
big data background vector illustration. Data streams. Infographic
• Complication of threat detection by distributing the points of vulnerability is also applicable in the case of big data.
• To having a secured database a company may now use dozens, each supporting more direct forms of access.
• It is difficult to distinguish between an authorized access and one that may be automated through a big data interface. Increasingly, big data is seen as the bridge that breaks the security.
In fact, a recent Frost & Sullivan survey states that IT decision makers believe that big data makes security harder with Eighty-one per cent of surveys saying they were concerned about security issues associated with big data.
However, we can’t deny the fact that big data can also be part of the solution to security issues. Considering the security threat detection and mitigation depending on analysing telemetry from the IT environment. Data on application and server activity, user access, network traffic, and use profiles all feed the security analytics eventually determines the enterprise IT environment is under attack or not. With the network becoming more complex, the number of telemetry increases and this data must be collected and analysed accordingly.