cloud security big data analytic

12
A chain is as strong, as it’s weakest link !! © 2011-2013 Cloudspread. All rights reserved. The Cloudsprea logo and Cloudspread are registered trademarks

Upload: vikas-sharma

Post on 10-May-2015

174 views

Category:

Technology


3 download

DESCRIPTION

Threats, Breaches, and Compliance in Cloud Security. A chain is as strong, as it's weakest link. Let's find out the weakest link in a Cloud Security.

TRANSCRIPT

Page 1: Cloud security big data analytic

A chain is as strong, as it’s weakest link !!

© 2011-2013 Cloudspread. All rights reserved. The Cloudsprealogo and Cloudspread are registered trademarks

Page 2: Cloud security big data analytic

Cloud Security - Challenges

Cloud Security ensures encryption and key management software that helpsorganizations lock down virtual machines and their data so they remain securethroughout their lifecycle in the private, public or hybrid cloud. Three majorchallenges:

© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks

Cloud Security

Threats

Breaches

Compliance

Page 3: Cloud security big data analytic

Cloud Security: Measures

© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks

Threats

Scan and Protect the Network from Threats

Establish Intelligence across the Cloud

Breaches

Manage Identities and User Access in a Borderless Network Architecture

Gaps and Vulnerabilities in Virtualization

Compliances

Monitor and Audit –Applications and Data

Security- SOX, IT Audit,

Conformity and Integrity Check - ISO, HIPPA, PCI, SAS

70Integrity Check -

Whitelisting or Blacklisting

Page 4: Cloud security big data analytic

Cloud Security: Big Data Analytics and Automation

• Integrated security intelligence solutions harness security-relevant information from across the organization.

• Analytics and automation provides context to detect threats faster, identify vulnerabilities, prioritize risks and automate compliance activities.

• A security intelligence platform that applies real-time correlation and anomaly detection across a distributed and scalable repository of security information.

• With the help of ‘Big Data’ analytics that enables more accurate security monitoring and better visibility to travel our way into a secured cloud environment.

© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks

Page 5: Cloud security big data analytic

Cloud Security: What is ‘Big Data’? Why do we need to know?

• It is structured or unstructured exponential growth and availability of data that can not be handled through the normal relational database tools available or already in use across the organization.

• Big data is going to change the way you do things in the future, how you gain insight, and make decisions.

• Accumulation of ‘Big Data’ is not that big problem. The real question lies with the fact - what we do with this ‘Big Data’? How do we analyze it and make an effective use of it?

© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks

Page 6: Cloud security big data analytic

Big Data = Transactions + Interactions + Observations

© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks

Page 7: Cloud security big data analytic

Cloud Security: Big Data Drivers

© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks

Page 8: Cloud security big data analytic

Cloud Security: How does Hadoop help?

• Organizations are discovering that important predictions can be made by sorting through and analyzing Big Data.

• However, since 80% of this data is "unstructured", it must be formatted (or structured) in a way that makes it suitable for data mining and subsequent analysis.

• Hadoop is the core platform for structuring Big Data, and solves the problem of making it useful for analytics purposes leading to extract intelligent security information.

© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks

Page 9: Cloud security big data analytic

Cloud Security: Hadoop Batch and Stream Processing

© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks

Page 10: Cloud security big data analytic

Cloud Security: Big Data Analytics - Data Privacy and Governance

Technological Advances

Storage

AnalysisProcessing

© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks

Business Knowledge

Operational Knowledge

Process of Analyzing and

Mining Big Data

Rapid decreasing cost of storage and CPU power

Flexibility and cost effectiveness of Data Center and Cloud Computing

Development of new framework ‘Hadoop’

Page 11: Cloud security big data analytic

Cloud Security: What ‘Big Data Analysis’ can do?

• Network Security- to mine meaningful security information from sources such as firewalls and security devices, but also from website traffic, and business processes and other day-to-day transactions. What, traditional SEIM (Security Information Management) tools take more than 20 -60 minutes. Hadoop system running queries does it in less than a minute.

• Enterprise Events Analytics – enterprise routinely collect terabytes of security relevant data.

• Net-flow Monitoring to identify Botnets – data to identify infected host participating in a botnet.

• Advanced Persistent Threat Detection – targeted attack against high value assets.

• Beehive: Behavior Profiling for Advanced Persistent Threat (APT) Detection – large scale distributed computing helps to detect APT threats

• Experimental research on Big Data analytics to detect and explore security bottleneck patterns – cyber security is rarely reproducible as data sets are not widely available to research community.

© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks

Page 12: Cloud security big data analytic

Contact:

• A certified IT and Business Consultant, Vikas Sharma.

• Twitter – Digitalwalk

• Linkedin – http://www.linkedin.com/in/vikas1sharma

• Email: [email protected]; [email protected]

© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks