What if you deployed technology to discover which of your employees was disgruntled and posed a potential security threat to your organization?
As the CIO thus far you have deployed Big Data applications and implementations you give you competitive insights and market advantages but have you considered the potential security benefits to internal operational Big Data deployments?
IBM surely has and they have announced a new security tool that uses Big Data to help CIOs and other senior IT professionals the ability to detect internal and external security threats in innovative new ways.
For example, Sandy Bird, CTO of IBM’s security systems division told the Wall Street Journal that this the Big Data tool can be configured to scan email and social media activities from all employees to flag apparently “disgruntled” employees who might be inclined to reveal company secrets.
The new Big Data Security tool is called IBM Security Intelligence with Big Data, is able to process decades worth of emails, financial transactions and website traffic, to detect patterns of security threats and fraud. The tool is based on Hadoop, a framework that processes data-intensive queries across clusters of computers.
Each day, organizations and individuals create nearly 2.5 quintillion bytes of data. This data generation rate produces so much data that nearly 90% of the data in the world today has been created in the last two years alone.
This data for example comes from devices such as sensors used to gather climate information, posts to social media sites, digital pictures and videos, purchase-transaction records, and cell phone GPS signals.
At the World Economic Forum last month in Davos, Switzerland, Big Data was a leading topic. A report by the forum, “Big Data, Big Impact,” declared data a new class of economic asset, like currency or gold.
Data is not only growing more rapidly than ever before but it is also more processable by computers. Most of the Big Data that is produced today is known as unstructured data. Examples include the words, images and video on the Web and those streams of sensor data. Many of these data streams are known as BLOB or ( Binary Large Objects) and do not easily fit in traditional database management systems for processing.They require a special set of tools for filtering, processing, and loading. The typical data ETL process ( Extraction, Transformation, Load ) is now supplemented with super Big Data tools. Many of these tools are now available in the Open Source world. The problem is many organizations do not know how to leverage them.
The Big Data security tool also helps companies protect against hacker attacks and fraud by allowing security personnel to look for patterns in past attacks — like the time or location of attempted intrusions, and the applications that have been targeted.
The capacity of the enterprise to mesh with its physical and social environment, will become increasingly vital for its survival in the future. Without such a grounded relationship, poor decision making based on an inwardly focused mindset will continue to drive many large enterprises to bankruptcy.
As corporate fears about data leakage and hacker attacks rise, CIOs are being called on to quickly defend against intrusions of increasing sophistication. This new tool from IBM will surely help in those efforts.
The ultimate goal was best expressed by former President George Bush, better, faster information and intelligence on digital evil doers.
Published by myCIOview.com