Protect Your Assets
Showing results for 
Search instead for 
Do you mean 

Finding the needle in the enterprise security haystack

Sridhar Karnam (Sri_Karnam) ‎04-21-2014 07:59 AM - edited ‎07-07-2015 09:46 AM

image for blog 5.gifIf the "needle" is the bad guy and the "haystack" is your enterprise, how do you find the needle? Gartner analyst, Neil McDonald, suggests that you separate the hay. From a security context, Neil suggests that you look for meaningful deviations from "normal" in order to isolate where the potential anomaly could emerge.


Advanced targeted cyber-attacks have hit some of the world’s largest businesses. The attacks weren't blocked because they didn't match any known attack signature. Each one is unique--custom created to penetrate the target network and steal data.


A new video featuring Gartner Distinguished Analyst, Neil MacDonald, and HP’s Eric Schou, explains how Big Data Security Analytics can help find and block targeted cyber-attacks.


Watch it to learn: 

  • How advanced targeted cyber-attacks are different from traditional threats
  • How Big Data techniques can spot attacks when traditional defenses fall short
  • What you should be doing now to take advantage of Big Data Security Analytics

image for blog 4.gif

Eric Schou, Director of Product Marketing at HP ArcSight, says that your enterprise can be breached for up to 250 days without being detected. Even if you detect it, it can take over 24 days to respond to a data breach. It costs about $8.6 million to absolve each breach, and your enterprise loses, on an average, 30 percent of market capital for every disclosure.


Understand more about how to handle big data security and how to find the needle in the haystack here...


Find the full video here with Gartner and HP here...

About the Author


Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
January 2016
Software Expert Days - 2016
Join us online to talk directly with our Software experts during the online Expert Days - see details below. Software experts do not monitor this foru...
Read more
See board event postings
Vivit Events - 2016
Learn about upcoming Vivit webinars and live events in 2016.
Read more
View all