
ENHANCED DATA VISUALIZATION
© 2015 MapR Technologies 12
Poll Question #1
Have you heard of Security Analytics or
Security Intelligence as a solution?
A. Have not heard of it
B. Believe they are the same as SIEM
C. Deployed a security analytics solution
D. Considering security analytics in the next 6-12 months
© 2015 MapR Technologies 13
Moving to Security Analytics
Security Analytics Improvements
Better context and fidelity Reduce false positives
Reduce alert volumes Provide better prioritization
Accelerate Incident Response
of organizations using Security Analytics have
seen a reduction in false positives or an
improvement in actionable alerts since they
implemented a Security Analytics technology.
of organizations that use
Security Analytics said that the
tool produced expected or
greater than expected value.
90% 95%
© 2015 MapR Technologies 14
Why Security Analytics
Which of the following are your organization’s views or reasons why it needs/uses
capabilities for advanced analytics or security data management for IT/information
security?
53%
46%
43%
36%
IMPROVES DEFENSE AGAINST TARGETED THREATS
INCREASES OPERATIONAL EFFICIENCIES DEMONSTRATING HIGHER
SECURITY EFFECTIVENESS TO THE BUSINESS
IMPROVES PRODUCTIVITY/EFFICIENCY OF IT SECURITY EFFORTS
IMPROVES STRATEGIC DECISION MAKING
© 2015 MapR Technologies 15
Why Hadoop for Security Analytics
• We need tools that can handle more data and a wider variety of data.
– When asked if they would collect more data or a wider variety of data if they
could, 66% of organizations said they would. (Only 10% said they would not.)
– EMA Research - 57% of organizations said that they expect the greatest
improvements in security through data analysis to come from innovations from
IT security technologies and their vendors.
– For true fidelity we need to be able to combine ALL information relevant to
data management.
• User, system, application, network packet/netflow, infrastructure logging, HR records,
endpoint, et. al.
• EMA Research - 32% of organizations indicated they wanted to be able to analyze
unstructured data for use in security.
© 2015 MapR Technologies 16
Benefits of Hadoop for Security Analytics
• Purpose-built for processing large amounts of data
• Designed for unstructured data analysis
• Business Analytics can be applied to security use cases
• Increased ROI from a tool that supports both Business Intelligence
and Security Operations
47%
36%
35%
35%
MACHINE LEARNING TOOLS
FRAUD MANAGEMENT OR DETECTION SYSTEM
BUSINESS INTELLIGENCE (BI) PLATFORM
ENTERPRISE DATA WAREHOUSES
Which of the following non-traditional data sources are currently NOT included/supported by your
organizations current SIEM or log management system?
© 2015 MapR Technologies 17© 2015 MapR Technologies
Security Log Analytics on MapR
© 2015 MapR Technologies 18
Zions Bank: Security Analytics and Fraud Detection
Cost effective security analytics and fraud detection on one platform
• Fraud Operations and Security Analytics team at Zions maintains data stores, builds
statistical models to detect fraud, and then uses these models to data mine and
evaluate suspicious activity
“We initially got into centralizing all of our data from an information security perspective. We then saw
that we could use this same environment to help with fraud detection”
Michael Fowkes - SVP Fraud Operations and Security Analytics
• Existing technology infrastructure could not scale
• Timeliness of reports degraded over the last several years
• Chose MapR and cut storage costs by 50%
• Querying time reduced from 24 hours to 30 min on 1.2 PB of data
• Leverage MapR scale for increased model accuracy and deeper insights
OBJECTIVES
CHALLENGES
SOLUTION
Business
Impact
© 2015 MapR Technologies 19
Zions Bank with MapR – Faster Operations at Lower Costs
Web Server
Data
Transactional
Data
3rd Party Real Time
Fraud Detection
Reporting and
Batch Analytics
Deeper Analysis with
Machine Learning
PRD and Dev on
MapR
N
F
S
Technical Benefits
 High availability
 Multi-tenancy
 Snapshots
 Performance
Business Benefits
Unified platform for data
 Lower operating costs
 Operational guarantees
 Faster model development
© 2015 MapR Technologies 20
Solutionary: Managed Security Services Provider
Threat detection on real-time streaming data via platform as a service
• To address their growing customer base by processing trillions of messages (petabyte)
per year while continuing to provide reliable security services
• To improve data analytics by leveraging newer, more granular unstructured data
sources
”MapR has taken Apache Hadoop to a new level of performance and manageability. It integrates into
our systems seamlessly to help us boost the speed and capacity of data analytics for our clients.”
- Dave Caplinger, Director of Architecture, Solutionary
• Expanding existing database solution to meet demand was cost prohibitive
• The existing technology could not process unstructured data at scale
• Replaced RDBMS with MapR Enterprise Database Edition to scale Reduced time
needed to investigate security events for relevance and impact
• Improved data analytics, enabling new services and security analytics
• 2x faster performance compared to competing solutions
OBJECTIVES
CHALLENGES
SOLUTION
Business
Impact
Leader in Magic Quadrant
© 2015 MapR Technologies 21
Why MapR for Security Analytics
Business
• Large scale and deep
analytics on security data to
reduce risk
• Early detection of advanced
persistent threats and
unknown threats
• React fast on any abnormal
or malicious activity from
internal and external actors
• Avoid fines, lawsuits, loss of
business and negative PR
Technical
• Build a data vault for
security event logs from
multiple sources
• With more data to
scrutinize, get insights into
anomalous behavior and
close loop with other
security solutions
• Platform that enables
analysis of both historical
data as well as real-time
analysis of large volumes of
security data
Operations
• Fast ingestion of large
volume of data and perform
deep analytics
• Easy integration with
existing IT ecosystem
• Low overhead to maintain
system
• Early detection of threats
and closed loop feedback
with existing security
solutions
© 2015 MapR Technologies 22
The MapR Advantage
• Scale Reliability Across the Enterprise
– Advanced multi-tenancy
– Business continuity – HA, DR
• Speed
– 2-7x faster than other Hadoop distributions
– Ultra-fast data ingest (100M data points per sec)
– NFS & R/W file system
• Real-time & Self-Service Data Exploration
– On-the-fly SQL without up-front schema
– Fast lookups and queries
Best Hadoop Platform for Security Log Analytics
Security
Streaming
NoSQL & Search
Provisioning
&
coordination
ML, Graph
W orkflow
& Data Governance
Batch
SQL
INTEGRATED
COMMERCIAL
ENGINES
TOOLSCOMPUTE
ENGINES
Batch
Interactive
Real-time
Online
Others
Management
Operations
Governance
Audits
Security
MapR-FS MapR-DB
MapR Data Platform
© 2015 MapR Technologies 23
Poll Question #2
Do you use Hadoop for Security Analytics?
A. No, didn’t know it could be used for Security Analytics.
B. Yes, it's been 6 months or less.
C. Yes, it’s been deployed for 12 months or more.
D. No, but considering it in the next 6-12 months.
© 2015 MapR Technologies 24
What’s in the Quick Start Solution
6 nodes of
MapR software
2 week
engagement
3 Hadoop
Professional
Certifications
© 2015 MapR Technologies 25
Quick Start Service Engagement
Engagement includes:
1. Identification of data sources, transformations and reporting engines
2. Access and use of the solution template including source code
3. Training on customizing the solution template to the organization’s requirement
4. Deployment architecture document that enables a production deployment plan for the specific solution
SOLUTION
TEMPLATE
KNOWLEDGE
TRANSFER
DEPLOYMENT
ARCHITECTURE
© 2015 MapR Technologies 26
Components of the Solution Template
• Data Workflows
– Read/collect input data
– Handle bulk load and streaming use cases
• Parsers and Enrichment
– Process input data (filtering and deriving additional data as needed)
– Storing in one or more data types or formats
• Machine learning
– Clustering analysis
– Reservoir sampling analysis
INTEGRATED
COMMERCIAL
ENGINES
TOOLSCOMPUTE
ENGINES
MapR Data Platform
© 2015 MapR Technologies 27
The Power of the Open Source Community
APACHE HADOOP AND OSS ECOSYSTEM
Security
YARN
Spark
Streaming
Storm
StreamingNoSQL &
Search
Juju
Provisioning
&
Coordination
Sahara
ML, Graph
Mahout
MLLib
GraphX
EXECUTION ENGINES DATA GOVERNANCE AND OPERATIONS
Workflow
& Data
Governance
Pig
Cascading
Spark
Batch
MapReduce
v1 & v2
Tez
HBase
Solr
Hive
Impala
Spark SQL
Drill
SQL
Sentry Oozie ZooKeeperSqoop
Flume
Data
Integration
& Access
HttpFS
Hue
Data PlatformMapR-FS MapR-DB
Management
© 2015 MapR Technologies 28
MapR: Best Solution for Customer Success
Premier
Investors
High Growth
2X Growth In Direct Customers
90% Subscription Licenses
Software Margins
140
%
Dollar-based Net Expansion
700+
Customers
2X Growth In Annual
Subscriptions ( ACV)
Best Product
Apache Open
Source
© 2015 MapR Technologies 29
Security Log Analytics Template
MapR-FS
MapR-DB
© 2015 MapR Technologies 30
Resources
https://www.mapr.com/solutions/quickstart/hadoop
-security-log-analytics-quick-start
– Research Report: The Evolution of Data Driven
Security
– Solution Brief: Jump-Start Security Log Analytics
© 2015 MapR Technologies 31
Freeon-demand
Hadoop training leading to certification
Start becoming an expert now
mapr.com/training
50MIn Free Training
© 2015 MapR Technologies 32
Q&A
@mapr maprtech
sales@mapr.com
Engage with us!
MapR
maprtech
mapr-technologies
© 2015 MapR Technologies 33© 2015 MapR Technologies
Security Log Analytics on MapR
© 2015 MapR Technologies 34
Zions Bank: Security Analytics and Fraud Detection
Cost effective security analytics and fraud detection on one platform
• Fraud Operations and Security Analytics team at Zions maintains data stores, builds
statistical models to detect fraud, and then uses these models to data mine and
evaluate suspicious activity
“We initially got into centralizing all of our data from an information security perspective. We then saw
that we could use this same environment to help with fraud detection”
Michael Fowkes - SVP Fraud Operations and Security Analytics
• Existing technology infrastructure could not scale
• Timeliness of reports degraded over the last several years
• Chose MapR and cut storage costs by 50%
• Querying time reduced from 24 hours to 30 min on 1.2 PB of data
• Leverage MapR scale for increased model accuracy and deeper insights
OBJECTIVES
CHALLENGES
SOLUTION
Business
Impact
© 2015 MapR Technologies 35
Zions Bank with MapR – Faster Operations at Lower Costs
Web Server
Data
Transactional
Data
3rd Party Real Time
Fraud Detection
Reporting and
Batch Analytics
Deeper Analysis with
Machine Learning
PRD and Dev on
MapR
N
F
S
Technical Benefits
 High availability
 Multi-tenancy
 Snapshots
 Performance
Business Benefits
Unified platform for data
 Lower operating costs
 Operational guarantees
 Faster model development
© 2015 MapR Technologies 36
Solutionary: Managed Security Services Provider
Threat detection on real-time streaming data via platform as a service
• To address their growing customer base by processing trillions of messages (petabyte)
per year while continuing to provide reliable security services
• To improve data analytics by leveraging newer, more granular unstructured data
sources
”MapR has taken Apache Hadoop to a new level of performance and manageability. It integrates into
our systems seamlessly to help us boost the speed and capacity of data analytics for our clients.”
- Dave Caplinger, Director of Architecture, Solutionary
• Expanding existing database solution to meet demand was cost prohibitive
• The existing technology could not process unstructured data at scale
• Replaced RDBMS with MapR Enterprise Database Edition to scale Reduced time
needed to investigate security events for relevance and impact
• Improved data analytics, enabling new services and security analytics
• 2x faster performance compared to competing solutions
OBJECTIVES
CHALLENGES
SOLUTION
Business
Impact
Leader in Magic Quadrant
© 2015 MapR Technologies 37
Why MapR for Security Analytics
Business
• Large scale and deep
analytics on security data to
reduce risk
• Early detection of advanced
persistent threats and
unknown threats
• React fast on any abnormal
or malicious activity from
internal and external actors
• Avoid fines, lawsuits, loss of
business and negative PR
Technical
• Build a data vault for
security event logs from
multiple sources
• With more data to
scrutinize, get insights into
anomalous behavior and
close loop with other
security solutions
• Platform that enables
analysis of both historical
data as well as real-time
analysis of large volumes of
security data
Operations
• Fast ingestion of large
volume of data and perform
deep analytics
• Easy integration with
existing IT ecosystem
• Low overhead to maintain
system
• Early detection of threats
and closed loop feedback
with existing security
solutions
© 2015 MapR Technologies 38
The MapR Advantage
• Scale Reliability Across the Enterprise
– Advanced multi-tenancy
– Business continuity – HA, DR
• Speed
– 2-7x faster than other Hadoop distributions
– Ultra-fast data ingest (100M data points per sec)
– NFS & R/W file system
• Real-time & Self-Service Data Exploration
– On-the-fly SQL without up-front schema
– Fast lookups and queries
Best Hadoop Platform for Security Log Analytics
Security
Streaming
NoSQL & Search
Provisioning
&
coordination
ML, Graph
W orkflow
& Data Governance
Batch
SQL
INTEGRATED
COMMERCIAL
ENGINES
TOOLSCOMPUTE
ENGINES
Batch
Interactive
Real-time
Online
Others
Management
Operations
Governance
Audits
Security
MapR-FS MapR-DB
MapR Data Platform
© 2015 MapR Technologies 39
Poll Question #2
Do you use Hadoop for Security Analytics?
A. No, didn’t know it could be used for Security Analytics.
B. Yes, it's been 6 months or less.
C. Yes, it’s been deployed for 12 months or more.
D. No, but considering it in the next 6-12 months.
© 2015 MapR Technologies 40
What’s in the Quick Start Solution
6 nodes of
MapR software
2 week
engagement
3 Hadoop
Professional
Certifications
© 2015 MapR Technologies 41
Quick Start Service Engagement
Engagement includes:
1. Identification of data sources, transformations and reporting engines
2. Access and use of the solution template including source code
3. Training on customizing the solution template to the organization’s requirement
4. Deployment architecture document that enables a production deployment plan for the specific solution
SOLUTION
TEMPLATE
KNOWLEDGE
TRANSFER
DEPLOYMENT
ARCHITECTURE
© 2015 MapR Technologies 42
Components of the Solution Template
• Data Workflows
– Read/collect input data
– Handle bulk load and streaming use cases
• Parsers and Enrichment
– Process input data (filtering and deriving additional data as needed)
– Storing in one or more data types or formats
• Machine learning
– Clustering analysis
– Reservoir sampling analysis
INTEGRATED
COMMERCIAL
ENGINES
TOOLSCOMPUTE
ENGINES
MapR Data Platform
© 2015 MapR Technologies 43
The Power of the Open Source Community
APACHE HADOOP AND OSS ECOSYSTEM
Security
YARN
Spark
Streaming
Storm
StreamingNoSQL &
Search
Juju
Provisioning
&
Coordination
Sahara
ML, Graph
Mahout
MLLib
GraphX
EXECUTION ENGINES DATA GOVERNANCE AND OPERATIONS
Workflow
& Data
Governance
Pig
Cascading
Spark
Batch
MapReduce
v1 & v2
Tez
HBase
Solr
Hive
Impala
Spark SQL
Drill
SQL
Sentry Oozie ZooKeeperSqoop
Flume
Data
Integration
& Access
HttpFS
Hue
Data PlatformMapR-FS MapR-DB
Management
© 2015 MapR Technologies 44
MapR: Best Solution for Customer Success
Premier
Investors
High Growth
2X Growth In Direct Customers
90% Subscription Licenses
Software Margins
140% Dollar-based Net Expansion
700+
Customers
2X Growth In Annual
Subscriptions ( ACV)
Best Product
Apache Open Source
© 2015 MapR Technologies 45
Security Log Analytics Template
MapR-FS
MapR-DB
© 2015 MapR Technologies 46
Find more Resources on MapR.com or …
Research Report
The Evolution of
Data Driven
Security
Solution Brief
Jump-Start
Security Log
Analytics
Webinar Recording
Security Analytics and
Big Data: What You
Need to Know

