{"id":2145,"date":"2019-12-19T02:57:44","date_gmt":"2019-12-18T23:57:44","guid":{"rendered":"http:\/\/kusuaks7\/?p=1750"},"modified":"2024-02-06T14:42:01","modified_gmt":"2024-02-06T14:42:01","slug":"protecting-big-data-and-the-need-for-data-centric-security","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/protecting-big-data-and-the-need-for-data-centric-security\/","title":{"rendered":"Protecting Big Data and the need for Data Centric Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2145\" class=\"elementor elementor-2145\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-7292f43c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7292f43c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-28693b4c\" data-id=\"28693b4c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-48c5ba3b elementor-widget elementor-widget-text-editor\" data-id=\"48c5ba3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAs most are aware, Big Data Analytics can be incredibly insightful and valuable to any enterprise. What some are not aware of is every new data stream created is potentially a new attack vector for organizations to defend against. Historically, organizations have had to choose between security or analytics, but with the advent of strict data privacy and protection regulations, the choice has been removed out of the equation. So, with security now the priority, is it possible for businesses to get security right without data analytics suffering?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dcf88d8 elementor-widget elementor-widget-heading\" data-id=\"dcf88d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>Data Today<\/strong><\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aeb1974 elementor-widget elementor-widget-text-editor\" data-id=\"aeb1974\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn this digital age, data is now the golden egg needed to further business operations and it has almost revolutionized the way enterprises conduct business in the 21<sup>st<\/sup>\u00a0century. In fact, the\u00a0Big\u00a0Data\u00a0Analytics market is set to\u00a0<a href=\"https:\/\/techjury.net\/stats-about\/big-data-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\" label=\" (opens in a new tab)\" class=\"broken_link\">reach<\/a>\u00a0$103 billion by 2023. Through Big Data analytics, companies have the ability to improve efficiency, services and products which ultimately benefits their customers, and this is where the return on investment is measured. By having the data in front of executives, they can gain insights and view patterns on human behavior to help make clearer business decisions. And, thanks to digital transformation, Big Data is everywhere, whether that be in the cloud, or streamed from devices.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce6fa83 elementor-widget elementor-widget-text-editor\" data-id=\"ce6fa83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tHowever, with businesses harvesting, analyzing and transferring large data sets outside the standard business boundary in order to connect with other digital environments, an uncontrollable web of connectivity has transpired. With enterprises often having multiple partners, suppliers and other third parties, protecting this network for be extremely challenging, especially with no guarantees the third parties are protecting the critical information. Matters are made worse when considering hackers are becoming more ingenious with their attack methods, which has resulted in 78\u00a0<a href=\"https:\/\/cyber-edge.com\/wp-content\/uploads\/2019\/03\/CyberEdge-2019-CDR-Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" label=\" (opens in a new tab)\" class=\"broken_link\">percent<\/a>\u00a0of organizations experiencing a successful cyberattack in the last 12 months. It\u2019s clear that data security\u00a0can no longer\u00a0be overlooked.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ae7867 elementor-widget elementor-widget-heading\" data-id=\"5ae7867\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>Why All-encompassing Security is Needed<\/strong><\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97f1c40 elementor-widget elementor-widget-text-editor\" data-id=\"97f1c40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe true value of Big Data cannot be measured, but the more detailed or sensitive the information is, the more value it has to a business. Unfortunately, cybercriminals are aware to this fact and, in\u00a0the first six months of 2019,\u00a0<a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2019\/08\/20\/data-breaches-expose-41-billion-records-in-first-six-months-of-2019\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">roughly<\/a>\u00a04.1 billion records have been exposed\u00a0or stolen\u00a0through successful cyberattacks. But who\u2019s duty is it to ensure security is being met? Well, it\u2019s a collaborative effort that must involve the entire enterprise from the C-level executives, to the data analysts and engineers, right down to the rest of the workforce. Almost every department in a company comes into contact with sensitive data, so it\u2019s high time everyone understood the threats to data are very real\u2026\u00a0and costly if not adequately addressed.