Skip Links

RSA: IT security managers skeptical on Big Data Security proposition

At RSA Conference, security execs say using big data for security may be a future issue but it's a little much right now

By , Network World
February 28, 2013 10:44 AM ET

Network World - San Francisco -- While "Big Data Security" is now the industry buzzword and defines a way to get enterprise customers into a new method of threat detection based on mining massive amounts of security-event and business data to pinpoint threats, the response from a few IT shops seems to be"thanks, but no thanks."

 
Bullet Hottest products at RSA Conference 2013
Bullet Do enterprise security teams want "Big Data Security"?
Bullet Juniper's "device fingerprinting" security technology gets mixed reviews
Bullet HP unveils 'Big Data Security' strategy
Bullet Weatherford outlines 'cyber 9-1-1' plan

 

"I don't call it Big Data," I call it garbage data," said Jerry Sto. Tomas, director of global information security at healthcare company Allergan, who with other panelists at the RSA Conference this week discussed the challenges that security managers face today in getting solid threat intelligence for network defense out of what already feels like too much security-event data. Adoption of cloud services is only adding another wrinkle on centralizing that plan.

[MORE: Hottest products at RSA Conference 2013]

[RELATED: Do enterprise security teams want "Big Data Security"?]

His colleagues on the panel, Stephen Moloney, manager enterprise information security at insurance firm Humana and David Hannigan, information security officer at e-commerce retailer Zappos.com, were also uninspired by the industry's call for Big Data Security.

The Big Data Security idea so far appears to amount to investing in a massive centralized repository, likely based on Hadoop, to use the latest security analytics engines to discern attacks by sorting through information provided by a vendor's security information and event-management (SIEM). It's an idea put forward most prominently by IBM, HP (which just this week put forward its strategy) and RSA, the security division of EMC, as where the most cutting-edge security is headed. But are chief information security officers ready to head in that direction?

It's not that they don't use SIEM to collect security-event information and log data today. But that in itself is problematic.

"With SIEM, we underestimated how much data there was," said Hannigan about what happens daily at Zappos. As it gets refined, the amount of data "explodes" and "people keep sending you more," he pointed out. Zappos uses Splunk to correlate data. Because Zappos suffered a data breach last year, the company has pushed hard to boost security, particularly by intensively monitoring the safety of customer accounts.

Zappos

Sto. Tomas of Allergan expressed similar sentiments. "The data is too much. With SIEM, once you've got one log correlated to another, it's very addicting. You want more." But it also brings "too much garbage." Allergan uses tools that include RSA enVision, Nitro Security and Splunk. But Allergan is also adopting cloud services such as Salesforce and Box for business purposes, as well as Zscaler for cloud-based security. The challenge is obtaining needed logs from cloud providers and integrating it. His job as security manager requires interaction with business units on security matters not sitting in front of a dashboard, he said. The business value from tools such as SIEM is in explaining security risk and impact to business units and you can't overwhelm them with data, he noted.

Our Commenting Policies
Latest News
rssRss Feed
View more Latest News