Contenu connexe

Tendances

How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security Robert Smith
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...Forcepoint LLC
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...centralohioissa
 
Big Data Analytics to Enhance Security
Big Data Analytics to Enhance SecurityBig Data Analytics to Enhance Security
Big Data Analytics to Enhance SecurityData Science Thailand
 
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...Interset
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Keith Kraus
 
Big data security
Big data securityBig data security
Big data securityCloudBees
 
WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
WEBINAR: How To Use Artificial Intelligence To Prevent Insider ThreatsWEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
WEBINAR: How To Use Artificial Intelligence To Prevent Insider ThreatsInterset
 
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]Interset
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big dataPeter Wood
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Interset
 
Security initiatives here and down under
Security initiatives here and down underSecurity initiatives here and down under
Security initiatives here and down underRoger Hagedorn
 
DataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the DayDataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the DayInterset
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Fujitsu Middle East
 
HP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
HP Mobility Perspective at the Mobile World Congress 2014 in BarcelonaHP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
HP Mobility Perspective at the Mobile World Congress 2014 in BarcelonaPronq by HP
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax Technology
 

Tendances (20)

How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
Big Data Analytics to Enhance Security
Big Data Analytics to Enhance SecurityBig Data Analytics to Enhance Security
Big Data Analytics to Enhance Security
 
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
 
Ieee itmsb20
Ieee itmsb20Ieee itmsb20
Ieee itmsb20
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
Big data security
Big data securityBig data security
Big data security
 
WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
WEBINAR: How To Use Artificial Intelligence To Prevent Insider ThreatsWEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
WEBINAR: How To Use Artificial Intelligence To Prevent Insider Threats
 
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]
 
Security initiatives here and down under
Security initiatives here and down underSecurity initiatives here and down under
Security initiatives here and down under
 
DataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the DayDataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the Day
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
 
HP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
HP Mobility Perspective at the Mobile World Congress 2014 in BarcelonaHP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
HP Mobility Perspective at the Mobile World Congress 2014 in Barcelona
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence Platform
 

En vedette

Dataguise & MapR: Action Items for the Financial Industry
Dataguise & MapR: Action Items for the Financial IndustryDataguise & MapR: Action Items for the Financial Industry
Dataguise & MapR: Action Items for the Financial IndustryMapR Technologies
 
Big Data Security with Hadoop
Big Data Security with HadoopBig Data Security with Hadoop
Big Data Security with HadoopCloudera, Inc.
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data miningharithavijay94
 
Big Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceBig Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceIBM Danmark
 
Energy Storage - 3: Dr Jochen Seier, Federal Ministry of Economics
Energy Storage - 3: Dr Jochen Seier, Federal Ministry of EconomicsEnergy Storage - 3: Dr Jochen Seier, Federal Ministry of Economics
Energy Storage - 3: Dr Jochen Seier, Federal Ministry of EconomicsBritish Embassy Paris
 
