SlideShare uma empresa Scribd logo
1 de 13
Big Data is on a Collision Course
       with Your Network
          Are you Ready?




 Intelligent Access and Monitoring
 Architecture Solutions
                         Net Optics Confidential and Proprietary
Agenda

•   What is Big Data?
•   The State of Big Data
•   Strategic Goals
•   New Insights – Security
•   Big Data Implementation (lite)
•   Impact on the Organization




                                     2
Defining Big Data



   Rapid
  Capture



  Large
 Volumes



 Structured/
Unstructured



  Analysis




                    3
State of Big Data
                       Facebook
                      Users Share
                        684,478
                       Pieces of
                        Content             Instagram
      Twitter Users
                                           Users Share
       Send over
                                            3,600 New
     100,00 Tweets
                                              Photos



                                                   Brands &
Email Users            Every                     Organizations
   Send
204,166,667           Minute of                  on Facebook              $53.4B
                      the Day                      Receive
  Emails
                                                 34,722 Likes


                                                                 $48.0B

                                                     $32.1B
    Big Data Market Forecast            $16.8B
                                  $10.2B
                                                                                   4
                                    2013      2014       2015     2016      2017
Big Data – the New Insights



Current uses for Big Data
 •   Recommendation Engines
 •   Sentiment Analysis
 •   Fraud Detection
 •   Risk Modeling
 •   Customer Experience Analytics
 •   Marketing Campaign Analysis
 •   Customer Churn Analysis




                                     5
More Than Just Consumer/Marketing Insight

      JP Morgan Chase & Co.
      Fraud Detection


      Treato
      Treatment
      Recomendations

      Human Genome Project
      Reduced from 13 Years to
      7 Days




                                            6
Instrumentation and Sensor Data

              Smart Meters

                                    Video Recorders

     Population
                             Temperature
      Statistics
                               Sensors


                                       Facility Data

          Traffic Patterns

                               Cargo Loads
                                                       7
As Network Security Tool




The growing complexity
and variability of the IT
infrastructure poses an
ever increasing challenge
to administrators to have a
full understanding of
what’s happening in their
network.

                              8
Big Data Network Design Considerations

Big Data Components
Two main building blocks are being added to
the enterprise stack to accommodate big data:
•   Hadoop: Provides storage capability
    through a distributed, shared-nothing file
    system, and analysis capability through
    MapReduce


•   NoSQL: Provides the capability to capture,
    read, and update, in real time, the large
    influx of unstructured data and data without
    schemas; examples include click streams,
    social media, log files, event data, mobility
    trends, and sensor and machine data




                                                                                                                             9
                          Source: http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9670/white_paper_c11-690561.html
Monitoring the Network


                                            IDS




                                            IPS




                                       Data Recorder




                                         Analyzer
                         Aggregation
                           Filtering
                            Load
                          Balancing




                                                    10
Requires New Skills

                      The IT organization should challenge
                      itself to understand the new business
                      use cases that will require their
                      support and input to develop
                      effective Big Data solutions.




                                                        11
Key Take-Aways

• Big Data is more than
  marketing data
• Represents a significant new
  area for IT to provide value
• Impact on the organization will
  be more than network
  infrastructure




                                    12
Wrap Up

• To sign up for our newsletter:
                                                              References:
                                                              • http://blog.varonis.com/big-data-security/
                                                              • http://wikibon.org/blog/taming-big-data/
                                                              • http://www.cisco.com/en/US/prod/collateral/switches/ps9441
 http://gurl.im/c2681zX                                         /ps9670/white_paper_c11-690561.html
                                                              • http://www.networkworld.com/news/2012/030712-big-data-
                                                                invaders-257048.html
• Thank you                                                   • http://www.splunk.com/page/securelink/signup/Splunk_Big_
                                                                Data_and_the_Future_of_Security
                                                              • http://www.iansresearch.com/research/security-
                                                                operations/vulnerability-threat-management/ians-trends-
                                                                behavioral-approach-threat-
                                                              • http://www.gartner.com/it/page.jsp?id=1731916
                                                              • http://lippisreport.com/2012/04/the-critical-role-of-the-
                                                                network-in-big-data-applications/




                                              Net Optics, Inc.
                                              www.netoptics.com
                                              408.737.7777


