Security Products
Showing results for 
Search instead for 
Do you mean 

Finding the needle in the enterprise security haystack

Sridhar Karnam (Sri_Karnam) ‎04-21-2014 07:59 AM - edited ‎07-07-2015 09:46 AM

image for blog 5.gifIf the "needle" is the bad guy and the "haystack" is your enterprise, how do you find the needle? Gartner analyst, Neil McDonald, suggests that you separate the hay. From a security context, Neil suggests that you look for meaningful deviations from "normal" in order to isolate where the potential anomaly could emerge.


Advanced targeted cyber-attacks have hit some of the world’s largest businesses. The attacks weren't blocked because they didn't match any known attack signature. Each one is unique--custom created to penetrate the target network and steal data.


A new video featuring Gartner Distinguished Analyst, Neil MacDonald, and HP’s Eric Schou, explains how Big Data Security Analytics can help find and block targeted cyber-attacks.


Watch it to learn: 

  • How advanced targeted cyber-attacks are different from traditional threats
  • How Big Data techniques can spot attacks when traditional defenses fall short
  • What you should be doing now to take advantage of Big Data Security Analytics

image for blog 4.gif

Eric Schou, Director of Product Marketing at HP ArcSight, says that your enterprise can be breached for up to 250 days without being detected. Even if you detect it, it can take over 24 days to respond to a data breach. It costs about $8.6 million to absolve each breach, and your enterprise loses, on an average, 30 percent of market capital for every disclosure.


Understand more about how to handle big data security and how to find the needle in the haystack here...


Find the full video here with Gartner and HP here...

About the Author


Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.