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...Micro Focus
 
Performing network security analytics
Performing network security analyticsPerforming network security analytics
Performing network security analyticsDataWorks Summit
 
IP&A109 Next-Generation Analytics Architecture for the Year 2020
IP&A109 Next-Generation Analytics Architecture for the Year 2020IP&A109 Next-Generation Analytics Architecture for the Year 2020
IP&A109 Next-Generation Analytics Architecture for the Year 2020Anjan Roy, PMP
 
Drug Registration in GCC (Gulf Cooperation Council) - by Akshay Anand
Drug Registration in GCC (Gulf Cooperation Council) - by Akshay AnandDrug Registration in GCC (Gulf Cooperation Council) - by Akshay Anand
Drug Registration in GCC (Gulf Cooperation Council) - by Akshay AnandAkshay Anand
 
Envisioning the Next Generation of Analytics
Envisioning the Next Generation of AnalyticsEnvisioning the Next Generation of Analytics
Envisioning the Next Generation of AnalyticsLora Cecere
 
D&C Act 1940 Schedule Y - A Presentation by Akshay Anand
D&C Act 1940 Schedule Y - A Presentation by Akshay AnandD&C Act 1940 Schedule Y - A Presentation by Akshay Anand
D&C Act 1940 Schedule Y - A Presentation by Akshay AnandAkshay Anand
 
Mobile Medical Apps and FDA Regulatory Approach
Mobile Medical Apps and FDA Regulatory ApproachMobile Medical Apps and FDA Regulatory Approach
Mobile Medical Apps and FDA Regulatory ApproachAkshay Anand
 
Managing Data Integration Initiatives
Managing Data Integration InitiativesManaging Data Integration Initiatives
Managing Data Integration InitiativesAllinConsulting
 
Application security models
Application security modelsApplication security models
Application security modelsERSHUBHAM TIWARI
 
NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức
NETWORK SECURITY  MONITORING WITH BIG  DATA ANALYTICS - Nguyễn Minh ĐứcNETWORK SECURITY  MONITORING WITH BIG  DATA ANALYTICS - Nguyễn Minh Đức
NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh ĐứcSecurity Bootcamp
 

En vedette (20)

Big data security
Big data securityBig data security
Big data security
 
Dataguise & MapR: Action Items for the Financial Industry
Dataguise & MapR: Action Items for the Financial IndustryDataguise & MapR: Action Items for the Financial Industry
Dataguise & MapR: Action Items for the Financial Industry
 
Big Data Security with Hadoop
Big Data Security with HadoopBig Data Security with Hadoop
Big Data Security with Hadoop
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data mining
 
What is Big Data?
What is Big Data?What is Big Data?
What is Big Data?
 
Big Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceBig Data - Amplifying Security Intelligence
Big Data - Amplifying Security Intelligence
 
Energy Storage - 3: Dr Jochen Seier, Federal Ministry of Economics
Energy Storage - 3: Dr Jochen Seier, Federal Ministry of EconomicsEnergy Storage - 3: Dr Jochen Seier, Federal Ministry of Economics
Energy Storage - 3: Dr Jochen Seier, Federal Ministry of Economics
 
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
 
Netadminpres
NetadminpresNetadminpres
Netadminpres
 
Security analytics
Security analyticsSecurity analytics
Security analytics
 
Performing network security analytics
Performing network security analyticsPerforming network security analytics
Performing network security analytics
 
IP&A109 Next-Generation Analytics Architecture for the Year 2020
IP&A109 Next-Generation Analytics Architecture for the Year 2020IP&A109 Next-Generation Analytics Architecture for the Year 2020
IP&A109 Next-Generation Analytics Architecture for the Year 2020
 
Drug Registration in GCC (Gulf Cooperation Council) - by Akshay Anand
Drug Registration in GCC (Gulf Cooperation Council) - by Akshay AnandDrug Registration in GCC (Gulf Cooperation Council) - by Akshay Anand
Drug Registration in GCC (Gulf Cooperation Council) - by Akshay Anand
 
Envisioning the Next Generation of Analytics
Envisioning the Next Generation of AnalyticsEnvisioning the Next Generation of Analytics
Envisioning the Next Generation of Analytics
 
D&C Act 1940 Schedule Y - A Presentation by Akshay Anand
D&C Act 1940 Schedule Y - A Presentation by Akshay AnandD&C Act 1940 Schedule Y - A Presentation by Akshay Anand
D&C Act 1940 Schedule Y - A Presentation by Akshay Anand
 
Mobile Medical Apps and FDA Regulatory Approach
Mobile Medical Apps and FDA Regulatory ApproachMobile Medical Apps and FDA Regulatory Approach
Mobile Medical Apps and FDA Regulatory Approach
 
Managing Data Integration Initiatives
Managing Data Integration InitiativesManaging Data Integration Initiatives
Managing Data Integration Initiatives
 
Application security models
Application security modelsApplication security models
Application security models
 
NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức
NETWORK SECURITY  MONITORING WITH BIG  DATA ANALYTICS - Nguyễn Minh ĐứcNETWORK SECURITY  MONITORING WITH BIG  DATA ANALYTICS - Nguyễn Minh Đức
NETWORK SECURITY MONITORING WITH BIG DATA ANALYTICS - Nguyễn Minh Đức
 

Similaire à Security Analytics and Big Data: What You Need to Know

2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_toolsEma report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_toolsAnjoum .
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral AnalyticsInterset
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseGeorge Goodall
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsSirius
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftAppsian
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attackAndreanne Clarke
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligencethinkASG
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Interset
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsArgyle Executive Forum
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summarypatmisasi
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Operationalizing Big Data Security Analytics - IANS Forum Toronto KeynoteOperationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Operationalizing Big Data Security Analytics - IANS Forum Toronto KeynoteInterset
 

Similaire à Security Analytics and Big Data: What You Need to Know (20)

2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_toolsEma report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
Ema report -_ibm_security_q_radar_incident_forensics_vs_other_industry_tools
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security Intelligence
 
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
Prevent & Protect
Prevent & ProtectPrevent & Protect
Prevent & Protect
 
InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings  InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Qradar Business Case
Qradar Business CaseQradar Business Case
Qradar Business Case
 
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Operationalizing Big Data Security Analytics - IANS Forum Toronto KeynoteOperationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
Operationalizing Big Data Security Analytics - IANS Forum Toronto Keynote
 

Plus de MapR Technologies

Converging your data landscape
Converging your data landscapeConverging your data landscape
Converging your data landscapeMapR Technologies
 
ML Workshop 2: Machine Learning Model Comparison & Evaluation
ML Workshop 2: Machine Learning Model Comparison & EvaluationML Workshop 2: Machine Learning Model Comparison & Evaluation
ML Workshop 2: Machine Learning Model Comparison & EvaluationMapR Technologies
 
Self-Service Data Science for Leveraging ML & AI on All of Your Data
Self-Service Data Science for Leveraging ML & AI on All of Your DataSelf-Service Data Science for Leveraging ML & AI on All of Your Data
Self-Service Data Science for Leveraging ML & AI on All of Your DataMapR Technologies
 
Enabling Real-Time Business with Change Data Capture
Enabling Real-Time Business with Change Data CaptureEnabling Real-Time Business with Change Data Capture
Enabling Real-Time Business with Change Data CaptureMapR Technologies
 
Machine Learning for Chickens, Autonomous Driving and a 3-year-old Who Won’t ...
Machine Learning for Chickens, Autonomous Driving and a 3-year-old Who Won’t ...Machine Learning for Chickens, Autonomous Driving and a 3-year-old Who Won’t ...
Machine Learning for Chickens, Autonomous Driving and a 3-year-old Who Won’t ...MapR Technologies
 
ML Workshop 1: A New Architecture for Machine Learning Logistics
ML Workshop 1: A New Architecture for Machine Learning LogisticsML Workshop 1: A New Architecture for Machine Learning Logistics
ML Workshop 1: A New Architecture for Machine Learning LogisticsMapR Technologies
 
Machine Learning Success: The Key to Easier Model Management
Machine Learning Success: The Key to Easier Model ManagementMachine Learning Success: The Key to Easier Model Management
Machine Learning Success: The Key to Easier Model ManagementMapR Technologies
 
Data Warehouse Modernization: Accelerating Time-To-Action
Data Warehouse Modernization: Accelerating Time-To-Action Data Warehouse Modernization: Accelerating Time-To-Action
Data Warehouse Modernization: Accelerating Time-To-Action MapR Technologies
 
Live Tutorial – Streaming Real-Time Events Using Apache APIs
Live Tutorial – Streaming Real-Time Events Using Apache APIsLive Tutorial – Streaming Real-Time Events Using Apache APIs
Live Tutorial – Streaming Real-Time Events Using Apache APIsMapR Technologies
 
Bringing Structure, Scalability, and Services to Cloud-Scale Storage
Bringing Structure, Scalability, and Services to Cloud-Scale StorageBringing Structure, Scalability, and Services to Cloud-Scale Storage
Bringing Structure, Scalability, and Services to Cloud-Scale StorageMapR Technologies
 
Live Machine Learning Tutorial: Churn Prediction
Live Machine Learning Tutorial: Churn PredictionLive Machine Learning Tutorial: Churn Prediction
Live Machine Learning Tutorial: Churn PredictionMapR Technologies
 
An Introduction to the MapR Converged Data Platform
An Introduction to the MapR Converged Data PlatformAn Introduction to the MapR Converged Data Platform
An Introduction to the MapR Converged Data PlatformMapR Technologies
 
How to Leverage the Cloud for Business Solutions | Strata Data Conference Lon...
How to Leverage the Cloud for Business Solutions | Strata Data Conference Lon...How to Leverage the Cloud for Business Solutions | Strata Data Conference Lon...
How to Leverage the Cloud for Business Solutions | Strata Data Conference Lon...MapR Technologies
 
