How can you secure big data in the information age?

How can you secure big data in the information age?

Organisations are collecting more information than ever — much of it now coming from an exploding range and number of devices connected via the Internet of Things

There’s no time to waste when it comes to rethinking security for big data environments. The number and breadth of data breaches continues to grow unabated, with a 40% increase in data breaches in 2016 reported by the Identity Theft Resource Centre

The IDC predicts continued double-digit growth for big data and business analytics through 2020 which will be used to handle this ever-growing amount of data.
However, some of the big data that is stored and processed will undoubtedly be sensitive and will therefore need to be protected. So there are things that need to be considered such as; are the environment and the data vulnerable to cyber threats and who has access to the data? And there’s also the issue of compliance.

Big data deployments are subject to the same compliance mandates (e.g., GDPR, HIPAA, PCI, and SOX) and require the same protection against breaches as traditional databases and their associated applications and infrastructure.

All the best practices for data security are still applicable for big data environments. The problem is how to achieve security and compliance for big data environments given the unique challenges they present.
Much of the challenge of security big data is the nature of the data itself. Consider the impact on security of the well-known three V’s of big data:

Volume
Enormous volumes of data require security solutions built to handle them. This means incredibly scalable solutions that are, at a minimum, an order of magnitude beyond that for traditional data environments.

Velocity
Your security solutions must be able to keep up with big data speeds. You’ll need to focus on data parsing and collection throughput, the degree of automation that is available, and the ability to deliver real-time visibility of policy violations and other events.

Variety
Mixing multiple sources and types of data with different access permissions compounds classification and policy-setting challenges, elevating the need for robust audit capabilities.

It’s not necessarily the associated infrastructure and technology within big data environments that make it more challenging to secure, it’s the multiplicity that dramatically increases complexity.

Share it:
Share it:

[Social9_Share class=”s9-widget-wrapper”]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

You Might Be Interested In

5 Career Paths in Big Data and Data Science, Explained

30 Oct, 2017

Sexiest job… massive shortage… blah blah blah. Are you looking to get a real handle on the career paths available …

Read more

Building IoT Data Pipelines with Python and Talend Data Streams

13 Jun, 2018

Benoît Barranco is a Customer Success Architect at Talend. He brings years of experience working with customers and partners across …

Read more

How CIOs can define software delivery through a customer lens

27 Apr, 2021

Repeat any word or phrase enough, and it can lose all meaning. For many years, the term “digital transformation” has …

Read more

Do You Want to Share Your Story?

Bring your insights on Data, Visualization, Innovation or Business Agility to our community. Let them learn from your experience.

Get the 3 STEPS

To Drive Analytics Adoption
And manage change

3-steps-to-drive-analytics-adoption

Get Access to Event Discounts

Switch your 7wData account from Subscriber to Event Discount Member by clicking the button below and get access to event discounts. Learn & Grow together with us in a more profitable way!

Get Access to Event Discounts

Create a 7wData account and get access to event discounts. Learn & Grow together with us in a more profitable way!

Don't miss Out!

Stay in touch and receive in depth articles, guides, news & commentary of all things data.