The Evolution of Data-Driven Security

Event and activity data have grown to “big data” proportions. As a result, traditional log and event management tools and monitoring practices don’t cut it due to their inability to wade through the data to present the key information to those who need it.

There is much more that can be done in the big data era to identify threats, reduce risk, address fraud and improve compliance monitoring activities. Enterprise Management Associates (EMA) recently completed a research survey of over 200 security and IT practitioners in order to find out what security solutions are necessary in order to be successful in this era of data-driven security.

The report reveals key findings in the following areas:

  • An analysis of 13 security technologies and how they affect data driven security
  • Top improvements needed in the information security arena
  • Security issues to consider when choosing the next big data technology investment

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

MapR logo
Provided by:
MapR
Topic:
Security
Format:
PDF