Best Practices for Data Convergence in Healthcare
Best Practices for Data Convergence in HealthcareBest Practices for Data Convergence in Healthcare
Best Practices for Data Convergence in HealthcareMapR Technologies
 
Geo-Distributed Big Data and Analytics
Geo-Distributed Big Data and AnalyticsGeo-Distributed Big Data and Analytics
Geo-Distributed Big Data and AnalyticsMapR Technologies
 
MapR Product Update - Spring 2017
MapR Product Update - Spring 2017MapR Product Update - Spring 2017
MapR Product Update - Spring 2017MapR Technologies
 
3 Benefits of Multi-Temperature Data Management for Data Analytics
3 Benefits of Multi-Temperature Data Management for Data Analytics3 Benefits of Multi-Temperature Data Management for Data Analytics
3 Benefits of Multi-Temperature Data Management for Data AnalyticsMapR Technologies
 
Cisco & MapR bring 3 Superpowers to SAP HANA Deployments
Cisco & MapR bring 3 Superpowers to SAP HANA DeploymentsCisco & MapR bring 3 Superpowers to SAP HANA Deployments
Cisco & MapR bring 3 Superpowers to SAP HANA DeploymentsMapR Technologies
 
MapR and Cisco Make IT Better
MapR and Cisco Make IT BetterMapR and Cisco Make IT Better
MapR and Cisco Make IT BetterMapR Technologies
 
Evolving from RDBMS to NoSQL + SQL
Evolving from RDBMS to NoSQL + SQLEvolving from RDBMS to NoSQL + SQL
Evolving from RDBMS to NoSQL + SQLMapR Technologies
 

Plus de MapR Technologies (20)

Converging your data landscape
Converging your data landscapeConverging your data landscape
Converging your data landscape
 
ML Workshop 2: Machine Learning Model Comparison & Evaluation
ML Workshop 2: Machine Learning Model Comparison & EvaluationML Workshop 2: Machine Learning Model Comparison & Evaluation
ML Workshop 2: Machine Learning Model Comparison & Evaluation
 
Self-Service Data Science for Leveraging ML & AI on All of Your Data
Self-Service Data Science for Leveraging ML & AI on All of Your DataSelf-Service Data Science for Leveraging ML & AI on All of Your Data
Self-Service Data Science for Leveraging ML & AI on All of Your Data
 
Enabling Real-Time Business with Change Data Capture
Enabling Real-Time Business with Change Data CaptureEnabling Real-Time Business with Change Data Capture
Enabling Real-Time Business with Change Data Capture
 
Machine Learning for Chickens, Autonomous Driving and a 3-year-old Who Won’t ...
Machine Learning for Chickens, Autonomous Driving and a 3-year-old Who Won’t ...Machine Learning for Chickens, Autonomous Driving and a 3-year-old Who Won’t ...
Machine Learning for Chickens, Autonomous Driving and a 3-year-old Who Won’t ...
 
ML Workshop 1: A New Architecture for Machine Learning Logistics
ML Workshop 1: A New Architecture for Machine Learning LogisticsML Workshop 1: A New Architecture for Machine Learning Logistics
ML Workshop 1: A New Architecture for Machine Learning Logistics
 
Machine Learning Success: The Key to Easier Model Management
Machine Learning Success: The Key to Easier Model ManagementMachine Learning Success: The Key to Easier Model Management
Machine Learning Success: The Key to Easier Model Management
 
Data Warehouse Modernization: Accelerating Time-To-Action
Data Warehouse Modernization: Accelerating Time-To-Action Data Warehouse Modernization: Accelerating Time-To-Action
Data Warehouse Modernization: Accelerating Time-To-Action
 
Live Tutorial – Streaming Real-Time Events Using Apache APIs
Live Tutorial – Streaming Real-Time Events Using Apache APIsLive Tutorial – Streaming Real-Time Events Using Apache APIs
Live Tutorial – Streaming Real-Time Events Using Apache APIs
 
Bringing Structure, Scalability, and Services to Cloud-Scale Storage
Bringing Structure, Scalability, and Services to Cloud-Scale StorageBringing Structure, Scalability, and Services to Cloud-Scale Storage
Bringing Structure, Scalability, and Services to Cloud-Scale Storage
 
Live Machine Learning Tutorial: Churn Prediction
Live Machine Learning Tutorial: Churn PredictionLive Machine Learning Tutorial: Churn Prediction
Live Machine Learning Tutorial: Churn Prediction
 
An Introduction to the MapR Converged Data Platform
An Introduction to the MapR Converged Data PlatformAn Introduction to the MapR Converged Data Platform
An Introduction to the MapR Converged Data Platform
 
How to Leverage the Cloud for Business Solutions | Strata Data Conference Lon...
How to Leverage the Cloud for Business Solutions | Strata Data Conference Lon...How to Leverage the Cloud for Business Solutions | Strata Data Conference Lon...
How to Leverage the Cloud for Business Solutions | Strata Data Conference Lon...
 
Best Practices for Data Convergence in Healthcare
Best Practices for Data Convergence in HealthcareBest Practices for Data Convergence in Healthcare
Best Practices for Data Convergence in Healthcare
 
Geo-Distributed Big Data and Analytics
Geo-Distributed Big Data and AnalyticsGeo-Distributed Big Data and Analytics
Geo-Distributed Big Data and Analytics
 
MapR Product Update - Spring 2017
MapR Product Update - Spring 2017MapR Product Update - Spring 2017
MapR Product Update - Spring 2017
 
3 Benefits of Multi-Temperature Data Management for Data Analytics
3 Benefits of Multi-Temperature Data Management for Data Analytics3 Benefits of Multi-Temperature Data Management for Data Analytics
3 Benefits of Multi-Temperature Data Management for Data Analytics
 
Cisco & MapR bring 3 Superpowers to SAP HANA Deployments
Cisco & MapR bring 3 Superpowers to SAP HANA DeploymentsCisco & MapR bring 3 Superpowers to SAP HANA Deployments
Cisco & MapR bring 3 Superpowers to SAP HANA Deployments
 
MapR and Cisco Make IT Better
MapR and Cisco Make IT BetterMapR and Cisco Make IT Better
MapR and Cisco Make IT Better
 
Evolving from RDBMS to NoSQL + SQL
Evolving from RDBMS to NoSQL + SQLEvolving from RDBMS to NoSQL + SQL
Evolving from RDBMS to NoSQL + SQL
 

