Big Data comes with big security problems

Big Database Security Provider

Why should big data be more difficult to secure? According to the survey conducted by Business Intelligence and Information Management, shows that analysis of big data is top priority. Among those 47% of marketers were very or extremely interested and 9% had no interest in big data analysis.

What are driving these initiatives?

  • 44% marketers say its predicting customers behavior
  • 47% site findings correlations across multiple disparate data sources
  • 27% expect to predict fraud or financial risk

But the Big Data landscape is incredibly diverse across the following three areas;

  1. Data Forms – It can be structured, like databases and transactional data, or it could be unstructured office documents, images, raw data stored as flat files.
  2. Data Sources – It includes financial accounting applications, sales and product data, CRM applications, email files sever logs, office files, images, mobile device data including geolocation and much more.
  3. Data Consumers – They range from department-level to analysts to senior business managers to IT and business users.

Analytics survey respondents recognize that there us is risk around Big Data like; the primary concern is the scarcity and cost of big data expertise. Data accuracy is also a point to worry about. Few also lack in management features.

Few hard facts must be considered:

  • Pure perimeter-and-endpoint-centric security is over. You need to focus on data
  • Many new Big Data analysis tools treat security as a secondary or a tertiary requirement, you should start getting used to it.
  • Business users wants constant and flexible access. Forget about that iron-listed control you had in traditional data warehouse/business intelligence models.

Big Data can be protected through a smart mix of technology and policy. Introduction of this may be tipping point for adoption of modern security practices.

  • Log everything, it’s the only way you can reliably detect unauthorized activities
  • Use a system to make sense of log data, as you cannot do it manually.
  • Analyze and audit for sensitive information in motion.
  • Understand the security of any application that has access to sensitive information
  • Invest in identity and access management – it’s the only way to apply the principle of least privilege.

Note:- Please feel free to make suggestions and/or comments