TMCnet News

Toward Data-Centric Security for Big Data
[October 01, 2014]

Toward Data-Centric Security for Big Data


(M2 PressWIRE Via Acquire Media NewsEdge) Dublin - Research and Markets (http://www.researchandmarkets.com/research/cv44nq/toward) has announced the addition of the "Toward Data-Centric Security for Big Data " report to their offering.



Like the steam engine, the automobile, the computer, and every other technology that has definitively altered modern life, Big Data and analytics (BDA) is beginning to change the way people and organizations function. Rarely, however, are the most important aspects of technology-driven change quick or obvious. More often, there are long, gradual trajectories of adoption, punctuated by step changes, setbacks, interruptions, and detours.

At the present time, Big Data's unfulfilled potential benefits are beginning to collide with new security threats, and with legacy data protection policies that have not been updated, or even examined, in many years. People and organizations are approaching this messy intersection from different directions, and they arrive with different degrees of knowledge and different expectations.


Marketers, researchers and technology solution providers see BDA opportunities to apply more and better data, along with more and better analytics, to their various tasks, projects and products. Privacy activists and security experts view with alarm the growing availability of data for sale, along with the increasing sophistication, duration, and frequency of massive data breaches. Ordinary people are relatively ignorant of the ways in which BDA applications are already infiltrating modern life, and relatively unconcerned about its impacts.

Mainstream enterprises are enthusiastic about BDA's commercial potential, but they are also waking up to the additional security implications that accompany Big Data's distributed architectures, as well as the additional attack vectors that are exposed as more endpoints and end users are empowered to access and utilize sensitive data.

Key Topics Covered: 1. Introduction 2. A Brief History of Data Access 3. Big Data Begs Big Questions 4. Securing Big Data Implementations 5. What to Do? For more information visit http://www.researchandmarkets.com/research/cv44nq/toward CONTACT: Research and Markets, Laura Wood, Senior Manager.

[email protected] Fax from USA: 646-607-1907 Fax from rest of the world: +353-1-481-1716 Sector: IT Security (http://www.researchandmarkets.com/categories.asp?cat_id=42&campaign_id=cv44nq), Storage (http://www.researchandmarkets.com/categories.asp?cat_id=130&campaign_id=cv44nq) .

(c) 2014 M2 COMMUNICATIONS

[ Back To TMCnet.com's Homepage ]