                                                                                                                     13
                              Net Optics Confidential and Proprietary                                          13

Mais conteúdo relacionado

Mais procurados

ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, security
Roman Chanclor
 
SplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunkLive! Splunk for Security
SplunkLive! Splunk for Security
Splunk
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 

Mais procurados (20)

ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, security
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
 
Idiro Analytics - Identifying Families using Social Network Analysis and Big ...
Idiro Analytics - Identifying Families using Social Network Analysis and Big ...Idiro Analytics - Identifying Families using Social Network Analysis and Big ...
Idiro Analytics - Identifying Families using Social Network Analysis and Big ...
 
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use Case
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
 
What is Differential Privacy?
What is Differential Privacy?What is Differential Privacy?
What is Differential Privacy?
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security Issues
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
Big Data (security Issue)
Big Data (security Issue)Big Data (security Issue)
Big Data (security Issue)
 
Splunk for Security Workshop
Splunk for Security WorkshopSplunk for Security Workshop
Splunk for Security Workshop
 
Security bigdata
Security bigdataSecurity bigdata
Security bigdata
 
Hacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected DataHacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected Data
 
Securing data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYCSecuring data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYC
 
IDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPRIDC on 10 myths regarding GDPR
IDC on 10 myths regarding GDPR
 
Enterprise Security featuring UBA
Enterprise Security featuring UBAEnterprise Security featuring UBA
Enterprise Security featuring UBA
 
SplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunkLive! Splunk for Security
SplunkLive! Splunk for Security
 
Phil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of viewPhil Carter of IDC: An analyst point of view
Phil Carter of IDC: An analyst point of view
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
 

Destaque

Destaque (6)

Infographic: Aim Straight at Your Application Performance Issues
Infographic: Aim Straight at Your Application Performance IssuesInfographic: Aim Straight at Your Application Performance Issues
Infographic: Aim Straight at Your Application Performance Issues
 
Diana pa oferta_de_servicios__bmp
Diana pa oferta_de_servicios__bmpDiana pa oferta_de_servicios__bmp
Diana pa oferta_de_servicios__bmp
 
Tap Into the Health of Your Network
Tap Into the Health of Your NetworkTap Into the Health of Your Network
Tap Into the Health of Your Network
 
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
 
Antarctica unit 3
Antarctica unit 3Antarctica unit 3
Antarctica unit 3
 
Antartctica unit 2
Antartctica unit 2Antartctica unit 2
Antartctica unit 2
 

Semelhante a Big Data is on a Collision Course With Your Network - Are You Ready?

Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
Ulf Mattsson
 
Kim Escherich - How Big Data Transforms Our World
Kim Escherich - How Big Data Transforms Our WorldKim Escherich - How Big Data Transforms Our World
Kim Escherich - How Big Data Transforms Our World
BigDataViz
 
OpTier McKinsey Big Data Overview
OpTier McKinsey Big Data OverviewOpTier McKinsey Big Data Overview
OpTier McKinsey Big Data Overview
nickychu
 
McKinsey Big Data Overview
McKinsey Big Data OverviewMcKinsey Big Data Overview
McKinsey Big Data Overview
optier
 
McKinsey Big Data Overview
McKinsey Big Data OverviewMcKinsey Big Data Overview
McKinsey Big Data Overview
optier
 
Intel Cloud summit: Big Data by Nick Knupffer
Intel Cloud summit: Big Data by Nick KnupfferIntel Cloud summit: Big Data by Nick Knupffer
Intel Cloud summit: Big Data by Nick Knupffer
IntelAPAC
 
final oracle presentation
final oracle presentationfinal oracle presentation
final oracle presentation
Priyesh Patel
 

Semelhante a Big Data is on a Collision Course With Your Network - Are You Ready? (20)

IoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use CasesIoT - Data Management Trends, Best Practices, & Use Cases
IoT - Data Management Trends, Best Practices, & Use Cases
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
Big Data: The Main Pillar of Technology Disruption
Big Data: The Main Pillar of Technology DisruptionBig Data: The Main Pillar of Technology Disruption
Big Data: The Main Pillar of Technology Disruption
 
