Welcome!

Java IoT Authors: Yeshim Deniz, Zakia Bouachraoui, Pat Romanski, Liz McMillan, Elizabeth White

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Microsoft Cloud, Containers Expo Blog, Cloud Security

@CloudExpo: Article

Size Doesn't Matter. Controlling Big Data Through Cloud Security

Beyond the buzzword: It's about complexity, variety, velocity and, yes, volume

There’s data. And then there’s BIG DATA. Many of us have been bombarded with the term in many frameworks. There are some professionals that chalk it up to marketing hype or meaningless buzzword. Personally, I prefer the way Gartner categorizes it. That it is more than size. It is a multi-dimensional model that includes complexity, variety, velocity and, yes, volume.

But the pressing issue with this definition of Big Data is how best to secure something so vast and multifaceted. If you recognize the old concept of a network perimeter is antiquated and dangerously narrow, there should be some concern as to corralling all this data and ensuring its transit and storage is protected. The latter issue speaks directly to compliance needs. Banks and other financial institutions, medical facilities, insurance, retailers and government entities are especially sensitive to the compliance requirements. However, if your business doesn’t fit into these verticals doesn’t mean you can’t directly benefit from cloud computing based security that creates the necessary context. And though your organization is dealing with an incredible mountain of data, you still must do what you can to ensure not only the proprietary intelligence behind your firewalls, but all the data trafficking in, around and through all various endpoints throughout the enterprise.

But again, size should not be the only consideration regarding Big Data. It is the means by which you analyze and apply various processes that allow you to make the best decisions possible about the ongoing security, accessibility and viability of all those many bits and bytes.

If you are looking at scale the McKinsey Global Institute estimates that “enterprises globally stored more than 7 exabytes of new data on disk drives in 2010, One exabyte of data is the equivalent of more than 4,000 times the information stored in the US Library of Congress. That’s a lot of data.

Storing is one thing, but analyzing and managing all the data into useful strategic and tactical outcomes now depends on the other elements of Big Data (complexity, variety, velocity). To do this successfully you have to have a means to put all of it into context. For instance, let’s say an account is accessed. It has the right user name/password credentialing and seeks to export some personal data or transfer funds, or change sensitive account settings. On its face you should allow this action. They have the right name and authentication. But when this is given greater context, there are dynamics from other silos of information that need to be factored. What is the device profile? URL reputation? Is the IP address consistent? When was last log in attempt? What time did this latest transaction occur? So, what seemed to be a reasonable transaction might shows patterns of anomalous behavior.

But here’s the larger issue—all these factors that play into determining true context (which I call situational awareness) may come from different sources and require a bit of juggling and cross-correlating. You have SIEM, Access Management, Log Management, and Identity Management. And they may all live on various servers in various places within the enterprise. So ensuring this process association is doable, but with so many layers and stacks, the results may take too long to take preventative measures. You know what they say about the horse having already left the barn.

By migrating security functions to the cloud (security-as-a-service) you still may run into these same issues unless you find a provider who can combine all the functionality and create the rules for cross-correlation that can normalize and sort through gargantuan amounts of data. A SIEM solution in the cloud is able to take raw data from a variety of sources, normalize it and create and manage the alerts, escalations and prevention protocols. Such a configuration takes the activity from Identity and access management silos, combines them with the silos of general traffic of web traffic, internal access, SaaS solutions and other business/consumer facing applications and generates a flexible and scalable intrusion detection matrix.

A fully-realized cloud-based SIEM deployment (which is much less expensive in the cloud, yet just as powerful as any on premise solution) can prevent an IP address in China from spoofing your customers account and create intelligence that deflects and notes if a Flame virus is being lobbed at your network. But a true cloud-based security partner worth their salt will also provide the raw data for post-capture analysis. This way you can analyze new traffic patterns, but more important create the baseline to make intelligent decisions for the long term security of your network or immediate recognitions of anomalous behavior. But all that raw data…that’s where the cloud gets you, right? You get penalized for having bigger and bigger data sets. Not if you have the right vendor. I personally know where you can get storage space for as little as $1 per gB per month. You can scale the amount and the type of data you wish to keep in the cloud. You control when it gets destroyed according to various compliance requirements. I also have some thoughts about vendors who provide the services, but require you to buy some appliance that you install and maintain on your network…but that’s a whole other blog.

The bottom line is Big Data can be managed given the right tools. And those tools do exist in the cloud and can be managed through the same. And when you have the right rules, passing though an integrated suite of security solutions you’ll begin to see that size doesn’t matter. What matters is creating a situational awareness that provides you a platform to make better decisions. And if that place is in the cloud…all the better.

More Stories By Kevin Nikkhoo

With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.

IoT & Smart Cities Stories
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Early Bird Registration Discount Expires on August 31, 2018 Conference Registration Link ▸ HERE. Pick from all 200 sessions in all 10 tracks, plus 22 Keynotes & General Sessions! Lunch is served two days. EXPIRES AUGUST 31, 2018. Ticket prices: ($1,295-Aug 31) ($1,495-Oct 31) ($1,995-Nov 12) ($2,500-Walk-in)
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.