Big Data Security Measures: Learning from the Antivirus Industry to Keep Data Safe

shutterstock_195687113In recent years, there have been security breaches at a number of large companies that resulted in the loss of personal data for thousands of people. All entities involved in big data – including both vendors and consumers – should be looking to create and use standard security measures to keep their data safe.

Big Data Protection Challenges

There are quite a few major challenges involved in the security of big data, not the least of which is that most current security measures are meant for the protection of small-scale, static data. Because big data comes in the millions of terabytes – as opposed to a much lower number of files saved to an individual hard drive – big data security must be quick, adaptable, and tailored towards multiple entry points. Security for big data has several areas of weakness.

Audits. If something does go wrong, businesses need to be able to determine how and why in order to improve their security. These audits should be detailed and easily scalable.

Data Mining. Customers or clients may not know what information is being gathered. With weak security, private information can be stolen, resulting in loss of both money and trust.

Data Storage. Because big data is too large to be moved manually by the IT department, a company has less control over how and where it moves. Auto-tiering can make this process much easier, but businesses should keep in mind that it requires extra security measures.

Encrypted Access. Security measures need to strike a balance between the encryption needed to keep big data safe and the need of users to access this data efficiently.

Input Validation. Collections of big data usually have millions of inputs from various access points. Any business collecting big data must ensure that all sources of input are validated and trusted.

Real-Time Monitoring. Although real-time monitoring is improving – and providing a way to see exactly what’s happening at any given moment – businesses should be aware that it can generate false positives.

Improving Security

Despite the differences between big data and the data found on a general user’s computer, cloud experts believe that the antivirus industry may hold the key to better big data security. This is not only because antivirus vendors already have experience in battling viruses and other malware, but also because they share information on threats and how to defeat them.

Businesses often depend on secrets in order to keep ahead of their competitors, but in the antivirus industry, threat data is open and allows multiple industry leaders to work on a solution. This benefits everyone who uses a computer, no matter what antivirus they choose to use. Cloud experts believe that being open and seeking to share is what will enable big data security measures to be improved quickly and efficiently.

Security Breaches: How DLP and DAM Help Keep Critical Data Secure

shutterstock_147262505With the current focus on detection and malware, many companies may be overlooking core data security as a front-line defense. While it’s important to prevent intrusion through detection tools, a safer and more balanced approach to security is to also focus on complementary protection solutions Data Loss Prevention (DLP) and Data Activity Monitoring (DAM).

Data Loss Prevention

DLP focuses on the effect of end users on security by ensuring that users cannot send critical data outside of the network. When DLP was becoming popular in 2009, many in the security industry thought it would be a single-step solution to securing data. However, it became apparent that DLP was not enough on its own and that it should be combined with DAM.

 

Data Activity Monitoring

While similar to DLP, DAM focuses on data that is moving through the system. This can include end users but also encompasses privileged users, access, applications, and usage. More importantly, DAM monitors and sends out alerts for suspicious activity and blocks this activity and/or the users responsible for it, halting any unauthorized access.

 
Using Both Technologies

Businesses will have better data security from the inside out by using both solutions as a complement to each other. This is especially important as current technology trends are moving more and more towards the use of the cloud, mobile data, and a mobile workforce. Because many DLP solutions haven’t improved at the same rate as these trends, DAM should be used concurrently to allow real-time monitoring of sensitive data all over the system and network.

Keeping up With the Trends

Technology is constantly growing and evolving on both sides of the security fence. A business should ensure that its security solution is current with the latest security techniques and compatible with DAM. When looking for DAM software, businesses should consider the following questions:

  • Is the DAM up to date with the latest trends?
  • Can it work in real time?
  • Can it be easily deployed?

DLP and DAM are best used together to provide a broader area of protection through the use of monitoring, alerts, and the ability to block suspicious users or activities. By knowing and keeping up with current trends and focusing on the security of core data, businesses will ensure their data is kept safe.