Dernier

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 

Dernier (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

Security Analytics and Big Data: What You Need to Know

  • 1. David Monahan Research Director EMA Security Analytics and Big Data: What You Need to Know Sameer Nori Senior Product Marketing Manager MapR Nick Amato Director Technical Marketing MapR
  • 2. © 2015 MapR Technologies 2 Today’s Presenters David Monahan, Research Director, Risk & Security Management, EMA David has over 15 years of IT security experience and has organized and managed both physical and information security programs, including Security and Network Operations (SOCs and NOCs) for organizations ranging from Fortune 100 companies to local government and small public and private companies. Sameer Nori, Senior Product Marketing Manager, MapR Technologies Sameer has over ten years of experience in the technology industry in marketing, pre-sales, and consulting, with domain experience in business intelligence, analytics, and big data. Nick Amato, Director, Technical Marketing, MapR Technologies Nick works with the MapR ecosystem and technology partners to identify new opportunities where the MapR platform can bring value to customers. His areas of focus include third-party integrations with BI tools, benchmarking, architecture, and enabling scalable data platforms.
  • 3. © 2015 MapR Technologies 3 Logistics for Today’s Webinar A PDF of the PowerPoint presentation will be available An archived version of the event recording will be available at www.enterprisemanagement.com • Log questions in the Q&A panel located on the lower right corner of your screen • Questions will be addressed during the Q&A session of the event Questions Event recording Event presentation
  • 4. David Monahan Research Director, Security and Risk Management Enterprise Management Associates http://www.enterprisemanagement.com @SecurityMonahan The Convergence of Security Analytics and Big Data April 27, 2015
  • 5. © 2015 MapR Technologies 5 Threats Come From Everywhere • Hacking: The mentality has changed • Data breaches affect every industry • Organizations are being attacked from all sides – External threats – Insider threats • All information is up for grabs
  • 6. © 2015 MapR Technologies 6 Identifying Threats is Harder Than Ever EMA research identified several troubling statistics about identifying and responding to threats: of organizations were between “Highly Doubtful” and only “Somewhat Confident” that they could detect an important security issue before it had a significant impact. of organizations believe they are consistently successful in in correlating security data to business impact. of organizations said they were unable to stop exploits because of outdated or insufficient threat intelligence. 69% 22% 60% 41% 28% 33% 29% TOO DIFFICULT SEPARATING LEGITIMATE FROM MALICIOUS ACTIVITY TOO DIFFICULT PRIORITIZING REMEDIATION ACTIVITIES INABILITY TO REPORT MEANINGFUL INFORMATION TO STAKEHOLDERS INSUFFICIENT TOOLING TO SUPPORT SECURITY DUTIES Top frustrations with IT Security Practices:
  • 7. © 2015 MapR Technologies 7 The Problem Requires Better Data and Better Tools • Data volumes are too high – EMA research identified that 45% of organizations are collecting more than 40GB/day of logs – Nearly 16% are collecting over 500GB/day of logs • Data correlation and normalization is not sufficient – Organizations are fielding 100:1 high priority and greater alerts per person in security • Operations, Analysts, and Responders need better context and Higher Fidelity (Ponemon Study) – Actionable Intelligence within 60 seconds reduced breach resolution costs by an average of 40%
  • 8. © 2015 MapR Technologies 8 The Problem Requires Better Data and Better Tools (cont’d) • Persistent threats and their complexity is expanding rapidly – Criminal organizations are creating new and better attacks • [Gameover] Zeus (Botnet and data theft) • Crypto-Locker/Wall, CTB-Locker (data theft) • Dexter, POSLogr, BlackPOS (Point of Sale Terminal malware) – The Nations states show criminals virtually anything is possible • StuxNet malware (Supervisory Control and Data Acquisition (SCADA) malware) • Direct Memory Access Video RAM malware • TAO- Micro processor embedded malware (network sniffing, key logging, data collection, remote access, etc.) • “nls_933w.dll”- Hard drive Firmware embedded malware (anything)
  • 9. © 2015 MapR Technologies 9 The Problem Requires Better Data and Better Tools (cont’d) • EMA Research has identified key issues with current tools Most Significant Frustrations with IT Security Technologies 38% 36% 35% LACK OF INTEGRATION/INTEROPERABILITY TOOLS UNABLE TO RECOGNIZE EMERGING THREATS/ATTACKS VENDORS ARE SLOW TO RESPOND TO EMERGING THREATS OR ATTACKS
  • 10. © 2015 MapR Technologies 10 SIEM Limitations SIEM technology provides real-time analysis of security alerts generated by network hardware and applications. This is limited “analysis” based primarily upon correlation and normalization of alerts. SIEM only understands deltas for those things inside of its defined rules or policies SIEM understands network information and log entries to correlate events at a network level and identify system/application alerts. SIEM does not understand human, system, and application specific activity and patterns (behaviors) to determine how some activities raise the threat level. Post notification SIEM often requires manual investigation*. * EMA research found 55% of organizations said they still conduct manual incident investigations
  • 11. © 2015 MapR Technologies 11 SIEM Limitations(cont’d) What features is your organization not getting from SIEM tools that it is looking for in Security Analytics technology/products? 65% 53% 51% ADVANCED AUTOMATED RESPONSE CAPABILITIES INCREASED ABILITY TO EASILY AGGREGATE AND CROSS ANALYZE DATA FROM NON-SECURITY SOURCES (IE NETFLOW, WEB ACCESS LOGS) ENHANCED DATA VISUALIZATION
  • 12. © 2015 MapR Technologies 12 Poll Question #1 Have you heard of Security Analytics or Security Intelligence as a solution? A. Have not heard of it B. Believe they are the same as SIEM C. Deployed a security analytics solution D. Considering security analytics in the next 6-12 months
  • 13. © 2015 MapR Technologies 13 Moving to Security Analytics Security Analytics Improvements Better context and fidelity Reduce false positives Reduce alert volumes Provide better prioritization Accelerate Incident Response of organizations using Security Analytics have seen a reduction in false positives or an improvement in actionable alerts since they implemented a Security Analytics technology. of organizations that use Security Analytics said that the tool produced expected or greater than expected value. 90% 95%
  • 14. © 2015 MapR Technologies 14 Why Security Analytics Which of the following are your organization’s views or reasons why it needs/uses capabilities for advanced analytics or security data management for IT/information security? 53% 46% 43% 36% IMPROVES DEFENSE AGAINST TARGETED THREATS INCREASES OPERATIONAL EFFICIENCIES DEMONSTRATING HIGHER SECURITY EFFECTIVENESS TO THE BUSINESS IMPROVES PRODUCTIVITY/EFFICIENCY OF IT SECURITY EFFORTS IMPROVES STRATEGIC DECISION MAKING
  • 15. © 2015 MapR Technologies 15 Why Hadoop for Security Analytics • We need tools that can handle more data and a wider variety of data. – When asked if they would collect more data or a wider variety of data if they could, 66% of organizations said they would. (Only 10% said they would not.) – EMA Research - 57% of organizations said that they expect the greatest improvements in security through data analysis to come from innovations from IT security technologies and their vendors. – For true fidelity we need to be able to combine ALL information relevant to data management. • User, system, application, network packet/netflow, infrastructure logging, HR records, endpoint, et. al. • EMA Research - 32% of organizations indicated they wanted to be able to analyze unstructured data for use in security.
  • 16. © 2015 MapR Technologies 16 Benefits of Hadoop for Security Analytics • Purpose-built for processing large amounts of data • Designed for unstructured data analysis • Business Analytics can be applied to security use cases • Increased ROI from a tool that supports both Business Intelligence and Security Operations 47% 36% 35% 35% MACHINE LEARNING TOOLS FRAUD MANAGEMENT OR DETECTION SYSTEM BUSINESS INTELLIGENCE (BI) PLATFORM ENTERPRISE DATA WAREHOUSES Which of the following non-traditional data sources are currently NOT included/supported by your organizations current SIEM or log management system?
  • 17. © 2015 MapR Technologies 17© 2015 MapR Technologies Security Log Analytics on MapR
  • 18. © 2015 MapR Technologies 18 Zions Bank: Security Analytics and Fraud Detection Cost effective security analytics and fraud detection on one platform • Fraud Operations and Security Analytics team at Zions maintains data stores, builds statistical models to detect fraud, and then uses these models to data mine and evaluate suspicious activity “We initially got into centralizing all of our data from an information security perspective. We then saw that we could use this same environment to help with fraud detection” Michael Fowkes - SVP Fraud Operations and Security Analytics • Existing technology infrastructure could not scale • Timeliness of reports degraded over the last several years • Chose MapR and cut storage costs by 50% • Querying time reduced from 24 hours to 30 min on 1.2 PB of data • Leverage MapR scale for increased model accuracy and deeper insights OBJECTIVES CHALLENGES SOLUTION Business Impact
  • 19. © 2015 MapR Technologies 19 Zions Bank with MapR – Faster Operations at Lower Costs Web Server Data Transactional Data 3rd Party Real Time Fraud Detection Reporting and Batch Analytics Deeper Analysis with Machine Learning PRD and Dev on MapR N F S Technical Benefits  High availability  Multi-tenancy  Snapshots  Performance Business Benefits Unified platform for data  Lower operating costs  Operational guarantees  Faster model development
  • 20. © 2015 MapR Technologies 20 Solutionary: Managed Security Services Provider Threat detection on real-time streaming data via platform as a service • To address their growing customer base by processing trillions of messages (petabyte) per year while continuing to provide reliable security services • To improve data analytics by leveraging newer, more granular unstructured data sources ”MapR has taken Apache Hadoop to a new level of performance and manageability. It integrates into our systems seamlessly to help us boost the speed and capacity of data analytics for our clients.” - Dave Caplinger, Director of Architecture, Solutionary • Expanding existing database solution to meet demand was cost prohibitive • The existing technology could not process unstructured data at scale • Replaced RDBMS with MapR Enterprise Database Edition to scale Reduced time needed to investigate security events for relevance and impact • Improved data analytics, enabling new services and security analytics • 2x faster performance compared to competing solutions OBJECTIVES CHALLENGES SOLUTION Business Impact Leader in Magic Quadrant
