+ All Categories
Home > Documents > Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring...

Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring...

Date post: 09-Jun-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
24
Big Data: What You Should Know Mark Child Research Manager - Software IDC CEMA
Transcript
Page 1: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

Big Data: What You Should Know Mark Child

Research Manager - Software

IDC CEMA

Page 2: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

Agenda

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 2

Market Dynamics

Defining Big Data

Technology Trends

Information and Intelligence

Market Realities

Future Applications

Page 3: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

The IT Market and the 3rd Platform

3

The first platform was an industry characterized by

mainframe computers and terminals with thousands of

applications being delivered to millions of users.

The second platform was that of client-server or where

PCs and servers were connected through LANs and the

internet, accompanied by tens of thousands of

applications and hundreds of millions of users.

The third platform is driven by four forces: mobile

broadband, devices and applications; social

business; cloud services; and Big Data and analytics.

This platform revolves around:

• Millions of applications

• Billions of users

• Trillions of connected fixed and mobile devices

Page 4: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

Data Growing Unabated

• Information will grow by

factor of 44 from 2009 to

2020

• Storage capacity will

grow by a factor of 30

• IT staffing will grow by a

factor of 1.4

2009 2020

*Zettabyte = 1 trillion gigabytes

0.8 ZB* 35 ZB*

4

Page 5: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

Sources of Data Growth

Web

Apps

Enterprise

Apps Office

Apps

Digital security

Connected devices

and media

Social networks

5

Software as a Service

Data creation

is part of our

daily lives

Page 6: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

20

09

20

10

20

11

20

12

20

13

20

14

20

15

20

16

20

17

20

18

20

19

20

20

Data Growth Storage Growth

Growth Factor 44x

30x

Storage Efficiency

Technologies Gap

Storage Virtualization - CAPEX,

Migration costs, Management

overhead, Scalability, Uptime

Caching/SSD - SLA/QoS,

Floorspace, Power

Thin Provisioning - Reclaim

unused capacity

Tiering - Raw cost / per capacity

Deduplication, Compression - Get

rid of copies, Data footprint

Unified/Converged Mgmt. -

Management overhead

Hypervisor integration - VM

provisioning overhead

Integrated snapshots and

replication - DP & DR overhead

FCoE, iSCSI - Storage network

costs

Storage Efficiency

6

Acceleration in the Adoption of Storage-Efficient

Technologies

Page 7: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

20

09

20

10

20

11

20

12

20

13

20

14

20

15

20

16

20

17

20

18

20

19

20

20

Data Objects Growth Staffing Growth

Growth Factor

67x Information

Efficiency Gap

Advanced Analytics Software

(Embedded and Stand-alone)

EQRA – End-user Query,

Reporting and Analysis

Data Warehouse Generation and

Management

Content Analysis Tools

Hadoop, Hbase, Map reduce

Information Efficiency

7

Acceleration in the Adoption of Information-

Efficient Technologies

Page 8: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

Volume

Variety

Velocity

Value

What is Big Data?

IDC defines Big Data

technologies as a new

generation of technologies

and architectures,

designed to economically

extract value from very

large volumes of a wide

variety of data, by

enabling high velocity

capture, discovery and/or

analysis.

8

Page 9: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

How does Big Data differ from Business

Analytics? Greater volumes of data than ever before

Volumes growing quickly

Data processing in near-real-time

(e.g. processing system logs to predict and prevent faults)

Sensor data

Not just RDBMS

data but

unstructured

information

e.g.

System logs

Social information

Cost reduction –

preventing

system and

manufacturing

faults

Revenue

generation –

preventing online

store outages

9

Volume

Variety

Velocity

Value

Page 10: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

Data Source – Big Data Output

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 10

Process-

mediated data

Machine-

generated data Human-sourced

information

Transactional

Tabular

Relational

Metadata

Operational

Structured

Managed

Regulated

System

Sensor data

Computer logs

Structured

Reliable

Fast

High volume

“The Internet of

Things”

Social

Multimedia

Loosely structured

or unstructured

Unregulated

Subjective

Insightful

Unreliable?

