Forbes’ Dan Woods explains the future of Big Data Security Analytics world and how new approaches and vendors, e.g Fortscale, will assist in identifying new threats in the enterprise. “Fortscale monitors logs from networks and other security sensors or applications to allow security teams to establish normal behavior by automatic profiling of users’ behavior and their access to resources. Clustering and comparison of users to their peers assist in understating what is a normal configuration or activity of a user and what is not”.
The modern practice of cyber-security is now powered by data analysis. As a result, the quality of security will be determined by the volume and quality of the data collected about your environment, and the ability to uncover threats.
One fascinating implication is that a raft of technology that can collect and analyze data about a computing environment is now relevant to the practice of security. There are now a huge number of choices of technology that can be the eyes and ears of your cyber security portfolio.
So many of these options are appearing that CIOs and CSOs will clearly have to choose among them. The question I will address in this article is: How can you choose the right eyes and ears that will help make your company safer? Read more.