The Evolution of Data-Driven Security

Provided by: MapR
Topic: Security
Format: PDF
Event and activity data have grown to “big data” proportions. As a result, traditional log and event management tools and monitoring practices don’t cut it due to their inability to wade through the data to present the key information to those who need it.

There is much more that can be done in the big data era to identify threats, reduce risk, address fraud and improve compliance monitoring activities. Enterprise Management Associates (EMA) recently completed a research survey of over 200 security and IT practitioners in order to find out what security solutions are necessary in order to be successful in this era of data-driven security.
The report reveals key findings in the following areas:
  • An analysis of 13 security technologies and how they affect data driven security
  • Top improvements needed in the information security arena
  • Security issues to consider when choosing the next big data technology investment

Find By Topic