  • 21. © 2015 MapR Technologies 21 Why MapR for Security Analytics Business • Large scale and deep analytics on security data to reduce risk • Early detection of advanced persistent threats and unknown threats • React fast on any abnormal or malicious activity from internal and external actors • Avoid fines, lawsuits, loss of business and negative PR Technical • Build a data vault for security event logs from multiple sources • With more data to scrutinize, get insights into anomalous behavior and close loop with other security solutions • Platform that enables analysis of both historical data as well as real-time analysis of large volumes of security data Operations • Fast ingestion of large volume of data and perform deep analytics • Easy integration with existing IT ecosystem • Low overhead to maintain system • Early detection of threats and closed loop feedback with existing security solutions
  • 22. © 2015 MapR Technologies 22 The MapR Advantage • Scale Reliability Across the Enterprise – Advanced multi-tenancy – Business continuity – HA, DR • Speed – 2-7x faster than other Hadoop distributions – Ultra-fast data ingest (100M data points per sec) – NFS & R/W file system • Real-time & Self-Service Data Exploration – On-the-fly SQL without up-front schema – Fast lookups and queries Best Hadoop Platform for Security Log Analytics Security Streaming NoSQL & Search Provisioning & coordination ML, Graph W orkflow & Data Governance Batch SQL INTEGRATED COMMERCIAL ENGINES TOOLSCOMPUTE ENGINES Batch Interactive Real-time Online Others Management Operations Governance Audits Security MapR-FS MapR-DB MapR Data Platform
  • 23. © 2015 MapR Technologies 23 Poll Question #2 Do you use Hadoop for Security Analytics? A. No, didn’t know it could be used for Security Analytics. B. Yes, it's been 6 months or less. C. Yes, it’s been deployed for 12 months or more. D. No, but considering it in the next 6-12 months.
  • 24. © 2015 MapR Technologies 24 What’s in the Quick Start Solution 6 nodes of MapR software 2 week engagement 3 Hadoop Professional Certifications
  • 25. © 2015 MapR Technologies 25 Quick Start Service Engagement Engagement includes: 1. Identification of data sources, transformations and reporting engines 2. Access and use of the solution template including source code 3. Training on customizing the solution template to the organization’s requirement 4. Deployment architecture document that enables a production deployment plan for the specific solution SOLUTION TEMPLATE KNOWLEDGE TRANSFER DEPLOYMENT ARCHITECTURE
  • 26. © 2015 MapR Technologies 26 Components of the Solution Template • Data Workflows – Read/collect input data – Handle bulk load and streaming use cases • Parsers and Enrichment – Process input data (filtering and deriving additional data as needed) – Storing in one or more data types or formats • Machine learning – Clustering analysis – Reservoir sampling analysis INTEGRATED COMMERCIAL ENGINES TOOLSCOMPUTE ENGINES MapR Data Platform
  • 27. © 2015 MapR Technologies 27 The Power of the Open Source Community APACHE HADOOP AND OSS ECOSYSTEM Security YARN Spark Streaming Storm StreamingNoSQL & Search Juju Provisioning & Coordination Sahara ML, Graph Mahout MLLib GraphX EXECUTION ENGINES DATA GOVERNANCE AND OPERATIONS Workflow & Data Governance Pig Cascading Spark Batch MapReduce v1 & v2 Tez HBase Solr Hive Impala Spark SQL Drill SQL Sentry Oozie ZooKeeperSqoop Flume Data Integration & Access HttpFS Hue Data PlatformMapR-FS MapR-DB Management
  • 28. © 2015 MapR Technologies 28 MapR: Best Solution for Customer Success Premier Investors High Growth 2X Growth In Direct Customers 90% Subscription Licenses Software Margins 140 % Dollar-based Net Expansion 700+ Customers 2X Growth In Annual Subscriptions ( ACV) Best Product Apache Open Source
  • 29. © 2015 MapR Technologies 29 Security Log Analytics Template MapR-FS MapR-DB
  • 30. © 2015 MapR Technologies 30 Resources https://www.mapr.com/solutions/quickstart/hadoop -security-log-analytics-quick-start – Research Report: The Evolution of Data Driven Security – Solution Brief: Jump-Start Security Log Analytics
  • 31. © 2015 MapR Technologies 31 Freeon-demand Hadoop training leading to certification Start becoming an expert now mapr.com/training 50MIn Free Training
  • 32. © 2015 MapR Technologies 32 Q&A @mapr maprtech sales@mapr.com Engage with us! MapR maprtech mapr-technologies
  • 33. © 2015 MapR Technologies 33© 2015 MapR Technologies Security Log Analytics on MapR
  • 34. © 2015 MapR Technologies 34 Zions Bank: Security Analytics and Fraud Detection Cost effective security analytics and fraud detection on one platform • Fraud Operations and Security Analytics team at Zions maintains data stores, builds statistical models to detect fraud, and then uses these models to data mine and evaluate suspicious activity “We initially got into centralizing all of our data from an information security perspective. We then saw that we could use this same environment to help with fraud detection” Michael Fowkes - SVP Fraud Operations and Security Analytics • Existing technology infrastructure could not scale • Timeliness of reports degraded over the last several years • Chose MapR and cut storage costs by 50% • Querying time reduced from 24 hours to 30 min on 1.2 PB of data • Leverage MapR scale for increased model accuracy and deeper insights OBJECTIVES CHALLENGES SOLUTION Business Impact
  • 35. © 2015 MapR Technologies 35 Zions Bank with MapR – Faster Operations at Lower Costs Web Server Data Transactional Data 3rd Party Real Time Fraud Detection Reporting and Batch Analytics Deeper Analysis with Machine Learning PRD and Dev on MapR N F S Technical Benefits  High availability  Multi-tenancy  Snapshots  Performance Business Benefits Unified platform for data  Lower operating costs  Operational guarantees  Faster model development
  • 36. © 2015 MapR Technologies 36 Solutionary: Managed Security Services Provider Threat detection on real-time streaming data via platform as a service • To address their growing customer base by processing trillions of messages (petabyte) per year while continuing to provide reliable security services • To improve data analytics by leveraging newer, more granular unstructured data sources ”MapR has taken Apache Hadoop to a new level of performance and manageability. It integrates into our systems seamlessly to help us boost the speed and capacity of data analytics for our clients.” - Dave Caplinger, Director of Architecture, Solutionary • Expanding existing database solution to meet demand was cost prohibitive • The existing technology could not process unstructured data at scale • Replaced RDBMS with MapR Enterprise Database Edition to scale Reduced time needed to investigate security events for relevance and impact • Improved data analytics, enabling new services and security analytics • 2x faster performance compared to competing solutions OBJECTIVES CHALLENGES SOLUTION Business Impact Leader in Magic Quadrant
  • 37. © 2015 MapR Technologies 37 Why MapR for Security Analytics Business • Large scale and deep analytics on security data to reduce risk • Early detection of advanced persistent threats and unknown threats • React fast on any abnormal or malicious activity from internal and external actors • Avoid fines, lawsuits, loss of business and negative PR Technical • Build a data vault for security event logs from multiple sources • With more data to scrutinize, get insights into anomalous behavior and close loop with other security solutions • Platform that enables analysis of both historical data as well as real-time analysis of large volumes of security data Operations • Fast ingestion of large volume of data and perform deep analytics • Easy integration with existing IT ecosystem • Low overhead to maintain system • Early detection of threats and closed loop feedback with existing security solutions
  • 38. © 2015 MapR Technologies 38 The MapR Advantage • Scale Reliability Across the Enterprise – Advanced multi-tenancy – Business continuity – HA, DR • Speed – 2-7x faster than other Hadoop distributions – Ultra-fast data ingest (100M data points per sec) – NFS & R/W file system • Real-time & Self-Service Data Exploration – On-the-fly SQL without up-front schema – Fast lookups and queries Best Hadoop Platform for Security Log Analytics Security Streaming NoSQL & Search Provisioning & coordination ML, Graph W orkflow & Data Governance Batch SQL INTEGRATED COMMERCIAL ENGINES TOOLSCOMPUTE ENGINES Batch Interactive Real-time Online Others Management Operations Governance Audits Security MapR-FS MapR-DB MapR Data Platform
  • 39. © 2015 MapR Technologies 39 Poll Question #2 Do you use Hadoop for Security Analytics? A. No, didn’t know it could be used for Security Analytics. B. Yes, it's been 6 months or less. C. Yes, it’s been deployed for 12 months or more. D. No, but considering it in the next 6-12 months.
  • 40. © 2015 MapR Technologies 40 What’s in the Quick Start Solution 6 nodes of MapR software 2 week engagement 3 Hadoop Professional Certifications
  • 41. © 2015 MapR Technologies 41 Quick Start Service Engagement Engagement includes: 1. Identification of data sources, transformations and reporting engines 2. Access and use of the solution template including source code 3. Training on customizing the solution template to the organization’s requirement 4. Deployment architecture document that enables a production deployment plan for the specific solution SOLUTION TEMPLATE KNOWLEDGE TRANSFER DEPLOYMENT ARCHITECTURE
  • 42. © 2015 MapR Technologies 42 Components of the Solution Template • Data Workflows – Read/collect input data – Handle bulk load and streaming use cases • Parsers and Enrichment – Process input data (filtering and deriving additional data as needed) – Storing in one or more data types or formats • Machine learning – Clustering analysis – Reservoir sampling analysis INTEGRATED COMMERCIAL ENGINES TOOLSCOMPUTE ENGINES MapR Data Platform
  • 43. © 2015 MapR Technologies 43 The Power of the Open Source Community APACHE HADOOP AND OSS ECOSYSTEM Security YARN Spark Streaming Storm StreamingNoSQL & Search Juju Provisioning & Coordination Sahara ML, Graph Mahout MLLib GraphX EXECUTION ENGINES DATA GOVERNANCE AND OPERATIONS Workflow & Data Governance Pig Cascading Spark Batch MapReduce v1 & v2 Tez HBase Solr Hive Impala Spark SQL Drill SQL Sentry Oozie ZooKeeperSqoop Flume Data Integration & Access HttpFS Hue Data PlatformMapR-FS MapR-DB Management
  • 44. © 2015 MapR Technologies 44 MapR: Best Solution for Customer Success Premier Investors High Growth 2X Growth In Direct Customers 90% Subscription Licenses Software Margins 140% Dollar-based Net Expansion 700+ Customers 2X Growth In Annual Subscriptions ( ACV) Best Product Apache Open Source
  • 45. © 2015 MapR Technologies 45 Security Log Analytics Template MapR-FS MapR-DB
  • 46. © 2015 MapR Technologies 46 Find more Resources on MapR.com or … Research Report The Evolution of Data Driven Security Solution Brief Jump-Start Security Log Analytics Webinar Recording Security Analytics and Big Data: What You Need to Know

