Big Data Security Measures: Learning from the Antivirus Industry to Keep Data Safe

shutterstock_195687113In recent years, there have been security breaches at a number of large companies that resulted in the loss of personal data for thousands of people. All entities involved in big data – including both vendors and consumers – should be looking to create and use standard security measures to keep their data safe.

Big Data Protection Challenges

There are quite a few major challenges involved in the security of big data, not the least of which is that most current security measures are meant for the protection of small-scale, static data. Because big data comes in the millions of terabytes – as opposed to a much lower number of files saved to an individual hard drive – big data security must be quick, adaptable, and tailored towards multiple entry points. Security for big data has several areas of weakness.

Audits. If something does go wrong, businesses need to be able to determine how and why in order to improve their security. These audits should be detailed and easily scalable.

Data Mining. Customers or clients may not know what information is being gathered. With weak security, private information can be stolen, resulting in loss of both money and trust.

Data Storage. Because big data is too large to be moved manually by the IT department, a company has less control over how and where it moves. Auto-tiering can make this process much easier, but businesses should keep in mind that it requires extra security measures.

Encrypted Access. Security measures need to strike a balance between the encryption needed to keep big data safe and the need of users to access this data efficiently.

Input Validation. Collections of big data usually have millions of inputs from various access points. Any business collecting big data must ensure that all sources of input are validated and trusted.

Real-Time Monitoring. Although real-time monitoring is improving – and providing a way to see exactly what’s happening at any given moment – businesses should be aware that it can generate false positives.

Improving Security

Despite the differences between big data and the data found on a general user’s computer, cloud experts believe that the antivirus industry may hold the key to better big data security. This is not only because antivirus vendors already have experience in battling viruses and other malware, but also because they share information on threats and how to defeat them.

Businesses often depend on secrets in order to keep ahead of their competitors, but in the antivirus industry, threat data is open and allows multiple industry leaders to work on a solution. This benefits everyone who uses a computer, no matter what antivirus they choose to use. Cloud experts believe that being open and seeking to share is what will enable big data security measures to be improved quickly and efficiently.

Telcos, Mobility, and Big Data: Using the IoT as a Value-Added Service

shutterstock_234153883Many businesses are learning the value of big data and mobility for improving business efficiency and customer experience. However, not much has been said about how to monetize data itself, not simply to enhance sales, but as a value-added service offering.

With the increase in smartphone users, who often use a number of apps to browse the internet, mobile network providers now have access to a large amount of data. The data reveals much about the mobile network provider’s customers, including:

  • Customer preferences
  • Smartphone application usage
  • Customer locations
  • Items and services customers may be looking for

As mobile and Internet of Things (IoT) devices increasingly allow customers to look up information no matter where they are, more and more data is generated. Telecom companies, many of whom maintain a mentality of network services exclusively, may not realize that the data already being collected and stored for use in improving a Telco’s services, can be useful to third-party partners.

Search engines and social media platforms are currently using collected data to personalize advertisements to their users. Using the same techniques, telcos can easily do this as well, a strategy that would benefit both telcos and their partners. This can then lead to the ability to provide the full management of their partners’ IoT or Mobile to Mobile (M2M) requirements.

Every machine that connects to the internet will need a method of collection, processing, and storage of data. This is a list that can include not only smartphones, but also:

  • Home appliances
  • Wearable devices, such as smart watches
  • Smart meters
  • Apps
  • Home management systems

Telcos can even sell this service to new businesses who are just entering the IoT field, or sell the systems that will allow the new business to monetize their traffic on their own. While the initial investment in business and data systems may seem high, telcos may find that it pays off in the future, especially as the IoT continues to grow and expand.

While low-cost connectivity may be important to customers, it also isn’t likely to generate high revenues. By also offering value-added services that harness the mobility and power of the IoT, telcos will continue to maintain their competitive edge. Some telcos are already beginning to do this by teaming up with:

  • Fleet management, which uses location data
  • Medical monitoring
  • Connected car services
  • Energy utilities

In the future telcos may also need to partner up with competitors, to expand the telco’s regional coverage. This will help to bring in the international market, which is currently struggling with having to work with multiple companies in multiple different markets.

By harnessing the mobility of the IoT, and data already being generated by smart device users, telcos can continue to grow and expand their business.