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd7fc20 elementor-widget elementor-widget-text-editor\" data-id=\"cd7fc20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe other major concern for businesses is ensuring compliance is being met against industry regulations and data privacy laws that require the protection of sensitive data. While data privacy statutory law is still in development at the federal level, many US states have filled the void and enacted their own data privacy laws \u2013 the strictest being the California Consumer Privacy Act (CCPA) \u2013 which are similar to the European General Data Protection Regulation (GDPR). In either case, if an organization is found to be non-compliant then serious fines ranging in the millions could be levied. If financial or credit card information is being harvested, then PCI DSS compliance is also required. These are numerous regulations that need to be adhered to depending on where the company operates or who the information relates to. So, to help navigate through the many data protection regulations, enterprises are seeking security solutions that address these concerns in order to future-proof their businesses.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-270e8aa elementor-widget elementor-widget-text-editor\" data-id=\"270e8aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tTo tackle the complex nature of today\u2019s online networks and help protect the data that lies within these infrastructures, a data-centric security strategy is required. This strategy is based on two key principles:\n<ol>\n \t<li>Protecting the data at its earliest stage, which may seem obvious, but is often not routinely done by organizations. If sensitive data is secured from the offset \u2013 the moment it is collected \u2013 there is less risk that information is shared in its unprotected form.<\/li>\n \t<li>Only de-protecting data when absolutely necessary. If individuals or applications need to view a piece of protected sensitive data in plain text, then only do so when it\u2019s essential. This links back to principle one, where data is always protected.<\/li>\n<\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63dc0ed elementor-widget elementor-widget-text-editor\" data-id=\"63dc0ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tTraditionally, data in its rawest form was easier to analyze and process but doing this securely was often a challenge. Now, tokenization technology can allow for data processing and analysis in a protected manner while keeping overall operational impact to a minimum. Tokenization substitutes sensitive data with a non-sensitive equivalent (known as a token) and in doing so, data engineers can carry out analytics and gather insights while the data is still in its protected form. By defending the sensitive information at its core, and at every stage of its lifecycle, instead of simply building a wall around the data, it removes the main issue brought by legacy <a href=\"https:\/\/www.experfy.com\/hire\/cyber-security\">security solutions<\/a>.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbd9577 elementor-widget elementor-widget-text-editor\" data-id=\"fbd9577\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nThe need for Big Data will continue to grow as it becomes the key for enterprises to stay competitive in a dynamic market. By implementing a \u201cdata-centric security\u201d solution, organizations can carry out Big Data analytics without having to compensate on security. Importantly, it will all be under the lens of compliance, to ensure that adherence with data protection regulations is being met.8888\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e17c9ef elementor-widget elementor-widget-text-editor\" data-id=\"e17c9ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nThe need for Big Data will continue to grow as it becomes the key for enterprises to stay competitive in a dynamic market. By implementing a \u201cdata-centric security\u201d solution, organizations can carry out Big Data analytics without having to compensate on security. Importantly, it will all be under the lens of compliance, to ensure that adherence with data protection regulations is being met.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>With security now the priority, is it possible for businesses to get security right without data analytics suffering? The need for Big Data will continue to grow as it becomes the key for enterprises to stay competitive in a dynamic market. By implementing a &ldquo;data-centric security&rdquo; solution, organizations can carry out Big Data analytics without having to compensate on security. Importantly, it will all be under the lens of compliance, to ensure that adherence with data protection regulations is being met.<\/p>\n","protected":false},"author":697,"featured_media":3094,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[95],"ppma_author":[3500],"class_list":["post-2145","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-big-data-amp-technology"],"authors":[{"term_id":3500,"user_id":697,"is_guest":0,"slug":"warren-poschman","display_name":"Warren Poschman","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","user_url":"","last_name":"Poschman","first_name":"Warren","job_title":"","description":"Warren Poschman is a Solutions Architect at&nbsp;<a href=\"http:\/\/www.comforte.com\/\" target=\"_blank\" rel=\"noopener\">comforte<\/a> AG"}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/697"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=2145"}],"version-history":[{"count":5,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2145\/revisions"}],"predecessor-version":[{"id":35880,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2145\/revisions\/35880"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3094"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=2145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=2145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=2145"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=2145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}