1
new revenue generation enhanced customer experience improved enterprise- wide performance Big Data is big with business leaders 89% believe Big Data will revolutionize business operations as the Internet did 1 83% have pursued Big Data projects for competitive edge 1 79% of compan- ies not embracing Big Data lose position and may even face extinction 1 Big Data analytics run on sensitive data 101000101 010000101 1110101101 100001010 101000101 010000101 1110101101 100001010 101000101 010000101 1110101101 100001010 101000101 010000101 1110101101 100001010 101000101 010000101 1110101101 100001010 101000101 010000101 1110101101 100001010 101000101 010000101 1110101101 100001010 101000101 010000101 1110101101 100001010 101000101 010000101 1110101101 100001010 Big Data has rewards, and some risks 51% agree that security is the biggest challenge 1 $3.79million per breach and $154 per lost or stolen record 2 23% increase in the average total cost of a data breach 2 under- standing disease patterns location services and GPS tracking tax fraud or criminal activity customer buying habits and trends 01010000000001111111010101000010101000001010000111011000101001010100000101010100100010101000000000101 10101000001010101000010101000001010000111011000101001010100000101010100100010101000001010101000010101000001011101001001000 101010000010101010000101010000010100001110110001010010101000001010101001000101010000010001111110101010 1 0 0 0 1 0 1 0 1 1 0 0 1 0 1 0 1 1 0 1 0 0 0 1 0 1 1 0 0 0 1 0 0 0 1 1 0 1 0 1 1 0 0 0 0 0 1 1 0 1 0 1 1 0 0 0 0 1 1 1 0 1 0 1 1 0 1 0 0 0 1 0 1 0 1 1 0 0 1 0 1 0 1 1 0 1 0 0 0 1 0 1 1 0 0 0 1 0 0 0 1 1 0 1 0 1 1 0 0 0 0 0 0 1 0 1 1 0 1 0 1 1 0 0 0 0 1 1 1 0 1 0 1 1 0 1 0 0 0 1 0 1 0 1 1 0 0 1 0 1 0 1 1 0 1 0 0 0 1 0 1 1 0 0 0 1 0 0 0 1 1 0 1 0 1 1 0 0 0 0 0 1 0 0 1 0 1 1 0 1 0 1 1 0 0 0 0 0 1 0 0 01 1 1 0 1 0 1 1 0 1 0 0 0 1 0 1 0 1 1 0 0 1 0 1 0 1 1 0 1 0 0 0 1 0 1 1 0 Do you have imperfect data security? Do you fall into these three common pitfalls? You’re focused on trying to get your data security infrastructure to work, rather than on securing data. Your data security solution lacks automation and real-time analytics to improve protection. 1 2 3 IBM ® Security Guardium ® provides comprehensive data security to safeguard critical data wherever it resides, helping you avoid the pitfalls and… Prevent data breaches Ensure data privacy Reduce cost of compliance Identify risk Read the ebook, Top Tips for Securing Big Data, to avoid the common pitfalls. © Copyright IBM Corporation 2015. IBM, the IBM logo and Guardium are trademarks of IBM Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. 1 “Big Business with Big Data,” Accenture. April 2014. https://www.accenture.com/us-en/~/media/Accenture/Conversion-Assets/DotCom/ Documents/Global/PDF/Industries_14/Accenture-Big-Data-POV.pdf 2 “2015 Cost of Data Breach Study: Global Analysis,” Ponemon Institute. May 2015. http://ibm.com/security/data-breach eBook Securing Big Data Avoiding the three pitfalls of imperfect security The benefits of Big Data are real and expectations are high. Delivering real-time insights for better business outcomes: healthcare records review social media analysis predictive modeling of potential school dropouts You can’t prove your Big Data projects meet compliance and audit requirements.