Kim Escherich - How Big Data Transforms Our World
Kim Escherich - How Big Data Transforms Our WorldKim Escherich - How Big Data Transforms Our World
Kim Escherich - How Big Data Transforms Our World
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and Planning
 
Applying Big Data
Applying Big DataApplying Big Data
Applying Big Data
 
Big Data - Insights & Challenges
Big Data - Insights & ChallengesBig Data - Insights & Challenges
Big Data - Insights & Challenges
 
Let's make money from big data!
Let's make money from big data! Let's make money from big data!
Let's make money from big data!
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protection
 
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty ComputationISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
ISC2 Privacy-Preserving Analytics and Secure Multiparty Computation
 
Identifying the new frontier of big data as an enabler for T&T industries: Re...
Identifying the new frontier of big data as an enabler for T&T industries: Re...Identifying the new frontier of big data as an enabler for T&T industries: Re...
Identifying the new frontier of big data as an enabler for T&T industries: Re...
 
Ab cs of big data
Ab cs of big dataAb cs of big data
Ab cs of big data
 
OpTier McKinsey Big Data Overview
OpTier McKinsey Big Data OverviewOpTier McKinsey Big Data Overview
OpTier McKinsey Big Data Overview
 
McKinsey Big Data Overview
McKinsey Big Data OverviewMcKinsey Big Data Overview
McKinsey Big Data Overview
 
McKinsey Big Data Overview
McKinsey Big Data OverviewMcKinsey Big Data Overview
McKinsey Big Data Overview
 
Intel Cloud summit: Big Data by Nick Knupffer
Intel Cloud summit: Big Data by Nick KnupfferIntel Cloud summit: Big Data by Nick Knupffer
Intel Cloud summit: Big Data by Nick Knupffer
 
final oracle presentation
final oracle presentationfinal oracle presentation
final oracle presentation
 
Fixing data science & Accelerating Artificial Super Intelligence Development
 Fixing data science & Accelerating Artificial Super Intelligence Development Fixing data science & Accelerating Artificial Super Intelligence Development
Fixing data science & Accelerating Artificial Super Intelligence Development
 
What is the future of data strategy?
What is the future of data strategy?What is the future of data strategy?
What is the future of data strategy?
 

Mais de LiveAction Next Generation Network Management Software

Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
LiveAction Next Generation Network Management Software
 
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
LiveAction Next Generation Network Management Software
 

Mais de LiveAction Next Generation Network Management Software (20)

VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
 
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
 
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
 
Cisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution BriefCisco1000v Net Optics Solution Brief
Cisco1000v Net Optics Solution Brief
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
Leveraging vSphere 5.0 For Optimal Visibility and EfficiencyLeveraging vSphere 5.0 For Optimal Visibility and Efficiency
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
 
Security-Centric Networking
Security-Centric NetworkingSecurity-Centric Networking
Security-Centric Networking
 
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring SwitchOverview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
The Secret to Surviving the Network Deluge
The Secret to Surviving the Network DelugeThe Secret to Surviving the Network Deluge
The Secret to Surviving the Network Deluge
 
Net Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case StudyNet Optics' Virtualization Solutions Deployment Case Study
Net Optics' Virtualization Solutions Deployment Case Study
 
Lawful Interception in Virtual Environments
Lawful Interception in Virtual EnvironmentsLawful Interception in Virtual Environments
Lawful Interception in Virtual Environments
 
High-Availability Security Monitoring Using Bypass Switches
High-Availability Security Monitoring Using Bypass SwitchesHigh-Availability Security Monitoring Using Bypass Switches
High-Availability Security Monitoring Using Bypass Switches
 
What is a virtual tap?
What is a virtual tap?What is a virtual tap?
What is a virtual tap?
 
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
 
Compliance Challenges in a Virtualized Environment
Compliance Challenges in a Virtualized EnvironmentCompliance Challenges in a Virtualized Environment
Compliance Challenges in a Virtualized Environment
 
Network Security in a Virtualized Environment
Network Security in a Virtualized EnvironmentNetwork Security in a Virtualized Environment
Network Security in a Virtualized Environment
 
Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...
Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...
Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Big Data is on a Collision Course With Your Network - Are You Ready?