Notes de l'éditeur

  1. Hacking mentality has changed: Less nuisance hacking More financially motivated Significant socio-political motivation (Nation-State) Significant industrial espionage Data breaches affect every industry Healthcare, Retail, Government, Education, Food Service… Organizations are being attacked from all sides External threats If Knowledge is power and money is power…Then Knowledge is Money That’s why attackers are after the data Insider threats Equivalent of IT Road-Rage All information is up for grabs Emails most compromised Credit Cards Second most PII most valuable per record Industrial and tech IP very valuable
  2. EMA research identified several troubling statistics about identifying and responding to threats: 69% of organizations were between “Highly Doubtful” and only “Somewhat Confident” that they could detect an important security issue before it had a significant impact. Only 22% of organizations believe they are consistently successful in in correlating security data to business impact. Top frustrations with IT Security Practices: 41% too difficult to distinguish between legitimate and malicious activity technical issues. 33% said inadequate ability to report/communicate meaningful information to business stake holders (e.g. reporting to the board) Ponemon Institute identified that: 60% said their enterprises were unable to stop exploits because of outdated or insufficient threat intelligence.
  3. SIEM technology provides real-time analysis of security alerts generated by network hardware and applications. (Wikipedia) This is limited “analysis” based primarily upon correlation and normalization of alerts. SIEM understands network information and log entries to correlate events at a network level and identify system/application alerts. SIEM only understands deltas for those things inside of its defined rules or policies SIEM does not understand human, system, and application specific activity and patterns (behaviors) to determine how some activities raise the threat level. Post notification SIEM requires manual investigation for details. EMA 55% of organizations said they still conduct manual incident investigations
  4. Security Analytics leverages machine learning, Big Data scalability, Trend Analysis, behavioral analysis and other techniques to identify abnormal activities or trends by individual users, systems, and/or applications. 95% of organizations have heard about Security Analytics 70% said they either have or are actively pursuing a project to invest in it. Security Analytics Improvements: Better context and fidelity Reduce alert volumes Reduce False positives Provide better prioritization Accelerate Incident Response EMA Research identified that strong data analysis is key to success 95% of organizations that use Security Analytics said that the tool produced expected or greater than expected value. 90% of organizations using Security Analytics say have seen a reduction in false positives or an improvement in actionable alerts since they implemented a Security Analytics technology.
  5. Global bank fraud costs $200B annually) Zions Bank Fights Fraud, Gains Insights and Cuts Data Storage Costs with MapR   The Business Zions Bank, based in Salt Lake City, Utah, is a subsidiary of Zions Bancorporation that operates more than 500 offices and 600 ATMs in 10 Western U.S. states. As a full-service bank, Zions offers commercial, installment and mortgage loans; trust services; foreign banking services; electronic and online banking services; automatic deposit and nationwide banking and transfer services; as well as checking and savings programs.   Challenge “Being a financial institution, we have a bull’s-eye painted on our backs,” says Michael Fowkes, Zions Bank SVP Fraud Operations and Security Analytics. “Crooks want to steal money, and banks are often a target, so fraud protection is critical to our business. If fraud gets out of control, it eats into our profitability.”   The Zions Bank Fraud Operations and Security Analytics team maintains data stores, builds statistical models to detect fraud, and then uses these models to data mine and evaluate suspicious activity.   Zions has been refining their solution over the past 8-9 years. Fowkes explains that about eight years ago they found that when they loaded in a lot of data, performance degraded significantly when they tried to do reporting.   “We always kept our eye out for new data stores. When it came time to refresh our data stores, we decided to go to Hadoop,” says Fowkes.   MapR Solution Zions Bank chose MapR for its security features, NFS mountable file system, high availability, ease of management and its superior performance capabilities, which allow for a more efficient use of hardware and a better ROI.   The bank relies on MapR for a critical part of their security architecture. MapR helps Zions predict phishing behavior and payments fraud in real time and minimize their impact. With MapR, Zions can run more detailed analytics and forensics.   Benefits The bank has seen multiple benefits from their MapR solution:   Cuts storage costs in half Zions is seeing significant benefits from a storage perspective. With their other data sources, they had to hold on to source data sets so they still have the original data. MapR eliminates the need to have multiple data sources.   “When we cut over to MapR, we cut our expenses in half from a data storage perspective,” says Fowkes. (Michael, do you need to get clearance on this quote?)   Cost effective to scale Since MapR scales linearly, capacity planning is much easier. “We know that growth won’t be incredibly expensive like with distributed database platforms which charge per terabyte of storage. This can get quite expensive,” says Fowkes. “The others cost a lot more to scale. MapR allows us to scale at a reasonable price.” <Michael, can you provide any specific metrics about the difference in cost to scale with the MapR solution? > Increases accuracy, speed and insights Fowkes explains that before, when you created a statistical model, you had to use sample data. “MapR allows you to wrangle large amounts of data,” he says. “You can use all of your data and create a more accurate model. This is also used in forensics so we have one place to research what happened.”   Two years of data add up to about 1.2 petabytes of data. Wrangling this amount of data used to be daunting. “In the past, it could take a full day. Now we can do a data query of two years of data in 30 minutes,” he says.   Multiple uses for data stores Centralizing data stores serves multiple uses—from data security to fraud detection to risk management to customer marketing. “We initially got into centralizing all of our data from an information security perspective. We then saw that we could use this same environment to help with fraud detection,” he says. “Now that we have this data we know we can do more with it. Right now we’re working on a business project on the marketing side, completely outside of fraud and info security. It’s the same data to look at on the business side for customer analytics,” he says. “And our risk group leverages data that’s used in the system too. Having a more granular view of data, you get additional insights.”   Summary MapR is enabling Zions Bank to improve its security infrastructure while reducing costs. They’ve been able to cut storage costs in half, scale their solution cost-effectively, make more efficient use of hardware, make statistical models more accurate, increase the performance and speed of high volume data queries, generate deeper insights and help them leverage their data stores across several aspects of the business.
  6. Objectives: As a leading Managed Security Service Provider (MSSP) in North America, Solutionary delivers managed security services and professional consulting services to mid-sized organizations and global enterprises. They wanted a platform that can scale effectively to address their growing customer base by processing trillions of messages (petabyte) per year while continuing to provide reliable security services. They also wanted to improve data analytics by leveraging newer, more granular unstructured data sources Challenges: Founded in 2000, the company uses proprietary security analytics technology to reduce risk, increase data security, and support compliance initiatives for its clients. They had challenges around increasing data analytics capabilities to improve clients’ security. They had issues scaling the current solution based on RDBMS as number of clients and data volume grow. Solution: The MapR M7 Enterprise Edition for Apache Hadoop, a Cisco Compatible product used by Solutionary, leverages an architecture designed specifically for high availability to offer advanced features not available with other Hadoop distributions. The MapR Direct Access NFS feature delivers true industry-standard NFS that enables Solutionary to smoothly integrate with existing systems without sacrificing performance. Data snapshots and mirroring provide reliable data protection for enhanced data security, while monitoring through the MapR Heatmap enables staff to view cluster health and current capacity at a glance. Business impact: Detection of advanced and sophisticated attacks through analysis of unstructured data while linking enriched structured asset and contextual data Reduced time needed to investigate security events for relevance and impact Achieved performance and flexibility with incredible scalability via Hadoop’s clustered infrastructure. This infrastructure allows them to perform real-time analysis on big data in order to help protect and defend against sophisticated, organized, and state-sponsored adversaries Solutionary Case study http://www.mapr.com/sites/default/files/solutionary-cisco-case-study_1.pdf
  7. The solution benefits the typical and most encountered audiences: What do CISOs/CIOs get - large scale and deep analytics on security data to reduce risk that helps them with early detection of advanced persistent threats and unknown threats. It allows organizations to reach faster on any abnormal or malicious activity from internal and external actors and be able to avoid fines, lawsuits, loss of business and negative PR. For the technical and operations team, you can build a data vault for security event logs from multiple sources. With more data to scrutinize, get insights into anomalous behavior and close loop with other security solutions. The platform is easy to administer and integrate with existing IT ecosystem.
  8. Why MapR is the best Hadoop Platform for Data warhouse optimization? For business-critical applications you must have data protection and security (availability, data protection, and recovery), high performance (with random read-write system), multi-tenancy (to support multiple business units, isolate applications or user data,…), provide good resource and workload management to support multiple applications, and open standards to integrate with the rest of the IT ecosystem. You also need a platform that is capable of super fast data ingestion from multiple sources and be able to make critical analytics and decisions at speed (in milliseconds), and at scale. Examples include breach detection based on information from multiple sources, fraud detection on millions of transactions that are based on individual patterns, fleet management and routing taking into account current conditions….This requires a Hadoop platform that can go beyond batch and support streaming writes so data can be constantly writing to the system while analysis is being conducted. High performance to meet the business needs and real-time operations the ability to perform online database operations to react to the business situation and impact business as it happens not report on it one week, month or quarter later. Data Agility is needed for Business Agility. Drill provides instant ANSI SQL for Hadoop & NoSQL. You can explore data in its native format without expensive and time consuming transformation. You can analyze evolving and semi-structured/nested data from NoSQL databases, find what is of value and THEN model this in your DW schema for downstream ad-hoc reporting by 100’s or 1000’s of concurrent users.
  9. Why MapR is the best Hadoop Platform for Security Log Analytics? For business-critical applications you must have data protection and security (availability, data protection, and recovery), high performance (with random read-write system), multi-tenancy (to support multiple business units, isolate applications or user data,…), provide good resource and workload management to support multiple applications, and open standards to integrate with the rest of the IT ecosystem. You also need a platform that is capable of super fast data ingestion from multiple sources and be able to make critical analytics and decisions at speed (in milliseconds), and at scale. Examples include breach detection based on information from multiple sources, fraud detection on millions of transactions that are based on individual patterns, fleet management and routing taking into account current conditions….This requires a Hadoop platform that can go beyond batch and support streaming writes so data can be constantly writing to the system while analysis is being conducted. High performance to meet the business needs and real-time operations the ability to perform online database operations to react to the business situation and impact business as it happens not report on it one week, month or quarter later. Data Agility is needed for Business Agility. Drill provides instant ANSI SQL for Hadoop & NoSQL. You can explore data in its native format without expensive and time consuming transformation. You can analyze evolving and semi-structured/nested data from NoSQL databases.
