1. Market Research
  2. > Software Market Trends
  3. > Toward Data-Centric Security for Big Data

Toward Data-Centric Security for Big Data

  • September 2014
  • -
  • Frost & Sullivan
  • -
  • 11 pages

This week’s SPIE will expand the reader’s understanding of Big Data security issues, and introduce new data-centric approaches from vendors who are focused on resolving those issues.

Introduction
Like the steam engine, the automobile, the computer, and every other technology that has definitively altered modern life, Big Data and analytics (BDA) is beginning to change the way people and organizations function. Rarely, however, are the most important aspects of technology-driven change quick or obvious. More often, there are long, gradual trajectories of adoption, punctuated by step changes, setbacks, interruptions, and detours.

At the present time, Big Data’s unfulfilled potential benefits are beginning to collide with new security threats, and with legacy data protection policies that have not been updated, or even examined, in many years. People and organizations are approaching this messy intersection from different directions, and they arrive with different degrees of knowledge and different expectations.

Marketers, researchers and technology solution providers see BDA opportunities to apply more and better data, along with more and better analytics, to their various tasks, projects and products. Privacy activists and security experts view with alarm the growing availability of data for sale, along with the increasing sophistication, duration, and frequency of massive data breaches. Ordinary people are relatively ignorant of the ways in which BDA applications are already infiltrating modern life, and relatively unconcerned about its impacts. Mainstream enterprises are enthusiastic about BDA’s commercial potential, but they are also waking up to the additional security implications that accompany Big Data’s distributed architectures, as well as the additional attack vectors that are exposed as more endpoints and end users are empowered to access and utilize sensitive data.

Table Of Contents

Toward Data-Centric Security for Big Data
Introduction
A Brief History of Data Access
Big Data Begs Big Questions
Securing Big Data Implementations
What to Do?
Stratecast - The Last Word
About Stratecast
About Frost and Sullivan

View This Report »

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 24 Million searchable statistics with tables, figures & datasets
  • More than 10,000 trusted sources
24/7 Customer Support

Talk to Amrita

+1 718 303 2019

Purchase Reports From Reputable Market Research Publishers
2016 North American Mobile Enterprise Applications

2016 North American Mobile Enterprise Applications

  • $ 10000
  • Industry report
  • October 2016
  • by Frost & Sullivan

Opportunities within Enterprises The overall research objective was to measure the current use and future decision-making behavior toward mobile enterprise applications, including some specific focus on ...

The Analytics software systems: worldwide forecast 2016–2020

The Analytics software systems: worldwide forecast 2016–2020

  • $ 7999
  • Industry report
  • October 2016
  • by Analysys Mason

This report provides forecasts for communications service provider (CSP) spending on telecoms-specific analytics software systems. It provides details of how spending will vary by delivery type, service ...

The Analytics software systems: worldwide market shares 2015

The Analytics software systems: worldwide market shares 2015

  • $ 7999
  • Industry report
  • September 2016
  • by Analysys Mason

"The telecoms industry is increasing its spending on analytics software systems, but not to the extent that we predicted last year." This report assesses which vendors are leading in the analytics software ...


ref:plp2014

Reportlinker.com © Copyright 2016. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.