SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
A chain is as strong, as it’s weakest link !!
© 2011-2013 Cloudspread. All rights reserved. The Cloudsprea
logo and Cloudspread are registered trademarks
Cloud Security - Challenges
Cloud Security ensures encryption and key management software that helps
organizations lock down virtual machines and their data so they remain secure
throughout their lifecycle in the private, public or hybrid cloud. Three major
challenges:
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
Cloud
Security
Threats
Breaches
Compliance
Cloud Security: Measures
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
Threats
Scan and Protect the
Network from Threats
Establish Intelligence across
the Cloud
Breaches
Manage Identities and User
Access in a Borderless
Network Architecture
Gaps and Vulnerabilities in
Virtualization
Compliances
Monitor and Audit –
Applications and Data
Security
- SOX, IT Audit,
Conformity and Integrity
Check - ISO, HIPPA, PCI, SAS
70
Integrity Check -
Whitelisting or Blacklisting
Cloud Security: Big Data Analytics and Automation
• Integrated security intelligence solutions harness security-relevant
information from across the organization.
• Analytics and automation provides context to detect threats faster,
identify vulnerabilities, prioritize risks and automate compliance
activities.
• A security intelligence platform that applies real-time correlation and
anomaly detection across a distributed and scalable repository of
security information.
• With the help of ‘Big Data’ analytics that enables more accurate
security monitoring and better visibility to travel our way into a
secured cloud environment.
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
Cloud Security: What is ‘Big Data’? Why do we need to know?
• It is structured or unstructured exponential growth and availability of data that
can not be handled through the normal relational database tools available or
already in use across the organization.
• Big data is going to change the way you do things in the future, how you gain
insight, and make decisions.
• Accumulation of ‘Big Data’ is not that big problem. The real question lies with
the fact - what we do with this ‘Big Data’? How do we analyze it and make an
effective use of it?
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
Big Data = Transactions + Interactions + Observations
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
Cloud Security: Big Data Drivers
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
Cloud Security: How does Hadoop help?
• Organizations are discovering that important predictions can be made
by sorting through and analyzing Big Data.
• However, since 80% of this data is "unstructured", it must be
formatted (or structured) in a way that makes it suitable for data
mining and subsequent analysis.
• Hadoop is the core platform for structuring Big Data, and solves the
problem of making it useful for analytics purposes leading to extract
intelligent security information.
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
Cloud Security: Hadoop Batch and Stream Processing
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
Cloud Security: Big Data Analytics - Data Privacy and Governance
Technological
Advances
Storage
AnalysisProcessing
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
Business
Knowledge
Operational
Knowledge
Process of
Analyzing and
Mining Big Data
Rapid decreasing cost of storage and
CPU power
Flexibility and cost effectiveness of
Data Center and Cloud Computing
Development of new framework
‘Hadoop’
Cloud Security: What ‘Big Data Analysis’ can do?
• Network Security- to mine meaningful security information from sources such as
firewalls and security devices, but also from website traffic, and business processes and
other day-to-day transactions. What, traditional SEIM (Security Information
Management) tools take more than 20 -60 minutes. Hadoop system running queries
does it in less than a minute.
• Enterprise Events Analytics – enterprise routinely collect terabytes of security relevant
data.
• Net-flow Monitoring to identify Botnets – data to identify infected host participating in a
botnet.
• Advanced Persistent Threat Detection – targeted attack against high value assets.
• Beehive: Behavior Profiling for Advanced Persistent Threat (APT) Detection – large scale
distributed computing helps to detect APT threats
• Experimental research on Big Data analytics to detect and explore security bottleneck
patterns – cyber security is rarely reproducible as data sets are not widely available to
research community.
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks
Contact:
• A certified IT and Business Consultant, Vikas Sharma.
• Twitter – Digitalwalk
• Linkedin – http://www.linkedin.com/in/vikas1sharma
• Email: vikas@cloudspread.in; sharma1vikas@gmail.com
© 2011-2013 Cloudspread. All rights reserved. The
Cloudspread logo and Cloudspread are registered trademarks