Requires

standardization

Page 11: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

Collaboration

Extract,

Transform

and Load

Data Quality,

Profiling,

Cleansing

Master Data

Management

Data

Access

Storage

Integration

Data

Sources

BI and

Analytics

Data

Attachment

Data

Warehouse

Statistics Data Mining Operations Research

ERP CRM POS RFID/

Sensors Other

RDB

Web/

Machine logs

Social

data

Other

RDB

Hive and Pig

HDFS Analytic

sandbox

SQL In-database Analytics MapReduce

Enterprise

collaboration

Collaborative

BI

Social

Platforms

Is This Big Data?

11

Page 12: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

IDC's Big Data Technology and Services

Market Sizing Criteria

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 12

Page 13: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

Worldwide Big

Data Technology

and Services

Revenue Share

by Segment, 2011 41,5%

29,7%

14,0%

11,8% 3,1%

Services

Software

Servers

Storage

Networking

Total: $4.8 billion

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 13

Source: IDC, 2012

Page 14: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

The Big Data technology stack

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 14

Source: IDC, 2012

Page 15: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

Big Data and Analytics: The Chief CIO Issue from 2013 Onwards

Big Data Software Landscape

Source: IDC, 2013

CIOs are being

overwhelmed by the amount

of data they are asked to

manage

Big Data and Analytics will

be the issue of the year for

many CIOs in 2013 in an

effort to provide more value

from IT

CIOs will conduct numerous

pilot analytics projects – not

all will succeed – until they

find the right tools and data

models to provide best value

15

Page 16: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

Big Data technology and services use cases

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 16

Page 17: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

The Value Of Information – Where To Find It

Information

Increased revenue

Cash flow increase

Operating cost

reductions

Increased employee

productivity

Increased customer

satisfaction or loyalty

Improved business

agility

17

Page 18: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

Data Usage Being Practical

Out of 100% of data saved,

only is accessed in future.

65% Out of 15% is accessed only once.

15%

18

Page 19: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

How much data

does your

organization

currently process

per day?

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 19

2,3%

39,7%

15,2% 1,5%

8,3%

11,3%

21,7%

0 TB Up to 1 TB

1TB to less than 5TBs 5TBs to less than 10TBs

10TBs to less than 20TBs 20TBs or more

Don't know

Source: IDC IT Buyers Pulse 2012

N=566 companies across CZ, HU, PL, RO, RU

Page 20: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

What are the key

areas that benefit (or

would benefit) the

most from

leveraging Big Data

solutions in your

organization?

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 20

Source: IDC IT Buyers Pulse 2012

N=425 companies across CZ, HU, PL, RO, RU 0% 10% 20% 30% 40%

Potential for new insights thatcreate competitive advantage

Enabling innovative businessmodels

Marketing campaign optimization

Optimizing revenue

Managing risk levels

Generating new revenue

Better predictive analytics

Analyzing profitability

Managing financial data

Better customer analytics

Optimizing internal operations

Page 21: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

Big Data and Intelligent Security

Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

Big Data’s ability to process large volumes of raw data in real time can enable shift from proactive to predictive security:

• Pattern recognition and predictive analytics

• Link to automated defensive systems: network traffic blocking, system quarantine, extended identity verification

• Risk analysis and risk management

• Integration with GRC systems

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 21

Reactive Proactive Predictive

Page 22: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

Big future for big data?

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 22

Page 23: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

Challenges

Personnel and skills

Data governance

Sponsorship

Data classification, lifecycle and flow

Implementing business process changes

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 23

Page 24: Big Data: What You Should Know - eFocus Konferencie · Big Data and Intelligent Security Monitoring and logging, SIEM help enable shift from reactive to proactive security measures

Thank you!

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 24

Mark Child

Research Manager - Software

IDC CEMA

[email protected]

221 423 140


Recommended