The recently published ESG research report – Threat Intelligence and its role within Enterprise Cybersecurity practices – would seem to indicate that the idea of big data security is a realistic expectation involving big data and cyber security analytics merging together.

bigstock-Big-data-concept-in-word-tag-c-49922318

There has been talk about it for some years and an interesting opinion piece by Jon Oltsik on the ESG website goes into more detail. In his article Oltsik, ESG senior principal analyst and the founder of the firm’s cybersecurity service, goes into detail about the background to the report.

He says: “As part of the threat intelligence research project, ESG surveyed 304 cybersecurity professionals working at enterprise organizations (i.e., more than 1,000 employees), and asked them which types of internal security data they regularly collect, process, and analyze today. It turns out that around 40% of enterprises collect and analyze 13 different types of cybersecurity data.”

At the top of the list:

  • 52% of enterprise organizations collect, process, and analyze endpoint forensic data.
  • 48% of enterprise organizations monitor sensitive data access and usage.
  • 46% of enterprise organizations collect, process, and analyze endpoint/server profiling data.
  • 41% of enterprise organizations collect, process, and analyze network packet capture data.

He adds: “All of this data collection, processing, and analysis seems like a good thing because, as Sun Tzu stated, ‘If you know the enemy and know yourself, you need not fear the results of a hundred battles.’ Following this advice assumes that we can turn cybersecurity data into actual knowledge, actions, and countermeasures. This is the real challenge facing the enterprise cybersecurity community.”

This idea of real-time monitoring and big data analytics is something SmartIPX do through their work with HP Enterprise, F5 and Cataleya, in particular looking at Security and VoWiFI.

As CEO Paul Tindley says: “Interconnects are all about accounting, authorisation and authentication (3*AAA), scale and capability. Risk management including security and fraud services are key elements of enabled real time decision making when processing signalling and media elements. High level network IP data flow is an information harvest and can be applied to good use for decision making.

“Enterprises tend to focus within their networks but increasingly they also have multiple ‘interconnects’ to other networks (Cloud based) and they need trusted partners and an interop model they can rely on,” he added.

As experts in cloud managed service delivery, SmartIPX provide 24*7 service and surveillance from our network operations centre (NOC) at the heart of London’s Docklands, while our network presence spans US, EU and Asia Pacific. Our voice Platform as a Service (PaaS) and Interconnect as a Service (IXaaS) leverage next generation networking options such as eSBC on demand.

Talk to us today about partnering for growth – we have decades of experience in quick and efficient delivery. We look forward to a conversation.

Share This