Infographic: Securing Big Data

Embed Size (px)

Citation preview

new revenuegeneration

enhanced customerexperience

improved enterprise-wide performance

Big Data is big with business leaders

89% believe Big Data will revolutionize business operations as the Internet did1

83% have pursued Big Data projects for competitive edge1

79% of compan-ies not embracing Big Data lose position and may even face extinction1

Big Data analytics run on sensitive data

1010001010100001011110101101100001010

1010001010100001011110101101100001010

1010001010100001011110101101100001010

1010001010100001011110101101100001010

1010001010100001011110101101100001010

1010001010100001011110101101100001010

1010001010100001011110101101100001010

1010001010100001011110101101100001010

1010001010100001011110101101100001010

Big Data has rewards, and some risks

51% agree that security is the biggest challenge1

$3.79million per breach and $154 per lost or stolen record 2

23% increase in the average total cost of a data breach 2

under-standing disease patterns

location services and GPS tracking

tax fraud or criminal

activitycustomer

buying habits and trends

1 0 1 0 1 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 0 1 0 1 0 1 0 0 0 0 1 0 1 0 1 0 0 0 0 0 1 0 1 0 0 0 0 1 1 1 0 1 1 0 0 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 0 1 0 1 0 1 0 1 0 0 1 0 0 0 1 0 1 0 1 0 0 0 0 0 0 0 0 0 1 0 11 0 1 0 1 0 0 0 0 0 1 0 1 0 1 0 1 0 0 0 0 1 0 1 0 1 0 0 0 0 0 1 0 1 0 0 0 0 1 1 1 0 1 1 0 0 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 0 1 0 1 0 1 0 1 0 0 1 0 0 0 1 0 1 0 1 0 0 0 0 0 1 0 1 0 1 0 1 0 0 0 0 1 0 1 0 1 0 0 0 0 0 1 0 1 1 1 0 1 0 0 1 0 0 1 0 0 0 0

1 0 1 0 1 0 0 0 0 0 1 0 1 0 1 0 1 0 0 0 0 1 0 1 0 1 0 0 0 0 0 1 0 1 0 0 0 0 1 1 1 0 1 1 0 0 0 1 0 1 0 0 1 0 1 0 1 0 0 0 0 0 1 0 1 0 1 0 1 0 0 1 0 0 0 1 0 1 0 1 0 0 0 0 0 1 0 0 0 1 1 1 1 1 1 0 1 0 1 0 1 010001010110

01010110

100010110

00100011010110

000011010110

000111010110

10001010110

01010110

100010110

00100011010110

000001011010110

000111010110

10001010110

01010110

100010110

00100011010110

00001001011010110

00001000111010110

10001010110

01010110

100010110

Do you have imperfect data security?Do you fall into these three common pitfalls?

You’re focusedon trying to get

your data securityinfrastructure towork, rather thanon securing data.

Your data securitysolution lacks

automation andreal-time analytics

to improveprotection.

1 2 3

IBM® Security Guardium® provides comprehensive data security to safeguard critical data wherever it resides, helping you avoid the pitfalls and…

Prevent data breaches Ensure data privacy Reduce cost of compliance Identify risk

Read the ebook, Top Tips for Securing Big Data, to avoid the common pitfalls.

© Copyright IBM Corporation 2015. IBM, the IBM logo and Guardium are trademarks of IBM Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml. THE INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided.

The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

1 “Big Business with Big Data,” Accenture. April 2014. https://www.accenture.com/us-en/~/media/Accenture/Conversion-Assets/DotCom/ Documents/Global/PDF/Industries_14/Accenture-Big-Data-POV.pdf2 “2015 Cost of Data Breach Study: Global Analysis,” Ponemon Institute. May 2015. http://ibm.com/security/data-breach

eBook

Securing Big DataAvoiding the three pitfalls of imperfect security

The benefits of Big Data are real and expectations are high.Delivering real-time insights for better business outcomes:

healthcare records review

social media

analysis

predictive modeling of

potential school dropouts

You can’t proveyour Big Dataprojects meetcompliance

and auditrequirements.