  10. The power of MapR begins with the power of open source innovation and community participation. In some cases MapR leads the community in projects like Apache Mahout (machine learning) or Apache Drill (SQL on Hadoop) In other areas, MapR contributes, integrates Apache and other open source software (OSS) projects into the MapR distribution, delivering a more reliable and performant system with lower overall TCO and easier system management. MapR releases a new version with the latest OSS innovations on a monthly basis. We add 2-4 new Apache projects annually as new projects become production ready and based on customer demand.
  11. The MapR distribution for Hadoop is globally recognized as the technology leader Forrester published a Wave for Big Data Hadoop Solutions where it placed MapR as the highest ranking product based on current offering as well as roadmap. Cloud: MapR has been selected by two of the companies most experienced with MapReduce technology which is a testament to the technology advantages of MapR’s distribution. Amazon through its Elastic MapReduce service (EMR) hosted over 2 million clusters in the past year. Amazon selected MapR to complement EMR as the only commercial Hadoop distribution being offered, sold and supported as a service by Amazon to its customers. MapR was also selected by Google – the pioneer of MapReduce and the company whose white paper on MapReduce inspired the creation of Hadoop – has also selected MapR to make our distribution available on Google Compute Engine.
  12. Global bank fraud costs $200B annually) Zions Bank Fights Fraud, Gains Insights and Cuts Data Storage Costs with MapR   The Business Zions Bank, based in Salt Lake City, Utah, is a subsidiary of Zions Bancorporation that operates more than 500 offices and 600 ATMs in 10 Western U.S. states. As a full-service bank, Zions offers commercial, installment and mortgage loans; trust services; foreign banking services; electronic and online banking services; automatic deposit and nationwide banking and transfer services; as well as checking and savings programs.   Challenge “Being a financial institution, we have a bull’s-eye painted on our backs,” says Michael Fowkes, Zions Bank SVP Fraud Operations and Security Analytics. “Crooks want to steal money, and banks are often a target, so fraud protection is critical to our business. If fraud gets out of control, it eats into our profitability.”   The Zions Bank Fraud Operations and Security Analytics team maintains data stores, builds statistical models to detect fraud, and then uses these models to data mine and evaluate suspicious activity.   Zions has been refining their solution over the past 8-9 years. Fowkes explains that about eight years ago they found that when they loaded in a lot of data, performance degraded significantly when they tried to do reporting.   “We always kept our eye out for new data stores. When it came time to refresh our data stores, we decided to go to Hadoop,” says Fowkes.   MapR Solution Zions Bank chose MapR for its security features, NFS mountable file system, high availability, ease of management and its superior performance capabilities, which allow for a more efficient use of hardware and a better ROI.   The bank relies on MapR for a critical part of their security architecture. MapR helps Zions predict phishing behavior and payments fraud in real time and minimize their impact. With MapR, Zions can run more detailed analytics and forensics.   Benefits The bank has seen multiple benefits from their MapR solution:   Cuts storage costs in half Zions is seeing significant benefits from a storage perspective. With their other data sources, they had to hold on to source data sets so they still have the original data. MapR eliminates the need to have multiple data sources.   “When we cut over to MapR, we cut our expenses in half from a data storage perspective,” says Fowkes. (Michael, do you need to get clearance on this quote?)   Cost effective to scale Since MapR scales linearly, capacity planning is much easier. “We know that growth won’t be incredibly expensive like with distributed database platforms which charge per terabyte of storage. This can get quite expensive,” says Fowkes. “The others cost a lot more to scale. MapR allows us to scale at a reasonable price.” <Michael, can you provide any specific metrics about the difference in cost to scale with the MapR solution? > Increases accuracy, speed and insights Fowkes explains that before, when you created a statistical model, you had to use sample data. “MapR allows you to wrangle large amounts of data,” he says. “You can use all of your data and create a more accurate model. This is also used in forensics so we have one place to research what happened.”   Two years of data add up to about 1.2 petabytes of data. Wrangling this amount of data used to be daunting. “In the past, it could take a full day. Now we can do a data query of two years of data in 30 minutes,” he says.   Multiple uses for data stores Centralizing data stores serves multiple uses—from data security to fraud detection to risk management to customer marketing. “We initially got into centralizing all of our data from an information security perspective. We then saw that we could use this same environment to help with fraud detection,” he says. “Now that we have this data we know we can do more with it. Right now we’re working on a business project on the marketing side, completely outside of fraud and info security. It’s the same data to look at on the business side for customer analytics,” he says. “And our risk group leverages data that’s used in the system too. Having a more granular view of data, you get additional insights.”   Summary MapR is enabling Zions Bank to improve its security infrastructure while reducing costs. They’ve been able to cut storage costs in half, scale their solution cost-effectively, make more efficient use of hardware, make statistical models more accurate, increase the performance and speed of high volume data queries, generate deeper insights and help them leverage their data stores across several aspects of the business.
  13. Objectives: As a leading Managed Security Service Provider (MSSP) in North America, Solutionary delivers managed security services and professional consulting services to mid-sized organizations and global enterprises. They wanted a platform that can scale effectively to address their growing customer base by processing trillions of messages (petabyte) per year while continuing to provide reliable security services. They also wanted to improve data analytics by leveraging newer, more granular unstructured data sources Challenges: Founded in 2000, the company uses proprietary security analytics technology to reduce risk, increase data security, and support compliance initiatives for its clients. They had challenges around increasing data analytics capabilities to improve clients’ security. They had issues scaling the current solution based on RDBMS as number of clients and data volume grow. Solution: The MapR M7 Enterprise Edition for Apache Hadoop, a Cisco Compatible product used by Solutionary, leverages an architecture designed specifically for high availability to offer advanced features not available with other Hadoop distributions. The MapR Direct Access NFS feature delivers true industry-standard NFS that enables Solutionary to smoothly integrate with existing systems without sacrificing performance. Data snapshots and mirroring provide reliable data protection for enhanced data security, while monitoring through the MapR Heatmap enables staff to view cluster health and current capacity at a glance. Business impact: Detection of advanced and sophisticated attacks through analysis of unstructured data while linking enriched structured asset and contextual data Reduced time needed to investigate security events for relevance and impact Achieved performance and flexibility with incredible scalability via Hadoop’s clustered infrastructure. This infrastructure allows them to perform real-time analysis on big data in order to help protect and defend against sophisticated, organized, and state-sponsored adversaries Solutionary Case study http://www.mapr.com/sites/default/files/solutionary-cisco-case-study_1.pdf
  14. The solution benefits the typical and most encountered audiences: What do CISOs/CIOs get - large scale and deep analytics on security data to reduce risk that helps them with early detection of advanced persistent threats and unknown threats. It allows organizations to reach faster on any abnormal or malicious activity from internal and external actors and be able to avoid fines, lawsuits, loss of business and negative PR. For the technical and operations team, you can build a data vault for security event logs from multiple sources. With more data to scrutinize, get insights into anomalous behavior and close loop with other security solutions. The platform is easy to administer and integrate with existing IT ecosystem.
  15. Why MapR is the best Hadoop Platform for Data warhouse optimization? For business-critical applications you must have data protection and security (availability, data protection, and recovery), high performance (with random read-write system), multi-tenancy (to support multiple business units, isolate applications or user data,…), provide good resource and workload management to support multiple applications, and open standards to integrate with the rest of the IT ecosystem. You also need a platform that is capable of super fast data ingestion from multiple sources and be able to make critical analytics and decisions at speed (in milliseconds), and at scale. Examples include breach detection based on information from multiple sources, fraud detection on millions of transactions that are based on individual patterns, fleet management and routing taking into account current conditions….This requires a Hadoop platform that can go beyond batch and support streaming writes so data can be constantly writing to the system while analysis is being conducted. High performance to meet the business needs and real-time operations the ability to perform online database operations to react to the business situation and impact business as it happens not report on it one week, month or quarter later. Data Agility is needed for Business Agility. Drill provides instant ANSI SQL for Hadoop & NoSQL. You can explore data in its native format without expensive and time consuming transformation. You can analyze evolving and semi-structured/nested data from NoSQL databases, find what is of value and THEN model this in your DW schema for downstream ad-hoc reporting by 100’s or 1000’s of concurrent users.
  16. Why MapR is the best Hadoop Platform for Security Log Analytics? For business-critical applications you must have data protection and security (availability, data protection, and recovery), high performance (with random read-write system), multi-tenancy (to support multiple business units, isolate applications or user data,…), provide good resource and workload management to support multiple applications, and open standards to integrate with the rest of the IT ecosystem. You also need a platform that is capable of super fast data ingestion from multiple sources and be able to make critical analytics and decisions at speed (in milliseconds), and at scale. Examples include breach detection based on information from multiple sources, fraud detection on millions of transactions that are based on individual patterns, fleet management and routing taking into account current conditions….This requires a Hadoop platform that can go beyond batch and support streaming writes so data can be constantly writing to the system while analysis is being conducted. High performance to meet the business needs and real-time operations the ability to perform online database operations to react to the business situation and impact business as it happens not report on it one week, month or quarter later. Data Agility is needed for Business Agility. Drill provides instant ANSI SQL for Hadoop & NoSQL. You can explore data in its native format without expensive and time consuming transformation. You can analyze evolving and semi-structured/nested data from NoSQL databases.
  17. The power of MapR begins with the power of open source innovation and community participation. In some cases MapR leads the community in projects like Apache Mahout (machine learning) or Apache Drill (SQL on Hadoop) In other areas, MapR contributes, integrates Apache and other open source software (OSS) projects into the MapR distribution, delivering a more reliable and performant system with lower overall TCO and easier system management. MapR releases a new version with the latest OSS innovations on a monthly basis. We add 2-4 new Apache projects annually as new projects become production ready and based on customer demand.
  18. The MapR distribution for Hadoop is globally recognized as the technology leader Forrester published a Wave for Big Data Hadoop Solutions where it placed MapR as the highest ranking product based on current offering as well as roadmap. Cloud: MapR has been selected by two of the companies most experienced with MapReduce technology which is a testament to the technology advantages of MapR’s distribution. Amazon through its Elastic MapReduce service (EMR) hosted over 2 million clusters in the past year. Amazon selected MapR to complement EMR as the only commercial Hadoop distribution being offered, sold and supported as a service by Amazon to its customers. MapR was also selected by Google – the pioneer of MapReduce and the company whose white paper on MapReduce inspired the creation of Hadoop – has also selected MapR to make our distribution available on Google Compute Engine.