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Empfohlen

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Cloud security big data analytic

  • 1. A chain is as strong, as it’s weakest link !! © 2011-2013 Cloudspread. All rights reserved. The Cloudsprea logo and Cloudspread are registered trademarks
  • 2. Cloud Security - Challenges Cloud Security ensures encryption and key management software that helps organizations lock down virtual machines and their data so they remain secure throughout their lifecycle in the private, public or hybrid cloud. Three major challenges: © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks Cloud Security Threats Breaches Compliance
  • 3. Cloud Security: Measures © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks Threats Scan and Protect the Network from Threats Establish Intelligence across the Cloud Breaches Manage Identities and User Access in a Borderless Network Architecture Gaps and Vulnerabilities in Virtualization Compliances Monitor and Audit – Applications and Data Security - SOX, IT Audit, Conformity and Integrity Check - ISO, HIPPA, PCI, SAS 70 Integrity Check - Whitelisting or Blacklisting
  • 4. Cloud Security: Big Data Analytics and Automation • Integrated security intelligence solutions harness security-relevant information from across the organization. • Analytics and automation provides context to detect threats faster, identify vulnerabilities, prioritize risks and automate compliance activities. • A security intelligence platform that applies real-time correlation and anomaly detection across a distributed and scalable repository of security information. • With the help of ‘Big Data’ analytics that enables more accurate security monitoring and better visibility to travel our way into a secured cloud environment. © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
  • 5. Cloud Security: What is ‘Big Data’? Why do we need to know? • It is structured or unstructured exponential growth and availability of data that can not be handled through the normal relational database tools available or already in use across the organization. • Big data is going to change the way you do things in the future, how you gain insight, and make decisions. • Accumulation of ‘Big Data’ is not that big problem. The real question lies with the fact - what we do with this ‘Big Data’? How do we analyze it and make an effective use of it? © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
  • 6. Big Data = Transactions + Interactions + Observations © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
  • 7. Cloud Security: Big Data Drivers © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
  • 8. Cloud Security: How does Hadoop help? • Organizations are discovering that important predictions can be made by sorting through and analyzing Big Data. • However, since 80% of this data is "unstructured", it must be formatted (or structured) in a way that makes it suitable for data mining and subsequent analysis. • Hadoop is the core platform for structuring Big Data, and solves the problem of making it useful for analytics purposes leading to extract intelligent security information. © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
  • 9. Cloud Security: Hadoop Batch and Stream Processing © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
  • 10. Cloud Security: Big Data Analytics - Data Privacy and Governance Technological Advances Storage AnalysisProcessing © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks Business Knowledge Operational Knowledge Process of Analyzing and Mining Big Data Rapid decreasing cost of storage and CPU power Flexibility and cost effectiveness of Data Center and Cloud Computing Development of new framework ‘Hadoop’
  • 11. Cloud Security: What ‘Big Data Analysis’ can do? • Network Security- to mine meaningful security information from sources such as firewalls and security devices, but also from website traffic, and business processes and other day-to-day transactions. What, traditional SEIM (Security Information Management) tools take more than 20 -60 minutes. Hadoop system running queries does it in less than a minute. • Enterprise Events Analytics – enterprise routinely collect terabytes of security relevant data. • Net-flow Monitoring to identify Botnets – data to identify infected host participating in a botnet. • Advanced Persistent Threat Detection – targeted attack against high value assets. • Beehive: Behavior Profiling for Advanced Persistent Threat (APT) Detection – large scale distributed computing helps to detect APT threats • Experimental research on Big Data analytics to detect and explore security bottleneck patterns – cyber security is rarely reproducible as data sets are not widely available to research community. © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
  • 12. Contact: • A certified IT and Business Consultant, Vikas Sharma. • Twitter – Digitalwalk • Linkedin – http://www.linkedin.com/in/vikas1sharma • Email: vikas@cloudspread.in; sharma1vikas@gmail.com © 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks