{"id":14970,"date":"2014-06-26T16:01:40","date_gmt":"2014-06-26T16:01:40","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2137"},"modified":"2020-02-26T10:52:18","modified_gmt":"2020-02-26T15:52:18","slug":"big-security-the-larger-canvas","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/big-security-the-larger-canvas\/14970\/","title":{"rendered":"Big Security: the larger canvas"},"content":{"rendered":"<p><em>We\u2019re proceeding with our Big Data Week, a series of posts dedicated to usage and security of larger amounts of data.<\/em><\/p>\n<p><em>Published so far:<\/em><\/p>\n<ol>\n<li><a href=\"https:\/\/business.kaspersky.com\/whats-so-big-about-big-data\/\" target=\"_blank\" rel=\"noopener nofollow\">What\u2019s so big about Big Data<\/a><\/li>\n<li><a href=\"https:\/\/business.kaspersky.com\/big-deal-when-machines-know-better\/\" target=\"_blank\" rel=\"noopener nofollow\">Big Deal: when Machines know better<\/a><\/li>\n<li><a href=\"https:\/\/business.kaspersky.com\/big-data-vs-big-fraud\/\" target=\"_blank\" rel=\"noopener nofollow\">Big Data vs. Big Fraud<\/a><\/li>\n<\/ol>\n<p><em>And it will be continued.<\/em><\/p>\n<p>Banks and financial organizations traditionally relied on <a href=\"http:\/\/en.wikipedia.org\/wiki\/Security_information_and_event_management\" target=\"_blank\" rel=\"noopener nofollow\">security information and event management (SIEM)<\/a> systems, those provided real-time analysis of security alerts generated by network hardware and applications. These systems used to work well until really Big Data arrived.<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center\">\n<\/p><p>\u00a0<\/p>\n<p>With increasing number of various detection, surveillance and monitoring systems, the amount of data they generate grows \u2013 well, \u201cwildly\u201d is perhaps the most appropriate word. For instance, last year\u2019s Computer Weekly article stated that Barclays bank\u2019s systems generated 44 billion security events monthly, estimated to be up to 65 billion by the end of the 2013. Currently there may be much more. Which makes even storing this amount of data (not saying anything about sifting it through) a problem on its own.<\/p>\n<p>And the traditional SIEM used in Barclays before proved to be useless when it had to deal with <em>\u201c<\/em>measly\u201d 500 million events. 500 million vs. 65+ billion. Quite a difference.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>SIEM proved useless when the amount of security data broke through their ceiling.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FsD9J&amp;text=SIEM+proved+useless+when+the+amount+of+security+data+broke+through+their+ceiling.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The bank <a href=\"http:\/\/www.computerweekly.com\/feature\/Information-security-is-a-big-data-issue\" target=\"_blank\" rel=\"noopener nofollow\">switched to a Big Data solution<\/a>, capable of crunching all those grandiose amounts of security events, and there was no other way. As <a href=\"https:\/\/business.kaspersky.com\/big-data-vs-big-fraud\/\" target=\"_blank\" rel=\"noopener nofollow\">mentioned in the previous post<\/a>, fraudsters learn fast and read the same books as the white-hat security and Big Data experts. In order to keep uncovering their tricks successfully the defensive \u201cmachinery\u201d must be kept up-to-date so that nothing flew under radar or slipped through the small breach in the fence. And that most likely means further investments and further increase \u2013 and a dramatic one \u2013 in the amounts of data to be handled.<\/p>\n<p>Barclays\u2019 approach is by no means unique: lots of entities use analytic tools to sift through huge amounts of data in order to detect suspicious patterns and prevent bad things from happening. Actually, we have our own system of this kind \u2013 Kaspersky Security Network that empowers our antimalware solutions, speeding up the distribution of data on new malware and cyberattacks.<\/p>\n<p>Equally common is the problem with the ever-increasing amount of data \u2013 actually it\u2019s plaguing entire IT industry today. Hence \u2013 cloud solutions, map-reduce algorithms, and, ultimately, small town-sized data centers that could use their own nuclear power plants to run.<\/p>\n<p>But having a \u201cbig picture\u201d is worth it (or at least considered so): the larger the picture, the higher the resolution and the more details (patterns and relations either) become visible. Including those related to cybercrime and fraud.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>Paradox or not, Big Data allows more details to show through.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FsD9J&amp;text=Paradox+or+not%2C+Big+Data+allows+more+details+to+show+through.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>A successful fraudulent transaction may cost the bank much, much more than heavy investments into Big Data-based security systems.<\/p>\n<p>Securing the Big Data itself, however, is another challenge. We\u2019ll talk about it in the next post. Stay tuned!<\/p>\n<p style=\"text-align: center\"><strong>Big Data Week<\/strong><\/p>\n<p style=\"text-align: center\"><em><a href=\"https:\/\/business.kaspersky.com\/big-data-vs-big-fraud\/\" target=\"_blank\" rel=\"noopener nofollow\">&lt;&lt; Previous post<\/a>\u00a0| <a href=\"https:\/\/business.kaspersky.com\/in-the-age-of-big-data-risks-are-big-too\/\" target=\"_blank\" rel=\"noopener nofollow\">Next Post &gt;&gt;<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Big Data is widely used for security purposes, especially in the banking sphere. However, the amount of security-related data causes an issue of its own.<\/p>\n","protected":false},"author":209,"featured_media":15850,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[1042,2121,93,189,2120],"class_list":{"0":"post-14970","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-big-data","10":"tag-big-data-storage","11":"tag-cybercriminals","12":"tag-data-security","13":"tag-information-security"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/big-security-the-larger-canvas\/14970\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/big-security-the-larger-canvas\/14970\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/big-security-the-larger-canvas\/14970\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/big-data\/","name":"big data"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=14970"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14970\/revisions"}],"predecessor-version":[{"id":33201,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14970\/revisions\/33201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15850"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=14970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=14970"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=14970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}