big data new era of network security analytic dwika

16
New Era Of Analytic Dwika Sudrajat ([email protected]) VIDE Freeman Consulting – Hong Kong Enterprise Content Management

Upload: dwika-sudrajat

Post on 17-Jul-2015

111 views

Category:

Business


4 download

TRANSCRIPT

New Era Of Analytic

Dwika Sudrajat ([email protected])VIDE Freeman Consulting – Hong Kong

Enterprise Content Management

Security/Intelligence Extension: Needs

© 2013 IBM Corporation

Analyze Telco & social data to:• Gather criminal evidence• Prevent criminal activities• Proactively apprehend criminals• Customer Retention

Crime prediction & protection

Reduce Customer Churn

Security/Intelligence Extension enhances traditional security solutions by analyzing all types and sources of under-leveraged data

Enhanced Intelligence & Surveillance Insight

Analyze data-in-motion & at rest to:• Find associations • Uncover patterns and facts• Maintain currency of information

Real-time Cyber Attack Prediction & Mitigation

Analyze network traffic to:• Discover new threats early• Detect known complex threats• Take action in real-time

Where Is This “Big Data” Coming From ?

12+ TBs

of tweet data every day

25+ TBs of

log data every day

? T

Bs

of

dat

a e

very

d

ay

2+ billion people on the

Web by end 2011

30 billion RFID tags today

(1.3B in 2005)

4.6 billion camera phones

world wide

100s of millions of GPS

enabled devices

sold annually

76 million smart meters in 2009… 200M by 2014

Raw

Lo

gs a

nd M

ach

ine

Dat

a Indexing, Search

Statistical Modeling

Root Cause Analysis

Federated Navigation &

Discovery

Real-time Analysis

Only storewhat is needed

Operations Analysis: Value & Diagram

Machine DataAccelerator

OPERATIONAL - ANALYSIS

Capabilities:

Hadoop & Stream Computing

• Intelligent Infrastructure Management: log analytics, energy bill forecasting, energy consumption optimization, anomalous energy usage detection, presence-aware energy management

• Optimized building energy consumption with centralized monitoring; Automated preventive and corrective maintenance

Big Data Is Big Data Is NewNew Big Data Is Only About Big Data Is Only About Massive Data VolumeMassive Data Volume Big Data Means Big Data Means HadoopHadoop Big Data Need ABig Data Need A Data WarehouseData Warehouse Big Data Means Big Data Means Unstructured DataUnstructured Data Big Data Is for Big Data Is for Social Media Social Media & & Sentiment AnalysisSentiment Analysis

Big Data Is Big Data Is NewNew Big Data Is Only About Big Data Is Only About Massive Data VolumeMassive Data Volume Big Data Means Big Data Means HadoopHadoop Big Data Need ABig Data Need A Data WarehouseData Warehouse Big Data Means Big Data Means Unstructured DataUnstructured Data Big Data Is for Big Data Is for Social Media Social Media & & Sentiment AnalysisSentiment Analysis

The Myth About Big Data

Big Data Is..

It is all about better Analytic on a broader spectrum of data, and

therefore represents an opportunity to create even more differentiation

among industry peers.

Volume

of Tweets create daily.

12+ terabytes

Variety

of different types of data.

100’sVeracity

decision makers trust their information.

Only 1 in 3

With Big Data, We’ve Moved into a New Era of Analytics

trade eventsper second.

5+million

Velocity

0011010100100100100110100101010011100101001111001000100100010010001000100101

Analytic With Data-In-Motion & Data At Rest

9

01011001100011101001001001001110001001010010010110010010100110010010100100101010001001001100100101001001010100010010110001001010010010110010010100110010010100100101010001001001100100101001001010100010010

Op

po

rtu

nit

y C

ost

Sta

rts

Her

e

01100100101001001010100010010011001001010010010101000100101100010010100100101100100101001100100101001001010100010010011001001010010010101000100100110010010100100101010001001001100100101001001010100010010011001001010010010101000100101100010010100100101100100101001100100101001001010100010010011001001010010010101000100100110010010100100101010001001011000100101001001011001001010

AdaptiveAnalytics

Model

BootstrapEnrich

Data Ingest

The Secure IoT Architecture – IT Plus OT!

Services

Application InterfacesApplication Interfaces

Infrastructure InterfacesInfrastructure Interfaces

New Business Models Partner Ecosystem

ApplicationsApplications

Application Enablement PlatformApplication Enablement Platform

Application Centric InfrastructureApplication Centric Infrastructure

SecuritySecurity

Data Integrati

on

Data Integrati

onBig DataBig Data AnalyticsAnalytics Control

Systems

Control Systems

Application

Integration

Application

Integration Network and

Perimeter Security

Physical Security

Device-level Security /

Anti-tampering

Cloud-based Threat Analysis /

Protection

End-to-End Data Encryption

Services

Indicators of CompromiseBig data spotlight on systems at high risk for an active breach

•Automated compromise analysis & determination

•Prioritized list of compromised devices

•Quick links for quick root cause analysis and remediation

Advanced Malware Protection Deployment

Dedicated Advanced Malware Protection (AMP) appliance

Advanced Malware Protection for FirePOWER (NGIPS, NGFW)

FireAMP for hosts, virtual and mobile devices

Complete solution suite to protect the extended network

Advanced Malware Detection

One-to-One

Signature-based, 1st line of defense

Fuzzy Fingerprinting

Advanced AnalyticsMachine Learning

Analyzes 400+ attributes for unknown malware

Detection lattice considers content from each engine for real time file disposition

Cloud-based delivery results in better protection plus lower storage & compute burden on endpoint

Algorithms identify polymorphic malware

Combines data from lattice with global trends

Retrospective Security

• Continuous Analysis - Retrospective detection of malware beyond the event horizon

• Trajectory – Determine scope by tracking malware in motion and activity

•File Trajectory – Visibility across organization, centering on a given file

•Device Trajectory – Deep visibility into file activity on a single system

Always Watching… Never Forgets… Turns Back Time

Cisco Delivers

Continuous Capability

Complexity Reduction

Point-in-Time and Contiuous

Protection Across the

Network and Data Center

Fits and Adapts

to Changing Business Models

whereever the Threat

Manifests

Global Intelligence

With Context

Detects and Stops Advanced Threats

Advanced Threat

Protection

UnmatchedVisibility

Thank you