1. Market Research
  2. > Toward Data-Centric Security for Big Data

Toward Data-Centric Security for Big Data

  • September 2014
  • -
  • Frost & Sullivan
  • -
  • 11 pages

This week’s SPIE will expand the reader’s understanding of Big Data security issues, and introduce new data-centric approaches from vendors who are focused on resolving those issues.

Introduction
Like the steam engine, the automobile, the computer, and every other technology that has definitively altered modern life, Big Data and analytics (BDA) is beginning to change the way people and organizations function. Rarely, however, are the most important aspects of technology-driven change quick or obvious. More often, there are long, gradual trajectories of adoption, punctuated by step changes, setbacks, interruptions, and detours.

At the present time, Big Data’s unfulfilled potential benefits are beginning to collide with new security threats, and with legacy data protection policies that have not been updated, or even examined, in many years. People and organizations are approaching this messy intersection from different directions, and they arrive with different degrees of knowledge and different expectations.

Marketers, researchers and technology solution providers see BDA opportunities to apply more and better data, along with more and better analytics, to their various tasks, projects and products. Privacy activists and security experts view with alarm the growing availability of data for sale, along with the increasing sophistication, duration, and frequency of massive data breaches. Ordinary people are relatively ignorant of the ways in which BDA applications are already infiltrating modern life, and relatively unconcerned about its impacts. Mainstream enterprises are enthusiastic about BDA’s commercial potential, but they are also waking up to the additional security implications that accompany Big Data’s distributed architectures, as well as the additional attack vectors that are exposed as more endpoints and end users are empowered to access and utilize sensitive data.

Table Of Contents

Toward Data-Centric Security for Big Data
Introduction
A Brief History of Data Access
Big Data Begs Big Questions
Securing Big Data Implementations
What to Do?
Stratecast - The Last Word
About Stratecast
About Frost and Sullivan

View This Report »

Get Industry Insights. Simply.

  • Latest reports & slideshows with insights from top research analysts
  • 24 Million searchable statistics with tables, figures & datasets
  • More than 10,000 trusted sources
24/7 Customer Support

Talk to Amrita

+1 718 303 2019

ref:plp2014

Reportlinker.com © Copyright 2017. All rights reserved.

ReportLinker simplifies how Analysts and Decision Makers get industry data for their business.