Date post: | 10-May-2015 |
Category: |
Technology |
Upload: | vikas-sharma |
View: | 172 times |
Download: | 3 times |
A chain is as strong, as it’s weakest link !!
© 2011-2013 Cloudspread. All rights reserved. The Cloudsprealogo and Cloudspread are registered trademarks
Cloud Security - Challenges
Cloud Security ensures encryption and key management software that helpsorganizations lock down virtual machines and their data so they remain securethroughout their lifecycle in the private, public or hybrid cloud. Three majorchallenges:
© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
Cloud Security
Threats
Breaches
Compliance
Cloud Security: Measures
© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
Threats
Scan and Protect the Network from Threats
Establish Intelligence across the Cloud
Breaches
Manage Identities and User Access in a Borderless Network Architecture
Gaps and Vulnerabilities in Virtualization
Compliances
Monitor and Audit –Applications and Data
Security- SOX, IT Audit,
Conformity and Integrity Check - ISO, HIPPA, PCI, SAS
70Integrity Check -
Whitelisting or Blacklisting
Cloud Security: Big Data Analytics and Automation
• Integrated security intelligence solutions harness security-relevant information from across the organization.
• Analytics and automation provides context to detect threats faster, identify vulnerabilities, prioritize risks and automate compliance activities.
• A security intelligence platform that applies real-time correlation and anomaly detection across a distributed and scalable repository of security information.
• With the help of ‘Big Data’ analytics that enables more accurate security monitoring and better visibility to travel our way into a secured cloud environment.
© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
Cloud Security: What is ‘Big Data’? Why do we need to know?
• It is structured or unstructured exponential growth and availability of data that can not be handled through the normal relational database tools available or already in use across the organization.
• Big data is going to change the way you do things in the future, how you gain insight, and make decisions.
• Accumulation of ‘Big Data’ is not that big problem. The real question lies with the fact - what we do with this ‘Big Data’? How do we analyze it and make an effective use of it?
© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
Big Data = Transactions + Interactions + Observations
© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
Cloud Security: Big Data Drivers
© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
Cloud Security: How does Hadoop help?
• Organizations are discovering that important predictions can be made by sorting through and analyzing Big Data.
• However, since 80% of this data is "unstructured", it must be formatted (or structured) in a way that makes it suitable for data mining and subsequent analysis.
• Hadoop is the core platform for structuring Big Data, and solves the problem of making it useful for analytics purposes leading to extract intelligent security information.
© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
Cloud Security: Hadoop Batch and Stream Processing
© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
Cloud Security: Big Data Analytics - Data Privacy and Governance
Technological Advances
Storage
AnalysisProcessing
© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
Business Knowledge
Operational Knowledge
Process of Analyzing and
Mining Big Data
Rapid decreasing cost of storage and CPU power
Flexibility and cost effectiveness of Data Center and Cloud Computing
Development of new framework ‘Hadoop’
Cloud Security: What ‘Big Data Analysis’ can do?
• Network Security- to mine meaningful security information from sources such as firewalls and security devices, but also from website traffic, and business processes and other day-to-day transactions. What, traditional SEIM (Security Information Management) tools take more than 20 -60 minutes. Hadoop system running queries does it in less than a minute.
• Enterprise Events Analytics – enterprise routinely collect terabytes of security relevant data.
• Net-flow Monitoring to identify Botnets – data to identify infected host participating in a botnet.
• Advanced Persistent Threat Detection – targeted attack against high value assets.
• Beehive: Behavior Profiling for Advanced Persistent Threat (APT) Detection – large scale distributed computing helps to detect APT threats
• Experimental research on Big Data analytics to detect and explore security bottleneck patterns – cyber security is rarely reproducible as data sets are not widely available to research community.
© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks
Contact:
• A certified IT and Business Consultant, Vikas Sharma.
• Twitter – Digitalwalk
• Linkedin – http://www.linkedin.com/in/vikas1sharma
• Email: [email protected]; [email protected]
© 2011-2013 Cloudspread. All rights reserved. The Cloudspread logo and Cloudspread are registered trademarks