Cognitive computing can take the semantic Web to the next level
January 31, 2014
How Football is Being Transformed by Big Data
January 31, 2014
The Crayon Blog

Leveraging Big Data and Cloud for Better Security

Industry Articles | Published January 31, 2014  |   Tejeswini Kashyappan

Organizations are exploring a variety of technologies and techniques to bolster their security, including big data analytics and cloud-based security services.

As the sophistication of information security breaches continues to grow, organizations realize that they need to do a better job of identifying threats and preventing them from causing data loss and other damage. These companies are exploring a variety of technologies and techniques to bolster their security, including two emerging areas: big data analytics and cloud-based security services.

“Information security needs radical rethinking,” says Steve Wilson, vice president and principal analyst at Constellation Research. “The lessons of data breaches over the past few years are stark Inc. Some of the companies affected by advanced persistent threats and by new hardware attacks were probably doing the best they could.”

Status quo approaches to security are not working anymore, so information security executives need to look for alternative solutions. Many will decide to work with managed security service providers and cloud-based security services, according Jon Oltsik, senior principal analyst at research firm Enterprise Strategy Group (ESG). “Others will bolster their security infrastructure with new controls on end points and networks, as well as better security analytics.”

Read More

Subscribe to the Crayon Blog. Get the latest posts in your inbox!

The Crayon Blog

Leveraging Big Data and Cloud for Better Security

Industry Articles | Published January 31, 2014  |   Tejeswini Kashyappan

Organizations are exploring a variety of technologies and techniques to bolster their security, including big data analytics and cloud-based security services.

As the sophistication of information security breaches continues to grow, organizations realize that they need to do a better job of identifying threats and preventing them from causing data loss and other damage. These companies are exploring a variety of technologies and techniques to bolster their security, including two emerging areas: big data analytics and cloud-based security services.

“Information security needs radical rethinking,” says Steve Wilson, vice president and principal analyst at Constellation Research. “The lessons of data breaches over the past few years are stark Inc. Some of the companies affected by advanced persistent threats and by new hardware attacks were probably doing the best they could.”

Status quo approaches to security are not working anymore, so information security executives need to look for alternative solutions. Many will decide to work with managed security service providers and cloud-based security services, according Jon Oltsik, senior principal analyst at research firm Enterprise Strategy Group (ESG). “Others will bolster their security infrastructure with new controls on end points and networks, as well as better security analytics.”

Read More

Subscribe to the Crayon Blog. Get the latest posts in your inbox!

The Crayon Blog

Leveraging Big Data and Cloud for Better Security

Industry Articles | Published January 31, 2014  |   Tejeswini Kashyappan

Organizations are exploring a variety of technologies and techniques to bolster their security, including big data analytics and cloud-based security services.

As the sophistication of information security breaches continues to grow, organizations realize that they need to do a better job of identifying threats and preventing them from causing data loss and other damage. These companies are exploring a variety of technologies and techniques to bolster their security, including two emerging areas: big data analytics and cloud-based security services.

“Information security needs radical rethinking,” says Steve Wilson, vice president and principal analyst at Constellation Research. “The lessons of data breaches over the past few years are stark Inc. Some of the companies affected by advanced persistent threats and by new hardware attacks were probably doing the best they could.”

Status quo approaches to security are not working anymore, so information security executives need to look for alternative solutions. Many will decide to work with managed security service providers and cloud-based security services, according Jon Oltsik, senior principal analyst at research firm Enterprise Strategy Group (ESG). “Others will bolster their security infrastructure with new controls on end points and networks, as well as better security analytics.”

Read More

Subscribe to the Crayon Blog. Get the latest posts in your inbox!

The Crayon Blog

Leveraging Big Data and Cloud for Better Security

Industry Articles | Published January 31, 2014  |   Tejeswini Kashyappan

Organizations are exploring a variety of technologies and techniques to bolster their security, including big data analytics and cloud-based security services.

As the sophistication of information security breaches continues to grow, organizations realize that they need to do a better job of identifying threats and preventing them from causing data loss and other damage. These companies are exploring a variety of technologies and techniques to bolster their security, including two emerging areas: big data analytics and cloud-based security services.

“Information security needs radical rethinking,” says Steve Wilson, vice president and principal analyst at Constellation Research. “The lessons of data breaches over the past few years are stark Inc. Some of the companies affected by advanced persistent threats and by new hardware attacks were probably doing the best they could.”

Status quo approaches to security are not working anymore, so information security executives need to look for alternative solutions. Many will decide to work with managed security service providers and cloud-based security services, according Jon Oltsik, senior principal analyst at research firm Enterprise Strategy Group (ESG). “Others will bolster their security infrastructure with new controls on end points and networks, as well as better security analytics.”

Read More

Subscribe to the Crayon Blog. Get the latest posts in your inbox!