Weitere ähnliche Inhalte
Kürzlich hochgeladen (20)
Cloud security big data analytic
- 1. A chain is as strong, as it’s weakest link !!
© 2011-2013 Cloudspread. All rights reserved. The Cloudsprea
logo and Cloudspread are registered trademarks
- 2. Cloud Security - Challenges
Cloud Security ensures encryption and key management software that helps
organizations lock down virtual machines and their data so they remain secure
throughout their lifecycle in the private, public or hybrid cloud. Three major
challenges:
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
Cloud
Security
Threats
Breaches
Compliance
- 3. Cloud Security: Measures
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
Threats
Scan and Protect the
Network from Threats
Establish Intelligence across
the Cloud
Breaches
Manage Identities and User
Access in a Borderless
Network Architecture
Gaps and Vulnerabilities in
Virtualization
Compliances
Monitor and Audit –
Applications and Data
Security
- SOX, IT Audit,
Conformity and Integrity
Check - ISO, HIPPA, PCI, SAS
70
Integrity Check -
Whitelisting or Blacklisting
- 4. Cloud Security: Big Data Analytics and Automation
• Integrated security intelligence solutions harness security-relevant
information from across the organization.
• Analytics and automation provides context to detect threats faster,
identify vulnerabilities, prioritize risks and automate compliance
activities.
• A security intelligence platform that applies real-time correlation and
anomaly detection across a distributed and scalable repository of
security information.
• With the help of ‘Big Data’ analytics that enables more accurate
security monitoring and better visibility to travel our way into a
secured cloud environment.
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
- 5. Cloud Security: What is ‘Big Data’? Why do we need to know?
• It is structured or unstructured exponential growth and availability of data that
can not be handled through the normal relational database tools available or
already in use across the organization.
• Big data is going to change the way you do things in the future, how you gain
insight, and make decisions.
• Accumulation of ‘Big Data’ is not that big problem. The real question lies with
the fact - what we do with this ‘Big Data’? How do we analyze it and make an
effective use of it?
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
- 6. Big Data = Transactions + Interactions + Observations
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
- 7. Cloud Security: Big Data Drivers
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
- 8. Cloud Security: How does Hadoop help?
• Organizations are discovering that important predictions can be made
by sorting through and analyzing Big Data.
• However, since 80% of this data is "unstructured", it must be
formatted (or structured) in a way that makes it suitable for data
mining and subsequent analysis.
• Hadoop is the core platform for structuring Big Data, and solves the
problem of making it useful for analytics purposes leading to extract
intelligent security information.
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
- 9. Cloud Security: Hadoop Batch and Stream Processing
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
- 10. Cloud Security: Big Data Analytics - Data Privacy and Governance
Technological
Advances
Storage
AnalysisProcessing
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
Business
Knowledge
Operational
Knowledge
Process of
Analyzing and
Mining Big Data
Rapid decreasing cost of storage and
CPU power
Flexibility and cost effectiveness of
Data Center and Cloud Computing
Development of new framework
‘Hadoop’
- 11. Cloud Security: What ‘Big Data Analysis’ can do?
• Network Security- to mine meaningful security information from sources such as
firewalls and security devices, but also from website traffic, and business processes and
other day-to-day transactions. What, traditional SEIM (Security Information
Management) tools take more than 20 -60 minutes. Hadoop system running queries
does it in less than a minute.
• Enterprise Events Analytics – enterprise routinely collect terabytes of security relevant
data.
• Net-flow Monitoring to identify Botnets – data to identify infected host participating in a
botnet.
• Advanced Persistent Threat Detection – targeted attack against high value assets.
• Beehive: Behavior Profiling for Advanced Persistent Threat (APT) Detection – large scale
distributed computing helps to detect APT threats
• Experimental research on Big Data analytics to detect and explore security bottleneck
patterns – cyber security is rarely reproducible as data sets are not widely available to
research community.
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
- 12. Contact:
• A certified IT and Business Consultant, Vikas Sharma.
• Twitter – Digitalwalk
• Linkedin – http://www.linkedin.com/in/vikas1sharma
• Email: vikas@cloudspread.in; sharma1vikas@gmail.com
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks