SlideShare a Scribd company logo
A Dell Big Data Whitepaper 
Big Data for Security 
A Dell Big Data White Paper 
By Joey Jablonski
A Dell Big Data White Paper: Big Data for Security 
2 
Big Data for Security 
Big data has brought the ability to analyze large, complex, multisource data sets to many organizations that previously relied more on past experience and gut feelings to drive critical decisions. Particularly in the security realm, organizations are looking to big data to drive better visibility into events, actions, intrusions and behaviors than previously possible. Big data enables organizations to be more proactive in responding to threats, as well as more readily able as an organization to evolve and react to new threats to data assets or connected devices and applications. 
Effective security in an organization – that is protecting data assets from compromise and misuse – is about effective layers in the security environment. These layers commonly include protections like patches, firewalls and VPNs, alerts through monitoring systems, and educating teams to avoid activities that are high-risk and unnecessary for the company to conduct business. Overarching all these layers is a process for responding to threats and intrusions and continually tweaking the systems in place to prevent future intrusions. Big data enables organizations to simultaneously monitor more data points, and better detail about activities to pinpoint unexpected patterns, as well as investigate events in more detail to prevent them from occurring in the future. 
There are a multitude of ways that big data can be used to proactively monitor behavior and identify security threats to an organization. Some example projects proving successful for organizations include: 
 Network Traffic Monitoring – The ability to ingest complete network traffic over long periods of time, from many devices, enables organizations to quickly identify anomalies in traffic patterns, as well as to investigate security breaches in greater detail than ever before. 
 Insider Threat Identification – As more and more organizations begin to look inward for possible threats, proactive identification of rogue employees and contractors has become critical. By leveraging big data technologies, organizations can combine a multitude of information from access logs, to job descriptions and HR reviews to identify staff that are high risk for theft or compromise to organizational and customer data. 
 BYOD Device Usage – With the proliferation of bring-your-own-device models within organizations, IT departments have had to change the way they monitor which locations contain proprietary company data, and then put controls in place to take appropriate actions to protect it. 
 Job-Based Behavioral Correlation – Many organizations have created profiles to enable access to data with access tools based on job descriptions and levels within an organization. Many times these are static policies with little to no monitoring to ensure compliance as organizational changes and staff job changes occur, putting the organization at risk for data loss due to rogue players. Big data enables seamless monitoring of not only policies, but how they are being tested by staff, used and executed by staff. 
 IP Protection - Many organizations have created, and must protect, intellectual property (IP) that is responsible for a competitive edge in their respective markets. This IP can cost a large amount of capital to research, create and protect. Big data can enable organizations to monitor both internal and external publications for occurrences where IP is used improperly.
A Dell Big Data White Paper: Big Data for Security 
3 
The technology platforms supporting businesses today are more complex then ever. As staff moves from roles, locations and projects, the external threats to companies continue to multiply. Big data provides a mechanism for companies to proactively monitor a variety of data sources, building predictive models about expected behavior, while alerting security response teams when behavior falls outside the expected patterns. This is compounded by user behaviors that change as they evolve between projects and schedules. By leveraging modern big data platforms, companies can leverage this wealth of information created to more successfully identify and prevent threats, investigate intrusions and identify high-risk staff. 
To learn more 
To learn more about Dell big data solutions, contact your Dell representative or visit: 
www.dell.com/bigdata www.DellBigData.com 
©2014 Dell Inc. All rights reserved. Trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Specifications are correct at date of publication but are subject to availability or change without notice at any time. Dell and its affiliates cannot be responsible for errors or omissions in typography or photography. Dell’s Terms and Conditions of Sales and Service apply and are available on request. Dell service offerings do not affect consumer’s statutory rights. 
Dell, the DELL logo, and the DELL badge, PowerConnect, and PowerVault are trademarks of Dell Inc.

More Related Content

PDF
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
PPTX
Proven Practices to Protect Critical Data - DarkReading VTS Deck
PDF
Bridging the Data Security Gap
PDF
Wp security-data-safe
PPTX
Comprehensive Data Leak Prevention
DOCX
Running head hardware and software security14 hardware an
PDF
Top 3 security concerns for enterprises
PDF
10 security problems unique to it
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Bridging the Data Security Gap
Wp security-data-safe
Comprehensive Data Leak Prevention
Running head hardware and software security14 hardware an
Top 3 security concerns for enterprises
10 security problems unique to it

What's hot (20)

PPT
apsec 7 Golden Rules Data Leakage Prevention / DLP
PPTX
Protecting the Crown Jewels – Enlist the Beefeaters
PDF
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
PPTX
How Vulnerable is Your Critical Data?
PDF
Data exfiltration so many threats 2016
DOCX
Running head technology vulnerabilities in the cloud
PDF
Enterprise Data Privacy Quiz
PDF
Getting ahead of compromise
PDF
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
PDF
The Art of Cloud Auditing - ISACA ID
PDF
Data-Centric Security for the Extended Enterprise
PPT
Information Leakage - A knowledge Based Approach
PPTX
Information Leakage & DLP
PDF
Responding to a Data Breach, Communications Guidelines for Merchants
PPTX
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
PDF
Protecting Corporate Information in the Cloud
PDF
Opteamix_whitepaper_Data Masking Strategy.pdf
PDF
Extending Information Security to Non-Production Environments
PPT
Anton Chuvakin on Security Data Centralization
PDF
Cyber Resilience - Welcoming New Normal - Eryk
apsec 7 Golden Rules Data Leakage Prevention / DLP
Protecting the Crown Jewels – Enlist the Beefeaters
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
How Vulnerable is Your Critical Data?
Data exfiltration so many threats 2016
Running head technology vulnerabilities in the cloud
Enterprise Data Privacy Quiz
Getting ahead of compromise
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Art of Cloud Auditing - ISACA ID
Data-Centric Security for the Extended Enterprise
Information Leakage - A knowledge Based Approach
Information Leakage & DLP
Responding to a Data Breach, Communications Guidelines for Merchants
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Protecting Corporate Information in the Cloud
Opteamix_whitepaper_Data Masking Strategy.pdf
Extending Information Security to Non-Production Environments
Anton Chuvakin on Security Data Centralization
Cyber Resilience - Welcoming New Normal - Eryk
Ad

Similar to Big Data for Security (20)

PDF
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
PDF
Security for Big Data
PDF
3 guiding priciples to improve data security
PPTX
Big data security the perfect storm
PDF
Getting Real About Security Management and “Big Data”
 
PDF
Big Data and Information Security
PDF
Five_Big_Data_Security_Pitfalls
DOCX
Big data security
DOCX
Big data security
PPTX
Advanced threat protection and big data
PPTX
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
PDF
Big Data & Security Have Collided - What Are You Going to do About It?
 
PPTX
Big Data and Security - Where are we now? (2015)
PDF
Big Data Security Challenges: An Overview and Application of User Behavior An...
DOC
Complete-SRS.doc
PDF
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
 
PDF
Trust Security And Privacy For Big Data Mamoun Alazab Maanak Gupta
PDF
Trust Security And Privacy For Big Data Mamoun Alazab Maanak Gupta
PDF
Keith prabhu global high on cloud summit
PDF
The value of big data analytics
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
Security for Big Data
3 guiding priciples to improve data security
Big data security the perfect storm
Getting Real About Security Management and “Big Data”
 
Big Data and Information Security
Five_Big_Data_Security_Pitfalls
Big data security
Big data security
Advanced threat protection and big data
NTXISSACSC2 - Information Security Opportunity: Embracing Big Data with Peopl...
Big Data & Security Have Collided - What Are You Going to do About It?
 
Big Data and Security - Where are we now? (2015)
Big Data Security Challenges: An Overview and Application of User Behavior An...
Complete-SRS.doc
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
 
Trust Security And Privacy For Big Data Mamoun Alazab Maanak Gupta
Trust Security And Privacy For Big Data Mamoun Alazab Maanak Gupta
Keith prabhu global high on cloud summit
The value of big data analytics
Ad

More from Joey Jablonski (8)

PDF
PCA26 - Product Management in IT
PPTX
Feeding 10 Billion People with Cloud-Scale Compute and Analytics
PDF
Virtualized Hadoop
PPTX
Redefining Security for Big Data - Cassandra Summit 2013
PPT
SNIA 2012 - Creating an Enterprise Hadoop Platform
PDF
Hadoop Business Cases
PDF
Hadoop in the Enterprise
PDF
Introduction to Hadoop
PCA26 - Product Management in IT
Feeding 10 Billion People with Cloud-Scale Compute and Analytics
Virtualized Hadoop
Redefining Security for Big Data - Cassandra Summit 2013
SNIA 2012 - Creating an Enterprise Hadoop Platform
Hadoop Business Cases
Hadoop in the Enterprise
Introduction to Hadoop

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Cloud computing and distributed systems.
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Cloud computing and distributed systems.
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Chapter 3 Spatial Domain Image Processing.pdf
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectral efficient network and resource selection model in 5G networks
“AI and Expert System Decision Support & Business Intelligence Systems”
Understanding_Digital_Forensics_Presentation.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Building Integrated photovoltaic BIPV_UPV.pdf
Unlocking AI with Model Context Protocol (MCP)
Big Data Technologies - Introduction.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Monthly Chronicles - July 2025
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Big Data for Security

  • 1. A Dell Big Data Whitepaper Big Data for Security A Dell Big Data White Paper By Joey Jablonski
  • 2. A Dell Big Data White Paper: Big Data for Security 2 Big Data for Security Big data has brought the ability to analyze large, complex, multisource data sets to many organizations that previously relied more on past experience and gut feelings to drive critical decisions. Particularly in the security realm, organizations are looking to big data to drive better visibility into events, actions, intrusions and behaviors than previously possible. Big data enables organizations to be more proactive in responding to threats, as well as more readily able as an organization to evolve and react to new threats to data assets or connected devices and applications. Effective security in an organization – that is protecting data assets from compromise and misuse – is about effective layers in the security environment. These layers commonly include protections like patches, firewalls and VPNs, alerts through monitoring systems, and educating teams to avoid activities that are high-risk and unnecessary for the company to conduct business. Overarching all these layers is a process for responding to threats and intrusions and continually tweaking the systems in place to prevent future intrusions. Big data enables organizations to simultaneously monitor more data points, and better detail about activities to pinpoint unexpected patterns, as well as investigate events in more detail to prevent them from occurring in the future. There are a multitude of ways that big data can be used to proactively monitor behavior and identify security threats to an organization. Some example projects proving successful for organizations include:  Network Traffic Monitoring – The ability to ingest complete network traffic over long periods of time, from many devices, enables organizations to quickly identify anomalies in traffic patterns, as well as to investigate security breaches in greater detail than ever before.  Insider Threat Identification – As more and more organizations begin to look inward for possible threats, proactive identification of rogue employees and contractors has become critical. By leveraging big data technologies, organizations can combine a multitude of information from access logs, to job descriptions and HR reviews to identify staff that are high risk for theft or compromise to organizational and customer data.  BYOD Device Usage – With the proliferation of bring-your-own-device models within organizations, IT departments have had to change the way they monitor which locations contain proprietary company data, and then put controls in place to take appropriate actions to protect it.  Job-Based Behavioral Correlation – Many organizations have created profiles to enable access to data with access tools based on job descriptions and levels within an organization. Many times these are static policies with little to no monitoring to ensure compliance as organizational changes and staff job changes occur, putting the organization at risk for data loss due to rogue players. Big data enables seamless monitoring of not only policies, but how they are being tested by staff, used and executed by staff.  IP Protection - Many organizations have created, and must protect, intellectual property (IP) that is responsible for a competitive edge in their respective markets. This IP can cost a large amount of capital to research, create and protect. Big data can enable organizations to monitor both internal and external publications for occurrences where IP is used improperly.
  • 3. A Dell Big Data White Paper: Big Data for Security 3 The technology platforms supporting businesses today are more complex then ever. As staff moves from roles, locations and projects, the external threats to companies continue to multiply. Big data provides a mechanism for companies to proactively monitor a variety of data sources, building predictive models about expected behavior, while alerting security response teams when behavior falls outside the expected patterns. This is compounded by user behaviors that change as they evolve between projects and schedules. By leveraging modern big data platforms, companies can leverage this wealth of information created to more successfully identify and prevent threats, investigate intrusions and identify high-risk staff. To learn more To learn more about Dell big data solutions, contact your Dell representative or visit: www.dell.com/bigdata www.DellBigData.com ©2014 Dell Inc. All rights reserved. Trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Specifications are correct at date of publication but are subject to availability or change without notice at any time. Dell and its affiliates cannot be responsible for errors or omissions in typography or photography. Dell’s Terms and Conditions of Sales and Service apply and are available on request. Dell service offerings do not affect consumer’s statutory rights. Dell, the DELL logo, and the DELL badge, PowerConnect, and PowerVault are trademarks of Dell Inc.