  • 1. Big Data is on a Collision Course with Your Network Are you Ready? Intelligent Access and Monitoring Architecture Solutions Net Optics Confidential and Proprietary
  • 2. Agenda • What is Big Data? • The State of Big Data • Strategic Goals • New Insights – Security • Big Data Implementation (lite) • Impact on the Organization 2
  • 3. Defining Big Data Rapid Capture Large Volumes Structured/ Unstructured Analysis 3
  • 4. State of Big Data Facebook Users Share 684,478 Pieces of Content Instagram Twitter Users Users Share Send over 3,600 New 100,00 Tweets Photos Brands & Email Users Every Organizations Send 204,166,667 Minute of on Facebook $53.4B the Day Receive Emails 34,722 Likes $48.0B $32.1B Big Data Market Forecast $16.8B $10.2B 4 2013 2014 2015 2016 2017
  • 5. Big Data – the New Insights Current uses for Big Data • Recommendation Engines • Sentiment Analysis • Fraud Detection • Risk Modeling • Customer Experience Analytics • Marketing Campaign Analysis • Customer Churn Analysis 5
  • 6. More Than Just Consumer/Marketing Insight JP Morgan Chase & Co. Fraud Detection Treato Treatment Recomendations Human Genome Project Reduced from 13 Years to 7 Days 6
  • 7. Instrumentation and Sensor Data Smart Meters Video Recorders Population Temperature Statistics Sensors Facility Data Traffic Patterns Cargo Loads 7
  • 8. As Network Security Tool The growing complexity and variability of the IT infrastructure poses an ever increasing challenge to administrators to have a full understanding of what’s happening in their network. 8
  • 9. Big Data Network Design Considerations Big Data Components Two main building blocks are being added to the enterprise stack to accommodate big data: • Hadoop: Provides storage capability through a distributed, shared-nothing file system, and analysis capability through MapReduce • NoSQL: Provides the capability to capture, read, and update, in real time, the large influx of unstructured data and data without schemas; examples include click streams, social media, log files, event data, mobility trends, and sensor and machine data 9 Source: http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9670/white_paper_c11-690561.html
  • 10. Monitoring the Network IDS IPS Data Recorder Analyzer Aggregation Filtering Load Balancing 10
  • 11. Requires New Skills The IT organization should challenge itself to understand the new business use cases that will require their support and input to develop effective Big Data solutions. 11
  • 12. Key Take-Aways • Big Data is more than marketing data • Represents a significant new area for IT to provide value • Impact on the organization will be more than network infrastructure 12
  • 13. Wrap Up • To sign up for our newsletter: References: • http://blog.varonis.com/big-data-security/ • http://wikibon.org/blog/taming-big-data/ • http://www.cisco.com/en/US/prod/collateral/switches/ps9441 http://gurl.im/c2681zX /ps9670/white_paper_c11-690561.html • http://www.networkworld.com/news/2012/030712-big-data- invaders-257048.html • Thank you • http://www.splunk.com/page/securelink/signup/Splunk_Big_ Data_and_the_Future_of_Security • http://www.iansresearch.com/research/security- operations/vulnerability-threat-management/ians-trends- behavioral-approach-threat- • http://www.gartner.com/it/page.jsp?id=1731916 • http://lippisreport.com/2012/04/the-critical-role-of-the- network-in-big-data-applications/ Net Optics, Inc. www.netoptics.com 408.737.7777 13 Net Optics Confidential and Proprietary 13

Notas do Editor

  1. Question:Do you feel Big Data should be a priority for your organization?YesNoAt the same InfoSecurity 2012 Conference, over two thirds of respondents felt that Big Data is or will be a priority for their organizations within the next 3 years
  2. Question: What is or would be your top use case for Big Data?Marketing AnalysisCustomer Experience AnalyticsFraud DetectionSecurity AnalysisOtherIn another survey of network professionals, the number one use case they’d like to use Big Data for is to find and track down sensitive data in their organization
  3. Question – Do you believe Big Data can enhance data security?YesNoOnly 54% knew that big data had data security implications
  4. Have you personally engaged in any formal training regarding Big DataYesNoThere’s still time, while we’ve shown a few Big Data success stories during this presentation it’s important to keep in mind that there is still time since most Big Data implementations can be thought of as exploratory.