First Ponemon Study on Big Data Analytics in Cyber Defense is a National Wake Up Call

First Ponemon Study on Big Data Analytics in Cyber Defense is a National Wake Up Call

A study from a cyber security analyst firm, entitled “Big Data Analytics in Cyber Defense,” confirms that big data analytics offer a powerful arsenal for cyber security, but adoption is alarmingly slow. The report, released today by Teradata Corporation and the Ponemon Institute, contains several key findings:

  • Cyber-attacks are getting worse but only 20 percent say their organizations are more effective at stopping them. The greatest areas of cyber security risk are caused by mobility, lack of visibility and multiple, global, interconnected, network systems.
  • 56 percent are aware of the technologies that provide big data analytics and 61 percent say they will solve pressing security issues.
  • Less than half of organizations are vigilant in preventing (42 percent) anomalous and potentially malicious traffic from entering networks or detecting such traffic (49 percent) in their networks.
  • Big data analytics, with security technologies, ensure a stronger, cyber defense. 82 percent would like big data analytics combined with anti-virus/anti-malware; 80 percent say anti-DoS/DDoS would make their organizations more secure.

“While data growth and complexity are explosive factors in cyber defense, new big data tools and data management techniques are emerging that can efficiently handle the volume and complexity of IP network data,” said Larry Ponemon, chairman and founder of the Ponemon Institute, a research “think tank” dedicated to advancing privacy and data protection practices. “These new, database analytic tools can bring more power and precision to an enterprise, cyber-defense strategy, and will help organizations rise to meet the demands of complex, large-scale analytic and data environments.”

 

Today’s IT security practitioners consider network data to present both an opportunity (data integration 61%, data complexity 53%) and a challenge (data growth 50%, data integration 39%).  While many organizations struggle with in-house technology and skill sets, only 35% say they have big data solutions in place today, and just over half (51%) say they have the in-house analytic personnel or expertise, the study showed.

Big data analytics can bridge the existing gap between technology and people in cyber defense through big data tools and techniques which capture, process and refine network activity data and apply algorithms for near-real-time review of every network node.  A benefit of big data analytics in cyber defense is the ability to more easily recognize patterns of activity that represent network threats for faster response to anomalous activity.

“The Ponemon study is a wakeup call,” said Sam Harris, director of enterprise risk management for Teradata. “Enterprises must act immediately to add big data capabilities to their cyber-defense programs to close the gap between intrusion, detection, compromise and containment. When multi-structured data from many sources is exploited, organizations gain a very effective weapon against cyber-crimes.” 

Harris said that in the cyber security realm, effective defense means managing and analyzing unimaginable volumes of network transaction data in near-real-time. “Many security teams have realized that it is no small feat to quickly sift through all of their network data to identify the 0.1 percent of data indicating anomalous behavior and potential network threats. Cyber security and network visibility have become a big data problem. Organizations entrusted with personal, sensitive and consequential data need to effectively augment their security systems now, or they are putting their companies, clients, customers and citizens at risk.”

The Ponemon Institute surveyed more than 700 Information Technologists (IT) and IT security practitioners across the United States about the new data management and analytic technologies available to help organizations become more proactive and intelligent about detecting and stopping cyber threats.  The study covered experts with an average of 10 years of experience in the financial services, manufacturing and government industries. All respondents were familiar with their organization’s defense against cyber security attacks and have some level of responsibility for managing the cyber security activities within their organization.

To access, read, and share the study please visit: http://www.teradata.com/cybersecurity-threat/.

Infographic revealing survey's big data and cyber security results:

 

Featured

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

  • Why the Future of Video Security Is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reasons. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.